To see the other types of publications on this topic, follow the link: Cyber security education.

Journal articles on the topic 'Cyber security education'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber security education.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Krutz, Daniel E., and Thomas Richards. "Cyber security education." ACM Inroads 8, no. 4 (2017): 5. http://dx.doi.org/10.1145/3132217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Esenalieva, Gulzat. "CYBER SECURITY IN THE EDUCATION SYSTEM." Alatoo Academic Studies 2022, no. 1 (2022): 167–71. http://dx.doi.org/10.17015/aas.2022.221.21.

Full text
Abstract:
In the modern educational process, the field of informatization and cybersecurity threats is of great relevance today. It should be noted that informatization processes and cybersecurity problems in the educational environment are interconnected. The rapid development of information technologies and widespread digitalization has seen a trend of large-scale application in the field of education of new ways of communication, organization of the educational process, and knowledge control. A number of problems that have been observed recently in the process of using information technologies in the educational process, potential threats to cybersecurity (such as filtering unwanted information, unauthorized access to data, cyberterrorism, problems of regulating the use of social networks) are described. The problem of pedagogical support of students on the formation of their information-safe behavior on the Internet and social networks is also considered.
APA, Harvard, Vancouver, ISO, and other styles
3

RICCI, Sara, Jan HAJNY, Edmundas PIESARSKAS, Simon PARKER, and Vladimir JANOUT. "Challenges in Cyber Security Education." International Journal of Information Security and Cybercrime 9, no. 2 (2020): 7–11. http://dx.doi.org/10.19107/ijisc.2020.02.01.

Full text
Abstract:
Cyber security education is an important and pertinent topic as it plays a major role in mitigating the risks caused by a global shortage of cyber security experts. In order to better support this crucial function, a cyber security skills framework needs to be agreed upon by academics in this field, along with an increase in the visibility of cyber security education and training. Without these, there is likely to be a long-term shortfall between the number of skilled cyber security professionals and demand, potentially leaving organisations, institutions, and governments vulnerable. Our contribution to this challenge is threefold. Firstly this article addresses the development of a cyber security skills framework and its applicability. Secondly, we have analysed a sample of 87 study programs in order to produce an overview of cyber security topic areas. Moreover, the collected data are visualized in an interactive map, i.e. a dynamic web application with the aim to help students in their search for a cyber security study program. Finally, a cyber security curricula designer tool is proposed; this application would serve as a guideline for cyber security curricula designers.
APA, Harvard, Vancouver, ISO, and other styles
4

Moran, Addy, Ford Powers, Lisa Campbell, and Melanie Rodriguez. "The PISCES Approach to Cyber Education." Journal of The Colloquium for Information Systems Security Education 11, no. 1 (2024): 5. http://dx.doi.org/10.53735/cisse.v11i1.190.

Full text
Abstract:
The following is a partner paper published to the CISSE journal. For more information, please visit the PISCES website. The Public Infrastructure Security Cyber Education System (PISCES) program has had significant impact on the cyber security posture of small municipalities and has helped develop qualified entry-level cyber analysts with real-world experience. Due to the ever-evolving nature of cyber security, adjusting our cyber security educational approach to be just as flexible is of dire importance. This paper will address how the PISCES program educates the students and partners with the municipalities, the aspects of cyber security training that PISCES does not cover and makes suggestions on how cyber security training can be applied to other situations.
APA, Harvard, Vancouver, ISO, and other styles
5

Hanif, Mohaddes Deylami, and Mohaddes Deylami1 2. Mahsa Mohaghegh1 Abdolhossein Sarrafzadeh1 Michael McCauley1 Iman Tabatabaei Ardekani1 Tamsin Kingston1 Hanif. "CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS." International Journal on Foundations of Computer Science & Technology (IJFCST) 5, no. 6 (2023): 12. https://doi.org/10.5281/zenodo.7970572.

Full text
Abstract:
Recent advances in computing have caused cyber security to become an increasingly critical issue that affects our everyday life. Both young and old in society are exposed to benefits and dangers that accompany technological advance. Cyber security education is a vital part of reducing the risks associated with cyber-threats. This is particularly important for current and future youth, who are the most technology-literate generations. Many research studies and competitions have been undertaken around the world to emphasize and identify the significance of cyber security as a relevant and pressing research area. Cyber security competitions are great means of raising interest in the young generation and attracting them to educational programmes in this area. These competitions show the need for cyber security to be taught as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber space. This paper presents an effective educational approach, justifying such competitions as a means of introducing cyber security as a computer science subject for New Zealand secondary school students, and also presents methods of implementation.
APA, Harvard, Vancouver, ISO, and other styles
6

Mohd Ariffin, Muhammad Azizi, Mohamed Yusof Darus, Haryani Haron, Aditya Kurniawan, Yohan Muliono, and Chrisando Ryan Pardomuan. "Deployment of Honeypot and SIEM Tools for Cyber Security Education Model In UITM." International Journal of Emerging Technologies in Learning (iJET) 17, no. 20 (2022): 149–72. http://dx.doi.org/10.3991/ijet.v17i20.32901.

