2022 IEEE Global Engineering Education Conference (EDUCON) 2022
DOI: 10.1109/educon52537.2022.9766653
|View full text |Cite
|
Sign up to set email alerts
|

Efforts and Suggestions for Improving Cybersecurity Education

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Sanzo et al (2021) reiterated that while schools have tried to update their information security courses, the scarcity of specialists has made it virtually impossible for schools to maintain pace with the changing cybersecurity environment. Alrabaee et al (2022) concurred with Sanzo et al (2021) that the lack of standardized cybersecurity educational programs and challenges experienced when updating the courses and the notion that cybersecurity graduates are ill-equipped with the skills needed for the job market discouraged students from pursuing cybersecurity as a career.…”
Section: Introductionmentioning
confidence: 94%
See 1 more Smart Citation
“…Sanzo et al (2021) reiterated that while schools have tried to update their information security courses, the scarcity of specialists has made it virtually impossible for schools to maintain pace with the changing cybersecurity environment. Alrabaee et al (2022) concurred with Sanzo et al (2021) that the lack of standardized cybersecurity educational programs and challenges experienced when updating the courses and the notion that cybersecurity graduates are ill-equipped with the skills needed for the job market discouraged students from pursuing cybersecurity as a career.…”
Section: Introductionmentioning
confidence: 94%
“…For instance, the National Initiative for Cybersecurity Education, directed by the National Institute of Standards and Technology in the Department of Commerce, has collaborated with high schools and colleges to design courses and programs that will attract students and provide them the training that befits a cybersecurity specialist (Wright, 2016). The DHS has partnered with K-12 schools to supply information technology teachers with the necessary academic materials and training to train their students and increase cybersecurity awareness (Alrabaee et al, 2022). The programs designed by the collaboration of government agencies incorporate complex cybersecurity scenarios, practical cyberattack training, and the skills to counter such attacks.…”
Section: Addressing the Scarcity Of Cybersecurity Professionalsmentioning
confidence: 99%
“…Conversely, port-based traffic identification systems operate under the assumption that applications utilize established Transmission Control Protocol/User Datagram Protocol (TCP/UDP) port numbers designated by the Internet Assigned Numbers Authority (IANA). Consequently, when apps deviate from IANA rules by utilizing dynamic ports or encryption protocols like Peer to Peer (P2P) protocol, the methods used to identify traffic and applications based on ports become ineffective [ 19 ]. Various technologies are available for implementing traffic encryption, including SSL, Transport Layer Security (TLS), Virtual Private Network (VPN), Secure Shell Protocol (SSH), and P2P.…”
Section: Related Workmentioning
confidence: 99%
“…Classifying this traffic can enable better optimization by internet service providers (ISPs) to prioritize real-time applications with more suitable network nodes [1]. Moreover, classifying network traffic may aid in malicious network traffic interception, which local governments typically mandate [3]- [5]. Automation of this task has garnered greater interest as the scale of network traffic increases and new threats to network security reveal themselves.…”
Section: Introductionmentioning
confidence: 99%