To see the other types of publications on this topic, follow the link: Cyber security education.

Dissertations / Theses on the topic 'Cyber security education'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 16 dissertations / theses for your research on the topic 'Cyber security education.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Oliparambil, Shanmughan Vivek. "Lightweight Environment for Cyber Security Education." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2390.

Full text
Abstract:
The use of physical systems and Virtual Machines has become inefficient and expensive for creating tailored, hands-on exercises for providing cyber security training. The main purpose of this project is to directly address these issues faced in cyber security education with the help of Docker containers. Using Docker, a lightweight and automated platform was developed for creating, sharing, and managing hands-on exercises. With the help of orchestration tools, this platform provides a centralized point to monitor and control the systems and exercises with a high degree of automation. In a classroom/lab environment, this infrastructure enables instructors and students not only to share exercises but also helps create and deploy exercises more easily. By streamlining the end to end delivery and deployment of the exercises, instructors can now efficiently make use of the class/lab hours in educating the students rather than performing system administration tasks.
APA, Harvard, Vancouver, ISO, and other styles
2

Sheen, Frank Jordan. "An Extensible Technology Framework for Cyber Security Education." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/4375.

Full text
Abstract:
Cyber security education has evolved over the last decade to include new methods of teaching and technology to prepare students. Instructors in this field of study often deal with a subject matter that has rigid principles, but changing ways of applying those principles. This makes maintaining courses difficult. This case study explored the kind of teaching methods, technology, and means used to explain these concepts. This study shows that generally, cyber security courses require more time to keep up to date. It also evaluates one effort, the NxSecLab, on how it attempted to relieve the administrative issues in teaching these concepts. The proposed framework in this model looks at ways on how to ease the administrative burden in cyber security education by using a central engine to coordinate learning management with infrastructure-as-a-service resources.
APA, Harvard, Vancouver, ISO, and other styles
3

Kortjan, Noloxolo. "A cyber security awareness and education framework for South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1014829.

Full text
Abstract:
The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy for these criminals to go unpunished. Moreover, many who use the Internet are not aware of such threats; therefore they may themselves be at risk, together with businesses and governmental assets and infrastructure. In view of this, there is a need for cyber security awareness and education initiatives that will promote users who are well versed in the risks associated with the Internet. In this context, it is the role of the government to empower all levels of society by providing the necessary knowledge and expertise to act securely online. However, there is currently a definite lack in South Africa (SA) in this regard, as there are currently no government-led cyber security awareness and education initiatives. The primary research objective of this study, therefore, is to propose a cyber security awareness and education framework for SA that will assist in creating a cyber secure culture in SA among all of its users of the Internet.
APA, Harvard, Vancouver, ISO, and other styles
4

Guild, R. James. "Design and analysis of a model reconfigurable cyber-exercise laboratory (RCEL) for information assurance education." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1187.

Full text
Abstract:
Approved for public release, distribution is unlimited<br>This thesis addresses the need to create a flexible laboratory environment for teaching network security. For educators to fully realize the benefit of such a facility, proto-type exercise scenarios are also needed. The paper is based on a model laboratory created at the Naval Postgraduate School. The initial configuration of the NPS lab is described. The work then develops a list of learning objectives achievable in the RCEL. Six proto-type cyber-exercise scenarios are presented to supplement the RCEL description. The activities within each potential scenario are described. The learning objectives met during each scenario are shown. This work demonstrates how a variety of potential RCEL exercises can supplement traditional information assurance education delivery techniques.<br>Civilian, Federal Cyber Services Corps, Naval Postgraduate School
APA, Harvard, Vancouver, ISO, and other styles
5

Olsson, Sanna, and Isabella Hultberg. "Cybersäkerhet - Att stärka den svaga länken : En flerfallsstudie om hur formella och informella styrmedel förebygger interna cyberhot i banksektorn." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176804.