Full text
Abstract:
Nowadays the threat of cyber-attacks is increasing as more organizations undergo digital transformation. Therefore, organizations need to take proactive measures to mitigate the cyber threat to avoid further loss to their business. To mitigate cyber risk effectively, organizations need to employ competent people in the IT security team to implement effective security controls. But there is a shortage of cyber security talent or professionals in the job market and to produce talents in the cyber security field requires extensive effort in education and training. A good cyber security education program should have to date curriculum and provide practical experience. To achieve this, the program must be supported by a cyber security lab equipped with various software, equipment, and tools used by a real professional in the industry. Therefore, this paper proposed a model of a cyber security lab equipped with honeypot and SIEM systems to enhance the quality of cyber security education. The cyber security lab based on the model was deployed at Universiti Teknologi MARA (UiTM) and used for teaching and learning activities. The honeypot will provide student experience analyzing the behaviour of hackers while the SIEM system will aggregate the logs data of the Campus Network Firewall in real-time. To evaluate the effectiveness of the proposed lab model, a functional test and a survey was conducted. The survey result shows that majority of the respondent agreed that the cyber security lab improve their teaching and learning experience while taking the cyber security subject.
APA, Harvard, Vancouver, ISO, and other styles
7

Yue, On-Ching. "Cyber security." Technology in Society 25, no. 4 (2003): 565–69. http://dx.doi.org/10.1016/j.techsoc.2003.09.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lehto, Martti, and Pekka Neittaanmäki. "Cyber security training in Finnish basic and general upper secondary education." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 199–208. http://dx.doi.org/10.34190/iccws.18.1.984.

Full text
Abstract:
Cyber security in Finland is part of other areas of comprehensive security, as digital solutions multiply in society and technologies advance. Cyber security is one of the primary national security and national defense concerns. Cyber security has quickly evolved from a technical discipline to a strategic concept. Cyber security capacity building can be measured based on the existence and number of research and developments, education and training programs, and certified professionals and public sector agencies.
 Cybersecurity awareness and the related civic skills play an increasingly important role as our societies become more digitalized. Improving citizens' cyber skills through education is an important goal that would strengthen Finland as a country of higher education and expertise and lay the foundation for the society of the future.
 Pursuant to the Finland’s Cyber Security Strategy (2019) “National cyber security competence will be ensured by identifying requirements and strengthening education and research.” Finland’s Cyber Security Development Programme (2021) necessitates that in basic education ensures young people have sufficient skills to operate in a digital operating environment and that they understand cyber security threats and know how to protect themselves from them. So, cybersecurity is an important subject for everyone, not just industry or public organizations. It’s also vital for our children to understand how to stay safe online, and the need to be aware of any dangers that might come their way. Cybersecurity awareness training is important because it teaches pupils how they can protect themselves from cyber-attacks (MTC, 2021).
 The study of cybersecurity education in Finland was made in autumn 2021 and spring 2022 for the National Cyber Security Director. According to the study, measures are needed so that cyber security becomes an important aspect when planning education and teaching. There are different models to choose from to make training more effective. This paper presents the results of the research focusing basic and general upper secondary education.
APA, Harvard, Vancouver, ISO, and other styles
9

Kayisoglu, Gizem, Pelin Bolat, and Emre Duzenli. "Modelling of Maritime Cyber Security Education and Training." Pedagogika-Pedagogy 95, no. 6s (2023): 64–78. http://dx.doi.org/10.53656/ped2023-6s.07.

Full text
Abstract:
The existence of sophisticated and integrated cyberspace aboard ships with information technology (IT) and operational technology (OT) makes cybersecurity a crucial concern for the maritime sector. The marine sector has benefited greatly from information and communication technologies, but they have also made ship systems and maritime infrastructure more susceptible to cyberattacks. Cyberattacks on ships have the potential to result in fatalities, severe financial losses, environmental damage, and other negative effects. A model course or specification for maritime cyber security education and training through the International Convention on Standards of Training, Certification, and Watchkeeping for Seafarers (STCW) 1978 has not yet been published by the International Maritime Organization (IMO), despite the fact that MSC.428 mandates cyber security risk management in the safety management system on ships to combat cyber-attacks and improve cyber resistance in maritime environments. The Analytic Hierarchical Process (AHP) technique is used in this work to offer a model for a curriculum for cyber security in the Maritime Education and Training (MET) system. It is possible to identify each competency’s priority in the MET system’s cyber security curriculum by comparing the relative weights assigned to each one. The results of the research provide the Met Institutions with the ability to be proactive and include cyber security knowledge and abilities into proposed curricula.
APA, Harvard, Vancouver, ISO, and other styles
10

Annesha, Dutta &. Dr Remith George Carri. "CHILDREN AND INTERNET: EMPOWERING LEARNERS WITH CYBER SECURITY EDUCATION." Scholarly Research Journal for Humanity Science & English Language 13, no. 67 (2025): 30–37. https://doi.org/10.5281/zenodo.14858571.

Full text
Abstract:
<em>Internet and technology have become an integral part of everyone's life. The penetration of the Internet and net-based technology into education has greatly benefited students in terms of access to information. However, excessive dependence and use of internet technologies pose a potential threat to users; making them, especially students, susceptible to cyber threats and crimes such as hacking, phishing, cyberbullying, etc. Although students extensively use the internet for learning, gaming, and other online activities, their awareness about the threats looming in the cyber world remains limited, and their preparedness to handle potential threats is relatively low. This paper highlights the importance to make students empower with cyber security education, so that they could live safely in the cyber world. This paper also emphasises the need for introducing cyber security education in every schools as a mandatory curricular subject at an appropriate age so as to make them aware about the threats hiding in the cyber world well before they start exploring cyber space themselves.</em>
APA, Harvard, Vancouver, ISO, and other styles
11

HAGGMAN, Andreas. "Wargaming in Cyber Security Education and Awareness Training." International Journal of Information Security and Cybercrime 8, no. 1 (2019): 35–38. http://dx.doi.org/10.19107/ijisc.2019.01.04.

Full text
Abstract:
This paper introduces readers to core concepts around cyber wargaming. Wargames can be powerful learning tools, but few wargames exist to teach players about cyber security. By way of highlighting possibilities in this space, the author has developed an original educational tabletop wargame based on the UK National Cyber Security Strategy and deployed the game to a variety of organisations to determine its pedagogic efficacy. Overall, it is found that the game was effective in generating high-engagement participation and clear learning opportunities. Furthermore, there are design lessons to be learned from existing games for those seeking to use wargames for cyber security training and education.
APA, Harvard, Vancouver, ISO, and other styles
12

Reid, Rayne, and Johan van Niekerk. "Brain-compatible, web-based information security education: a statistical study." Information Management & Computer Security 22, no. 4 (2014): 371–81. http://dx.doi.org/10.1108/imcs-11-2013-0081.

Full text
Abstract:
Purpose – This paper aims to demonstrate that learners prefer brain-compatible cyber security educational material, over traditional presentation methods. Design/methodology/approach – A prototype brain-compatible cyber security educational system was evaluated using a survey as a research instrument. Findings – Presenting cyber security material in a brain-compatible manner is an effective way in which to stimulate the learners’ interest, engages them in the learning experience and motivates them to learn. Originality/value – As far as could be determined, no previous studies showed the relevance of brain-compatible pedagogical techniques to cyber security education.
APA, Harvard, Vancouver, ISO, and other styles
13

Ceko, Enriko. "Cyber security issues in Albanian higher education institutions curricula." CRJ, no. 1 (September 18, 2023): 56–65. http://dx.doi.org/10.59380/crj.v1i1.2728.

Full text
Abstract:
Cybercrime and the phenomena accompanying, currently with international nature, targeting the main sectors of world economy, are main challenges facing individuals, families, societies and states, four main operators in the open market. An appropriate response to cybercrime, having a high and complete cyber security system, employing legal instruments, IT protocols and ISO standards related with this issue, is a priority. Undertaking this research, a review of curricula and syllabuses of economic, law and IT faculties of public and private higher university institutions in Albania have been done, as well as discussing the issue with lecturers of Cyber Security, Cyber Law and Quality Management discplines on these HUI’s too. Aims of this manuscript is evidencing the lack of scientific information about cyber security, cyber law and ISO standards for IT, Economy and Law faculty students in Albania. The importance of this manuscript is related on improving the current situation of now day’s students, which don’t have skills, knowledge and competencies to enter in the labour market, when cyber security issues are the main risks of public and private sector operators. This manuscript rises for the first time, awareness on offering a better curricula and syllabuses on the issue of cyber security in higher education institutions in Albania.
APA, Harvard, Vancouver, ISO, and other styles
14

RAGAVENDRAN, V. A., and Dr A. MEENAKSHI. "AN ANALYSIS OF THE LITERATURE ON SOCIETY'S CONCERNS ON INDIA'S CYBERSECURITY IN THE TWENTY-FIRST CENTURY." International Journal of Social Sciences and Management Review 06, no. 01 (2023): 103–9. http://dx.doi.org/10.37602/ijssmr.2022.6107.

Full text
Abstract:
Cyber security is concerned with matters of cyber-ethics and cyber-safety. The idea of cyber security should be introduced to and ingrained from a young age. Security countermeasures aid in preserving the confidentiality, availability, and integrity of information systems by preventing or lessening asset losses brought on by cyber security threats. An intrusion detection system (IDS) application analyses what happens during an execution and searches for indications that the computer has been mistreated. Numerous metaphors, including those relating to biological processes, healthcare, markets, three-dimensional space, and the preservation of tangible goods, were taken into account. These in turn sparked the investigation of a wide range of prospective tactics for advancing cyber security in the future. The concepts of "Heterogeneity," "Motivating Secure Behaviour," and "Cyber Wellness" were employed to define these tactics. Cyber security plays an important role in the development of information technology and Internet services. Our attention tends to gravitate toward "Cyber Security" when we hear about "Cyber Crimes." Therefore, how well our system handles "Cyber Crimes" is the first factor we take into account when talking about "National Cyber Security". This newsletter focuses on expanding trends in cyber security in light of the widespread adoption of cutting-edge technologies including mobile computing, cloud computing, e-commerce, and social networking. In the research, it is also covered how challenges are exacerbated by a lack of coordination between security organizations and crucial IT infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
15

Alexei, Arina. "CYBER SECURITY STRATEGIES FOR HIGHER EDUCATION INSTITUTIONS." Journal of Engineering Science XXVIII, no. 4 (2021): 74–92. http://dx.doi.org/10.52326/jes.utm.2021.28(4).07.

Full text
Abstract:
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect targets for cyber attackers. University networks are open in design, decentralized and multi-user, making them vulnerable to cyber-attacks. The purpose of this research paper was to identify which is the recommended cyber security strategy and how comprehensive are these studies, within HEIs. The method proposed by Kitchenham was used, focused on the information community. Thus, the following results can be communicated: researchers recommend their own security strategies, because the standards analysed in the papers are not oriented on HEIs, and require important adjustments to be implemented. Most scientific papers do not describe risk management process. The implementation phases are also insufficiently analysed. The functions that the strategy addressed by HEIs should fulfill include identification, protection and detection. The validation methods used in the preimplementation and post-implementation phases are case studies and surveys. Most researchers recommend as final cyber security strategy IT Governance and security policies. The field of research has proved to be very interesting, the researches could contribute to the creation of a comprehensive cybersecurity strategy, focused on the specifics of HEIs, efficient, easy to implement and cost-effective.
APA, Harvard, Vancouver, ISO, and other styles
16

Horlichenko, Serhiі. "FEATURES OF MODERN CONCEPTUAL AND TERMINOLOGICAL APPARATUS IN THE FIELD OF TRAINING OF CYBER SECURITY SPECIALISTS." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 171–81. http://dx.doi.org/10.28925/2663-4023.2024.23.171181.