Full text
Abstract:
Bakgrund: Banker fyller en mycket viktig funktion i samhället och har sedan digitaliseringen varit särskilt utsatta för cyberhot. Samtidigt bygger bankens verksamhet till stor del på att upprätthålla förtroendet hos sina kunder, varpå det är av stor vikt för banker att ha en hög cybersäkerhet. Framför allt kan interna cyberhot i form av mänskliga misstag konstateras vara den svaga länken i bankers säkerhetsarbete idag. Därför är det intressant att undersöka hur banker i Sverige arbetar för att öka cybersäkerheten genom formella och informella styrmedel, som kan påverka anställdas beteenden.  Syfte: Studien syftar till att bidra till ökad förståelse om hur banker styr sin verksamhet med formella och informella styrmedel för att förebygga interna cyberhot på arbetsplatsen.  Metod: Studien har ett hermeneutiskt perspektiv och är utformad enligt en kvalitativ metod. Vidare har en abduktiv ansats format uppsatsen. Syfte och frågeställningar har besvarats genom en flerfallstudie av fyra olika banker i Sverige. Det empiriska materialet har inhämtats med hjälp av intervjuer med representanter från respektive bank som arbetar med säkerhet.  Slutsats: För att förebygga interna cyberhot arbetar banker med formella styrmedel främst i form av regler, där de tar hjälp av globala standarder vid utformningen. Reglerna utformas även utifrån bankens kultur och uppdateras ofta. Vi har sett att kompetens och medvetenhet inom cybersäkerhet hos anställda är något som samtliga fallföretag värderar högt, och för att stärka kompetensen lägger bankerna stora resurser på utbildning. Att göra säkerhetstänket till en naturlig del av anställdas dagliga arbete har framför allt understrukits av respondenterna, samtidigt som arbetet med kultur till stor del görs passivt då det starka regelverket formar kulturen. Informella dialoger menas dock vara något som ökar medvetenheten och därmed stärker kulturen. Slutligen har vi identifierat att samtliga styrmedel nämnda ovan påverkar varandra, varpå det är viktigt att ha ett helhetstänk vid styrningsarbetet vad gäller cybersäkerhet.<br>Background: Banks play an important role in society and have since the increasing digitalization been particularly exposed to cyber threats. At the same time, the bank's operations are largely based on maintaining trust of its customers, and therefore it is of great importance for banks to have a high level of cyber security. Above all, internal cyber threats in the form of human error constitute one of the greatest risks to banks' security work today. Therefore, it is interesting to investigate how banks work to mitigate internal cyber threats through formal and informal management controls.  Purpose: This study aims to contribute to an increased understanding of how banks use formal and informal management control to mitigate internal cyber threats in the workplace.  Methodology: This study adopts a hermeneutic perspective and uses qualitative method. Furthermore, an abductive approach has shaped the essay. The purpose and research questions have been answered through a multiple case study of four different banks in Sweden. The empirical material has been obtained with the help of interviews with representatives from each bank who work with security.  Conclusion: To prevent internal cyber threats, banks work with rules which global standards and the company’s culture help design. We have noted that competence and awareness in cyber security is something that is valued highly. To strengthen the competence banks invest large resources in training. Making the idea of safety a natural part of employees' daily work has above all been emphasized by, at the same time as cultural development is largely done passively as the strong regulations shape culture. Informal dialogues, however, increase awareness and thus strengthen culture. Finally, we have identified that all the management controls mentioned above affect each other. Therefore, it is important to have a holistic approach to the governance work regarding cyber security.
APA, Harvard, Vancouver, ISO, and other styles
6

Holásková, Marie. "Návrh zavedení programu budování bezpečnostního povědomí na gymnáziu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378321.

Full text
Abstract:
The diploma thesis deals with the issue of building security awareness at grammar schools. The thesis can be divided into three main parts. The introductory part introduces the theoretical definition of basic concepts in the area of information security and a brief description of the legislative requirements to be followed in solving the work. The second part analyzes the current situation of selected grammar school, including risk analysis, HOS 8 analysis and SWOT analysis. In the practical part, the proposal to introduce a security awareness program adapted to the grammar school.
APA, Harvard, Vancouver, ISO, and other styles
7

Deshmukh, Pallavi Prafulla. "A Hands-on Modular Laboratory Environment to Foster Learning in Control System Security." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/71755.

Full text
Abstract:
Cyber-Physical Systems (CPSes) form the core of Industrial Control Systems (ICS) and critical infrastructures. These systems use computers to control and monitor physical processes in many critical industries including aviation, industrial automation, transportation, communications, waste treatment, and power systems. Increasingly, these systems are connected with corporate networks and the Internet, making them susceptible to risks similar to traditional computing systems experiencing cyber-attacks on a conventional IT network. Furthermore, recent attacks like the Stuxnet worm have demonstrated the weaknesses of CPS security, which has gained much attention in the research community to develop more effective security mechanisms. While this remains an important topic of research, often CPS security is not given much attention in undergraduate programs. There can be a significant disconnect between control system engineers with CPS engineering skills and network engineers with an IT background. This thesis describes hands-on courseware to help students bridge this gap. This courseware incorporates cyber-physical security concepts into effective learning modules that highlight real-world technical issues. A modular learning approach helps students understand CPS architectures and their vulnerabilities to cyber-attacks via experiential learning, and acquire practical skills through actively participating in the hands-on exercises. The ultimate goal of these lab modules is to show how an adversary would break into a conventional CPS system by exploiting various network protocols and security measures implemented in the system. A mock testbed environment is created using commercial-off-the-shelf hardware to address the unique aspects of a CPS, and serve as a cybersecurity trainer for students from control system or IT backgrounds. The modular nature of this courseware, which uses an economical and easily replicable hardware testbed, make this experience uniquely available as an adjunct to a conventional embedded system, control system design, or cybersecurity courses. To assess the impact of this courseware, an evaluation survey is developed to measure the understanding of the unique aspects of CPS security addressed. These modules leverage the existing academic subjects, help students understand the sequence of steps taken by adversaries, and serve to bridge theory and practice.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
8

Pexa, Marek. "Zavedení bezpečnostních opatření dle ISMS pro základní školu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402084.

Full text
Abstract:
The diploma thesis deals with introduction of security measures for primary and elementary school. The thesis is devided into three main parts. The first part deals with basic theoretical concepts of information security and legislative elements needed for understanding the issue. The second part desrcibes the current state for primary and elementary school. The last practical part includes proposal of security measures and recommendations.
APA, Harvard, Vancouver, ISO, and other styles
9

Přibyl, Aleš. "Základy bezpečnostního povědomí pro žáky základních škol." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417714.

Full text
Abstract:
This diploma thesis looks at building educational modules that will serve to build a basic awareness of safety for children in primary schools. The theoretical part describes the basic information from this area. The next part describes the assignment of individual modules and also describes the schools where the teaching took place. The practical section contains detailed fillings of these education modules.
APA, Harvard, Vancouver, ISO, and other styles
10

Volfová, Jana. "Budování bezpečnostního povědomí na fakultě podnikatelské." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444577.

Full text
Abstract:
This diploma thesis is focused on Security Awareness Education at the Faculty of Business and Management. It consists of three main parts: theoretical, analytical and practical considerations. The theoretical part is the introduction to basic terms, processes and analysis to help understand the thesis. The analytical part includes an introduction to the chosen organization and the implementation of analysis, which were presented in the theoretical part. The practical part contains, among other things, the actual proposals for Security Awareness Education at the faculty and its benefits.
APA, Harvard, Vancouver, ISO, and other styles
11

Svoboda, Milan. "Zavedení ISMS v malém podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241114.

Full text
Abstract:
The diploma thesis focuses on proposing an information security management system (ISMS) in a small company. This publication includes theoretical facts, which are needed to understand and design a ISMS. The design proposal of the ISMS itself is based on an analysis of the current status of the company's information security. The proposed security measures are based on the actual state of information security within the company, and on recommendations stemming from the ISO/IEC 27000 standard.
APA, Harvard, Vancouver, ISO, and other styles
12

Šisler, Marcel. "Porovnání výuky informační a kybernetické bezpečnosti v České republice a Jižní Koreji s návrhy na zlepšení." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417808.

Full text
Abstract:
This diploma thesis deals with a suggestions to improve the current state of education information and cyber security in the Czech Republic. These suggestions are from a comparison of education at the Brno University of Technology - Faculty of Business and Hallym University in South Korea. Another part is the analysis of trends in the field of cyber attacks and comparison of this area between the Czech Republic and South Korea.
APA, Harvard, Vancouver, ISO, and other styles
13

Pospíšil, Petr. "Správa uživatelů jako zdroje rizik." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318614.

Full text
Abstract:
This diploma thesis focuses on human resources mainly in Critical information infrastructure and Important information systems. Thesis focuses on the most frequent threats for users and design possible model of threat reduction. Integral part of results is designing of effective security awareness education program according to the Law on Cyber Security.
APA, Harvard, Vancouver, ISO, and other styles
14

Reid, Rayne. "A brain-compatible approach to the presentation of cyber security educational material." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1019895.

Full text
Abstract:
Information is an extremely important asset in modern society. It is used in most daily activities and transactions, and, thus, the importance of information is acknowledged by both organisational and private home information users. Unfortunately, as with any asset, there are often threats to this asset and, therefore, an information security solution is required to protect information against potential threats. Human beings play a major role in the implementation and governing of an entire information security process and, therefore, they have responsibilities in this regard. Thus, the effectiveness of any information security solutions in either an organisational or a private context is dependent on the human beings involved in the process. Accordingly, if these human beings are either unaware or not knowledgeable about their roles in the security solution they become the weak link in the information security solutions and, thus, it is essential that all these information users be educated in order to combat any threats to the information security. Many of the current information security education programmes and materials are not effective, possibly because the majority of these current approaches have been designed without using a sound pedagogical theory. In addition, many of these programmes also only target organisational users. This, in turn, is problematic as information security education is required by everybody, organisational and private information users alike. This dissertation addressed the lack of a pedagogical basis in the designing of information security educational courses suited to an extremely broad target audience. Accordingly, the dissertation set out to demonstrate how a pedagogy, which is broadly used and accepted for a diverse target audience of learners, could be applied to the design of the presentation of a web based, cyber security educational courses.
APA, Harvard, Vancouver, ISO, and other styles
15