Full text
Abstract:
The article examines the relevance of ensuring the sustainable development of high-quality cyber security of the state, as the main component of a modern digital society. Guidelines for the training of personnel of cyber security agencies of Ukraine were studied. The main normative legal acts regulating the system of educational training of experts in the domain of cyber security have been analyzed. The education system of personnel education in the cyber security niche is generally characterized and compared with the main elements of the general education system of Ukraine. The theoretical aspects of the formation of the system of training professionals specializing in cyber security are considered, the peculiarities and prospects of its functioning in today’s conditions are determined. A generalized concept of “system of personnel training in the field of cyber security” is proposed as a set of elements of educational activity, the purpose of which is to implement and ensure the enduring development of the digital society by training the necessary amount of personnel in the cyber security niche of the country. Fixed on the scientific achievements of domestic and foreign scientists in the field of education, the newest educational elements are outlined and concepts in the process of modern education. The definition of “cyber security” in the cyber security strategies of the world’s leading countries was analyzed and compared with the definition given in the national strategy for cybersecurity of Ukraine. The author’s vision of the term “cyber security” is proposed on the basis of researched scientific literature and official documents, taking into account communicative, sociological, and political aspects. A number of scientific developments in the field of cyber and information security were studied in order to generalize the essence of the definition of “cyber security specialist”. A conclusion was made regarding the importance of the proper functioning of the system of training qualified personnel in the field of cyber security. It is proposed to conduct a more detailed study of the process of personnel training itself and the conceptual foundations of the organization of educational activities on the example of other countries of the world.
APA, Harvard, Vancouver, ISO, and other styles
17

Haseski, Halil İbrahim. "Cyber Security Skills of Pre-Service Teachers as a Factor in Computer-Assisted Education." International Journal of Research in Education and Science 6, no. 3 (2020): 484. http://dx.doi.org/10.46328/ijres.v1i1.1006.

Full text
Abstract:
The present study aimed to determine the effect of individual cyber security skills of pre-service teachers on their attitudes towards computer-assisted education. Thus, the present research was designed as a correlational study. The study participants included 241 senior pre-service teachers in different departments at Manisa Celal Bayar University, Faculty of Education during the 2019-2020 academic year the fall semester. The data were collected with the "Personal Cyber Security Provision Scale" and "The Attitude Toward Computer-Assisted Education Scale." Based on the study findings, pre-service teachers should improve their competency in cyber security. Furthermore, pre-service teachers who owned a personal computer had higher scores in maintaining personal cyber security and had better attitudes towards computer-assisted education. Besides, it was observed that there were differences between personal cyber security scores of pre-service teachers and their attitudes towards computer-assisted education based on their departments. Furthermore, it was identified that the personal cyber security achievement score was a significant predictor of the attitude towards computer-assisted education. In the final section of the study, various recommendations are presented for future studies and applications on the subject.
APA, Harvard, Vancouver, ISO, and other styles
18

Haseski, Halil İbrahim. "Cyber Security Skills of Pre-Service Teachers as a Factor in Computer-Assisted Education." International Journal of Research in Education and Science 6, no. 3 (2020): 484. http://dx.doi.org/10.46328/ijres.v6i3.1006.

Full text
Abstract:
The present study aimed to determine the effect of individual cyber security skills of pre-service teachers on their attitudes towards computer-assisted education. Thus, the present research was designed as a correlational study. The study participants included 241 senior pre-service teachers in different departments at Manisa Celal Bayar University, Faculty of Education during the 2019-2020 academic year the fall semester. The data were collected with the "Personal Cyber Security Provision Scale" and "The Attitude Toward Computer-Assisted Education Scale." Based on the study findings, pre-service teachers should improve their competency in cyber security. Furthermore, pre-service teachers who owned a personal computer had higher scores in maintaining personal cyber security and had better attitudes towards computer-assisted education. Besides, it was observed that there were differences between personal cyber security scores of pre-service teachers and their attitudes towards computer-assisted education based on their departments. Furthermore, it was identified that the personal cyber security achievement score was a significant predictor of the attitude towards computer-assisted education. In the final section of the study, various recommendations are presented for future studies and applications on the subject.
APA, Harvard, Vancouver, ISO, and other styles
19

Atlam, Hany F. "LLMs in Cyber Security: Bridging Practice and Education." Big Data and Cognitive Computing 9, no. 7 (2025): 184. https://doi.org/10.3390/bdcc9070184.

Full text
Abstract:
Large Language Models (LLMs) have emerged as powerful tools in cyber security, enabling automation, threat detection, and adaptive learning. Their ability to process unstructured data and generate context-aware outputs supports both operational tasks and educational initiatives. Despite their growing adoption, current research often focuses on isolated applications, lacking a systematic understanding of how LLMs align with domain-specific requirements and pedagogical effectiveness. This highlights a pressing need for comprehensive evaluations that address the challenges of integration, generalization, and ethical deployment in both operational and educational cyber security environments. Therefore, this paper provides a comprehensive and State-of-the-Art review of the significant role of LLMs in cyber security, addressing both operational and educational dimensions. It introduces a holistic framework that categorizes LLM applications into six key cyber security domains, examining each in depth to demonstrate their impact on automation, context-aware reasoning, and adaptability to emerging threats. The paper highlights the potential of LLMs to enhance operational performance and educational effectiveness while also exploring emerging technical, ethical, and security challenges. The paper also uniquely addresses the underexamined area of LLMs in cyber security education by reviewing recent studies and illustrating how these models support personalized learning, hands-on training, and awareness initiatives. The key findings reveal that while LLMs offer significant potential in automating tasks and enabling personalized learning, challenges remain in model generalization, ethical deployment, and production readiness. Finally, the paper discusses open issues and future research directions for the application of LLMs in both operational and educational contexts. This paper serves as a valuable reference for researchers, educators, and practitioners aiming to develop intelligent, adaptive, scalable, and ethically responsible LLM-based cyber security solutions.
APA, Harvard, Vancouver, ISO, and other styles
20