Roberts, Anthea Elizabeth. "Is International Law International?" Phd thesis, Canberra, ACT : The Australian National University, 2017. http://hdl.handle.net/1885/124611.

Full text
Abstract:
International lawyers are familiar with the question: “Is international law law?” But this thesis instead asks the question: “Is international law international?” Using a variety of methods, this work sheds light on some of the ways in which international law as a transnational legal field is constructed by international law academics, and is conceptualized in international law textbooks, in the five permanent members of the Security Council: the People’s Republic of China, the French Republic, the Russian Federation, the United Kingdom of Great Britain and Northern Ireland, and the United States of America. It explores how different national communities of international lawyers construct and pass on their understandings of “international law” in ways that belie the field’s claim to universality, perpetuating certain forms of difference and dominance. By adopting a comparative approach, it aims to make international lawyers more aware of the frames that shape their own understandings of and approaches to the field, as well as how these might be similar to or different from the frames adopted by those coming from other states, regions or geopolitical groupings. It also examines how some of these patterns might be disrupted as a result of shifts in geopolitical power, such as the movement from unipolar power toward greater multipolarity and the growing confrontations between Western liberal democratic states (like the United States, the United Kingdom, and France) and non-Western authoritarian states (like China and Russia).
APA, Harvard, Vancouver, ISO, and other styles
16

Lopes, Inês Gonçalves Fatelo. "Game for Cyber Crime Prevention." Master's thesis, 2017. http://hdl.handle.net/10400.6/7824.

Full text
Abstract:
Technologies are increasingly becoming a part of the daily lives of younger generations and with no supervised usage of these technologies, teenagers are exposed to various threats. To create awareness in the youth, an educational game about cyber-security was designed and a game prototype was created. The game designed was a detective game, where the player takes the role of a detective to investigate a cyber-crime and to solve the case the player must play several mini-games. Each mini-game has a specific thematic about cyber-security, for example, sharing information in social networks, phishing and the importance of creating strong passwords. In these mini-games the player makes decisions and learn based on that. This prototype was tested by teenagers and there was an improvement of their cyber-security knowledge. A cyber-security educational game may grow cyber-security awareness in younger generations.<br>Este resumo alargado tem como objetivo apresentar o conteúdo deste relatório de uma forma detalhada em Língua Portuguesa, visto que o documento está escrito na Língua Inglesa. Introdução No primeiro capítulo do relatório é apresentado um resumo do projeto através do seu enquadramento e da discussão da motivação por detrás da escolha do mesmo. Na introdução são apontados os objetivos do projeto, a metodologia utilizada, e os resultados esperados. Equadramento, Motivação e Objectivos Atualmente, as tecnologias fazem cada vez mais parte do quotidiano das gerações mais novas da sociedade. Desde bastante novas, as crianças vão tendo contacto com aparelhos como smartphones ou tablets e o mundo virtual, nomeadamente a Internet. Chegando à adolescência, estes jovens têm uma vida virtual ativa através dos seus computadores e telemóveis e, muitas vezes, esta não é acompanhada pelos pais (até porque muitos destes não acompanham os avanços tecnológicos). Assim sendo, estes adolescentes estão expostos a várias ameaças informáticas através dos seus dispositivos. Para educar estes jovens, alertando-os dos riscos que podem correr com os seus smartphones e na Internet, existem várias organizações e projetos que se focam na cyber-segurança, bem como em alertar os pais e educadores dos mesmos. De modo a suportar as ações pedagógicas sobre cyber-segurança tomadas por este tipo de organizações ou por educadores, pretendeu-se o design e o desenvolvimento de um videojogo direcionado para jovens que aborde as ameaças informáticas a que estes estão expostos e que fomente neles uma melhor conduta online. O objetivo principal deste projeto foi desenhar e desenvolver um protótipo de videojogo para smartphone que atente em instruir bons hábitos de cyber-segurança nos jovens e que chame a atenção para os riscos online. Este protótipo servirá como suporte para um conceito de um jogo completo que permita que jovens jogadores consigam, sozinhos, assumir ações responsáveis na Internet. [...]
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!