Șestacov, Andrei. "Cyber Security Deficiencies in the Education Environment." Homo et Societas 5 (2020): 141–49. http://dx.doi.org/10.4467/25436104hs.20.010.13243.

Full text
Abstract:
Information technologies have already radically transformed the communications and information technology sectors, trade, media, and the education sector, especially education, which is on the top priority. Digital technologies will radically change the way data is sent and retrieved, will allow immediate and real-time feedback from students, will facilitate access to education through distance learning, will allow new service providers to enter traditional markets education. Thus, a diligent and well planned implementation of cyber security, as well as information security of information networks of educational institutions will provide a definite competitive advantage in the information environment. In the context of a dynamic information environment prone to large-scale cyber-attacks, in which cybercriminals are using increasingly advanced methods to implement attack vectors that are undetectable and difficult to neutralize, this scientific study is designed to protect data and security of your institutions as well as to ensure the confidentiality of your students and teachers. Whether we are talking about large or small educational institutions, this study provides a series of recommendations on the secure use of social networks with a minimum set of measures needed to prevent cyber-attacks as well as reduce the damage caused in case of attacks. At the same time, it will examine the best practices in the online environment, effectively analyze the privacy settings of mobile devices and present some top tips for the secure use of social networks. The study aims to comply with the following minimum set of measures in order to prevent cyber-attacks in educational institutions, and reduce the damage caused in the event of attacks. Cyber-bezpieczeństwo w obszarze edukacji Technologie informacyjne radykalnie przekształciły sektory komunikacji, handlu, mediów i edukacji. Technologie cyfrowe zmienią sposób przesyłania i wyszukiwania danych, umożliwią natychmiastową informację zwrotną od uczniów w czasie rzeczywistym oraz ułatwiają dostęp do edukacji poprzez kształcenie na odległość. Zatem rzetelne i dobrze zaplanowane wdrożenie cyberbezpieczeństwa, a także bezpieczeństwa informacyjnego sieci informacyjnych placówek oświatowych zapewni zdecydowaną przewagę konkurencyjną w środowisku informacyjnym. Artykuł ma na celu przedstawienie środków zapobiegawczych przeciw cyberatakom w placówkach edukacyjnych i ograniczania szkód wyrządzanych w przypadku takich ataków.
APA, Harvard, Vancouver, ISO, and other styles
21

Ananin, V., and O. Uvarkina. "CURRENT POLITICAL MAINSTREAMS OF MILITARY EDUCATION." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(53) (July 8, 2022): 41–46. http://dx.doi.org/10.20535/2308-5053.2022.1(53).261106.

Full text
Abstract:
The problem horizon of the current state of Ukrainian military education is quite wide, and the amplitude of conceptual points of view to the development of new models of military education fluctuates within a very wide range. The analysis of theoretical and practical problems has shown the dominance of consensus on the strategic course of the state policy on NATO membership. It was determined that the modern gabitus of the political mainstream of military education today is the National Security Strategy of Ukraine, which is based on the triad of principles “deterrence-sustainability-interaction” and provides for the corresponding processes of national security through modernization of education and science to the needs of social development on the basis of the best world educational models and practices. The article reveals that the intension of military education transformation lies in changing the military education provisions in the Ukrainian legislation and updating its structure, as well as in scientific professional environment, in substantiation and elaboration of the Policy and Concept of military education development, taking into account the NATO standards. The lack of a systematic analysis of the political paradigm of professional education for information security and cyber defense specialists, directed research to identify the main political mainstreams in the training of military specialists in the field of cyber security in the conditions of digital transformation. The Ukraine Cyber Security Strategy Implementation Plan notes the intent of creating a new model for training and professional development of cyber security subjects and developing a Nationwide Cyber Literacy Program for all levels of education. It is proved that cyber awareness of military specialist in the new model of military education becomes a priority sign of his professionalism.
APA, Harvard, Vancouver, ISO, and other styles
22

Perwej, Dr Yusuf, Syed Qamar Abbas, Jai Pratap Dixit, Dr Nikhat Akhtar, and Anurag Kumar Jaiswal. "A Systematic Literature Review on the Cyber Security." International Journal of Scientific Research and Management 9, no. 12 (2021): 669–710. http://dx.doi.org/10.18535/ijsrm/v9i12.ec04.

Full text
Abstract:
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace. Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government. Everything has recently been digitized, with cybernetics employing a variety of technologies such as cloud computing, smart phones, and Internet of Things techniques, among others. Cyber-attacks are raising concerns about privacy, security, and financial compensation. Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data. The primary goal of this article is to conduct a thorough examination of cyber security kinds, why cyber security is important, cyber security framework, cyber security tools, and cyber security difficulties. Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout the life cycle of a cyber-attack.
APA, Harvard, Vancouver, ISO, and other styles
23

Marpaung, Jonathan Nahum. "Cyber Security in Indonesian Higher Education Institutions: Lessons Learned from Recent Cyber Attacks." Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) 10, no. 1 (2025): 343. https://doi.org/10.30645/jurasik.v10i1.876.

Full text
Abstract:
Cyber security is paramount to the sustainability of higher education institutions as more institutions move their information system to the cloud and allow stakeholders to access their information technology services from on-campus WIFI and mobile devices. This study aims to understand Indonesian higher education's current cyber security landscape by analyzing recent cyber-attacks that hit all sectors, notably higher education. Recent news articles and government reports related to cyber-security were analyzed using document analysis. This study found that data theft attacks were the number one cyber threat that higher education institutions faced, followed by attacks on institutional websites, social media pages, and personal mobile devices. This study found that the nature of recent cyber-attacks was consistent with the assessment posed by previous literature that stakeholders’ recent level of ability in cyber-security is not where it is supposed to be. The potential impact of future cyber-attacks on institutions and stakeholders is significant, underscoring the importance of this new understanding, which can help institutions prepare their stakeholders better to mitigate such threats.
APA, Harvard, Vancouver, ISO, and other styles
24

Saharinen, Karo, Jarmo Viinikanoja, and Jouni Huotari. "Researching Graduated Cyber Security Students – Reflecting Employment and Job Responsibilities through NICE framework." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 247–55. http://dx.doi.org/10.34190/eccws.21.1.201.

Full text
Abstract:
Most research and development on Cyber Security education is currently focusing on what should be taught, how much, and where within the degree programmes. Different Cyber Security frameworks are currently evolving to include Cyber Security education parallel to older paradigms of Computing Education, existing alongside with such as “Information Technology” and “Software Engineering”. Different Cyber Security specialisations or even whole degree programmes have started within universities before the frameworks have been defined into standardised degree structures. This is mainly the result of a dire industry need of well-educated cyber security personnel, a phenomenon affecting the industry globally.&#x0D; Our research concentrates on Finnish alumni students who have already graduated from a bachelor’s degree programme in Information Technology with a specialisation in Cyber Security in Finland. Within our gathered research data, we analysed what is the industry sector where their current job resides, and what are the cyber security responsibilities in their current work. The questionnaire also contained an after-reflection section where the graduated students could choose what they would study were they about to start and plan their studies again.&#x0D; The results verify that Cyber Security is still the most favoured specialisation within the former Cyber Security alumni students. Slight variation is evident from the data, which in the authors’ perspective, verifies the multifaceted nature of Cyber Security. When analysing alumni students’ job responsibilities, the main category of work resides in the “Protect and Defend” category of the NICE Framework, which in the terms of the conference, relates to Critical Infrastructure Protection being the main subject of employment for fresh graduates.&#x0D; These results give insight to other education organisations on how to develop their curricula to further emphasise the employment of students or to offer modules which are of interest for newly employed Cyber Security professionals. In addition, it gives an insight of industry demand for freshly graduated students within the target group.
APA, Harvard, Vancouver, ISO, and other styles
25

Tanwar, Prof Rakesh. "Cyber Security Challenges." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 564–66. https://doi.org/10.22214/ijraset.2025.66263.

Full text
Abstract:
In an increasingly digitized world, cybersecurity has emerged as a critical domain for ensuring the safety and integrity of information systems. This paper provides a comprehensive overview of the current state of cybersecurity, highlighting the evolving threat landscape, key challenges, and strategic defenses. Cyber threats have become more sophisticated and widespread, targeting both individuals and organizations. These threats include various forms of malware, phishing attacks, ransomware, and advanced persistent threats. As a result, the need for robust cybersecurity measures has never been more pressing. This abstract discusses the importance of adopting a multi-layered security approach that encompasses technical solutions, policy frameworks, and human factors. Technical solutions include the deployment of firewalls, intrusion detection systems, and encryption technologies. Additionally, emerging technologies such as artificial intelligence (AI) and machine learning (ML) are playing an increasingly significant role in identifying and mitigating cyber threats. These technologies can analyze vast amounts of data to detect anomalies and predict potential attacks before they occur. Policy frameworks are essential in establishing guidelines and standards for cybersecurity practices. These policies help ensure that organizations implement best practices for protecting their information assets. International cooperation and compliance with regulations such as the General Data Protection Regulation (GDPR) are crucial for maintaining a secure cyber environment. Human factors are often considered the weakest link in cybersecurity. Therefore, continuous education and awareness programs are necessary to equip individuals with the knowledge to recognize and respond to cyber threats. Employee training on safe internet practices and regular updates on emerging threats can significantly reduce the risk of successful cyber attacks. As cyberattacks continue to escalate in frequency and severity, it is imperative for both private and public sectors to collaborate in developing robust cybersecurity strategies. This paper aims to contribute to the ongoing discourse by offering insights into effective practices and future directions for research and development in the field of cybersecurity. In conclusion, the dynamic nature of cyber threats requires a proactive and adaptive approach to cybersecurity. By integrating advanced technologies, establishing comprehensive policies, and fostering a culture of awareness, we can enhance our defenses against the ever-evolving cyber threat landscape
APA, Harvard, Vancouver, ISO, and other styles
26

Ivanusa, A. I., R. L. Tkachuk, N. O. Maslova, V. I. Yashchuk, and A. M. Tkachenko. "INFORMATION SECURITY AND CYBER SECURITY MANAGEMENT IN HIGHER EDUCATION INSTITUTIONS." Bulletin of Lviv State University of Life Safety 31 (2025): 101–16. https://doi.org/10.32447/20784643.31.2025.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lehto, Martti. "Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences." International Journal of Cyber Warfare and Terrorism 6, no. 2 (2016): 15–31. http://dx.doi.org/10.4018/ijcwt.2016040102.

Full text
Abstract:
The revolution in information technology that began in the 1990s has been transforming Finland into an information society. Imaginative data processing and utilization, arising from the needs of citizens and the business community, are some of the most important elements in a thriving society. Information and know-how have become key ‘commodities' in society, and they can be utilized all the more efficiently through information technology. For all nations, the information technology revolution quietly changed the way business and government operate, as well as the daily life of citizens. Our daily life, fundamental rights, social interactions and economies depend on information and communication technology working seamlessly. An open and free cyberspace has promoted political and social inclusion worldwide; it has broken down barriers between countries, communities and citizens, allowing interaction and sharing of information and ideas across the globe. Individuals, public and private organizations alike depend on the cyber world. From the citizens using social media, to banks growing their business, to law enforcement supporting national security – every sector of the society is increasingly dependent upon technology and networked systems. While the public sector, the economy and the business community as well as citizens benefit from globally networked services, the digital IT society contains inherent vulnerabilities which may generate security risks to citizens, the business community or the vital functions of society. Without sufficient awareness of the risks in cyber world, however, behavioral decisions and unseen threats can negatively impact the security of the critical infrastructure and can cause physical damage in the real world. On an individual level, what is at stake is the vulnerability of each individual user in cyber world. As the world grows more connected through cyber world, a highly skilled cyber security workforce is required to secure, protect, and defend national critical information infrastructure. Across the private and public sector organizations are looking for well-trained professionals to assess, design, develop, and implement cyber security solutions and strategies. While the demand for cyber security professionals is high, the supply is low. Meeting the growing demand for cyber security professionals begins in the education system. The most efficient custom to increase cyber security is the improvement of the know-how. The cyber security strategies and development plans require the improvement of the know-how of the citizens and actors of the economic life and public administration. Pursuant to Finland's Cyber Security Strategy (2013) “the implementation of cyber security R&amp;D and education at different levels does not only strengthen national expertise, it also bolsters Finland as an information society.” In this article are analyzed the cyber security research and education which is offered in Finland's universities and universities of applied sciences.
APA, Harvard, Vancouver, ISO, and other styles
28

Bagó, Péter. "Cyber security and artificial intelligence." Economy & finance 10, no. 2 (2023): 189–212. http://dx.doi.org/10.33908/ef.2023.2.5.

Full text
Abstract:
Cyber security is one of the key challenges in the age of information technology, which is particularly important in the financial sector, where security is key both for customers and institutions. Data protection, fighting fraud and preventing cyber attacks are areas in which artificial intelligence and automated systems can provide significant assistance. The use of AI and machine learning for cybersecurity allows systems to be recovered quickly and effectively after a cyber attack. Using AI algorithms, experts can immediately assess damage and respond to cyber incidents with AI. In the paper the support of cyber protection with artificial intelligence is presented in the finance sector. There are major overlaps with infrastructural protection, individual security levels and proper data protection.
APA, Harvard, Vancouver, ISO, and other styles
29

Ananin, V., and O. Uvarkina. "POLITICAL VISIONS OF CYBER EDUCATION." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(57) (May 31, 2023): 35–39. http://dx.doi.org/10.20535/2308-5053.2023.1(57).280780.

Full text
Abstract:
This article is the first to analyze the political visions of the new US National Cybersecurity Strategy in terms of cyber education, which in the current security situation is becoming a kind of habitus of the global information space and launches a new long-term policy of the key Ukrainian international partnership in harmonizing security approaches. The identification of new priorities in both the global and national security environment focuses the attention of the US Strategy on a comprehensive and coordinated approach of public policy towards expanding access to cyber education to meet the needs for cybersecurity expertise in all sectors of the economy to continue to innovate in secure and sustainable next-generation technologies. It is determined that the need to actualize the problem of training modern cybersecurity specialists is due to the exponential global digitalization, which has increased the need for training cybersecurity specialists in various spheres of society. It is proved that the state strategic documents on cybersecurity pay attention to the reform of cyber education through the updating and approval of professional standards, which are the basis for improving educational programs and introducing new modern specializations. It has been found that the NATO DEEP program in Ukraine continues to adapt military education to NATO requirements, where cyber awareness of a military specialist in the new model of military education becomes a priority feature of his professionalism. The analysis of the implementation of the cyber literacy program showed that there is a huge demand for various cyber hygiene measures to protect young people from the destructive effects of disinformation and manipulative information in cyberspace, taking into account the emergence of new cyber threats and challenges.
APA, Harvard, Vancouver, ISO, and other styles
30

Bystrova, Bogdana. "Comparative Analysis of Curricula for Bachelor’s Degree in Cyber Security in the USA and Ukraine." Comparative Professional Pedagogy 7, no. 4 (2017): 114–19. http://dx.doi.org/10.1515/rpp-2017-0058.

Full text
Abstract:
Abstract At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of this approach is determined by the dynamics of technological advances. An innovative approach is a methodological platform for research and students’ project work, their communication with professional scientific community on the stage of the national strategy on cyber security implementation. The results of the comparative analysis of educational programs for cyber security bachelor's degree in the U.S and Ukraine have been presented. At the stage of the national strategy on cyber security implementation there has been made an emphasis on a specific task – to provide a balance between the objectives and results of education for the inner harmony of study process. We have indicated a number of key tasks, as follows: standardization, implementation of dual and mixed types of training, the promotion of new technologies in the educational process; provision of the motivation of students. The conducted research of American experience concerning professional training of cyber security bachelors will enable to determine the possibilities of its progressive ideas implementation into higher education of Ukraine (in particular, the improvement of industry standards for cyber security bachelor’s degree; providing the information support of Internet resources; development and improvement of the content of curriculum and educational programs for training bachelors of cyber security; improvement of educational and methodical implementation; advanced study of foreign experience. The successful implementation of reasonable opportunities will promote professional training of national experts in the field of cyber security, accelerate the process of reforming the national higher education system, convergence of the international educational standards, and ensure its competitiveness in today’s job market.
APA, Harvard, Vancouver, ISO, and other styles
31

Trisolvena, Muhammad Nana, and Nana Handre Saputra. "Phishing Cyber Security Threats." Jurnal Improsci 2, no. 1 (2024): 38–48. http://dx.doi.org/10.62885/improsci.v2i1.440.

Full text
Abstract:
Phishing is a growing threat in the realm of cybersecurity, where cybercriminals use various phishing techniques to steal sensitive information from individuals and organizations. In practice, phishing aims to obtain personal, account, and financial data by impersonating trusted parties through fake emails, websites, text messages, or social media. The term "phishing" comes from the word "fishing" which describes an attempt to lure prey with fake bait. The most common types of phishing include web phishing, email phishing, smishing phishing, scam phishing, blind phishing, whaling phishing, and angler phishing, each with different approaches and targets. Phishing causes losses to individual victims and significantly impacts the information and communication technology profession, including loss of data, reputation, security, time, cost, quality, and trust. An in-depth understanding of the types of phishing, their impacts, and their prevention and countermeasures is essential to protect yourself and your organization from phishing attacks. Therefore, awareness and education about phishing are key in building resilience to this cyber threat. As such, further research and proactive actions are needed to tackle phishing effectively in the ever-evolving digital age.
APA, Harvard, Vancouver, ISO, and other styles
32

Jalihal, Shreyas. "Importance of Cyber Security in Gaming Industry: A Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34116.

Full text
Abstract:
The Gaming industry, which was once a small industry, has now become one of the fastest-growing industries in the world. With the development of internet technology, online gaming has become a way of entertainment and connecting among the young generation of the modern era. This review paper speaks about the cyber security required in gaming to protect players and gaming companies from potential losses from cyber attacks. By exploring different situations, this paper explores various and effective security measures for the gaming industry. This paper also discusses existing cyber security technology used in cyber security. In a further paper, some cyber security solutions are discussed for fortifying games.. Keywords— Cyber Security, Gaming, Gaming Industry, Threats, Cyber Attacks, Protection, Cybersecurity Education, Protection measures.
APA, Harvard, Vancouver, ISO, and other styles
33

R. Nair, Rejani. "AWARENESS, THREATS AND PERCEPTION OFCYBER SECURITY." International Journal of Advanced Research 13, no. 05 (2025): 756–63. https://doi.org/10.21474/ijar01/20957.

Full text
Abstract:
With the rapid advancement of modern technology, online education has become more accessible than ever, enabling learners to receive the same high-quality experience and outcomes as traditional education through a virtual platform. However, with these advancements comes an expanded threat from cyber criminals. Computer security, cyber security or information technology security is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. Cyber security is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. It is more important than ever to keep yourself safe. Malicious cyber activity affects students in a variety of ways, typically in the form of malware and scams. As students join classes using their personal computers and home wi-fi networks, the number of potential attack vectors has rapidly proliferated. The study attempts to find out the cyber security awareness among college students. It has also put some effort into identifying the level of awareness, and the perception of students regarding cyber security along with the measure of social media influence that cyber security plays in their daily lives.
APA, Harvard, Vancouver, ISO, and other styles
34

Karagozlu, Damla. "Determination of cyber security ensuring behaviours of pre-service teachers." Cypriot Journal of Educational Sciences 15, no. 6 (2020): 1698–706. http://dx.doi.org/10.18844/cjes.v15i6.5327.

Full text
Abstract:
As cyber security attack rates increase, so do cyber security concerns. Cyber security is the collection of tools, policies, security concepts, security measures, risk management approaches, actions, education, applications, security and technologies that can be used in order to protect the cyber environment and user rights. The aim of this study is to determine the behaviours of pre-service teachers as this study’s objective is to determine the behaviours of pre-service teachers regarding cyber security. This study is designed according to the quantitative research method and the Personal Cyber Security Ensuring Scale has been used. 144 pre-service teachers of two different universities who took up instructional technologies and material design courses in the 2019–2020 spring semester participated in the study. It has been observed that the participants frequently took measures when they noticed unreliable people and situations in the internet environment but took occasional measures in terms of not leaving any trace, taking precautions and protecting personal privacy.&#x0D; &#x0D; Keywords: Cyber attack, cyber security, personal cyber security, pre-service teachers
APA, Harvard, Vancouver, ISO, and other styles
35

Ondrušková, Dana, and Richard Pospíšil. "The good practices for implementation of cyber security education for school children." Contemporary Educational Technology 15, no. 3 (2023): ep435. http://dx.doi.org/10.30935/cedtech/13253.

Full text
Abstract:
The increasing use of the Internet calls upon the need for adequate cyber security awareness to better face the risk and dangers connected with the online environment. This research presents an experiment that revealed the cyber security awareness of children at Czech primary schools. They were tested for their skills to distinguish different online risks. After the pre-testing children received training and with the time delay they filled in very similar questionnaires. The re-testing measured how well the children retained the training and their ability to use the skills in the virtual environment. The results show only a moderate level of cyber security awareness at the initial testing. The one-off training had only an insignificant impact on their online behavior. The research reveals an important finding. One-off training does not affect their responsive online behavior and is not a suitable solution for effectively improving online safety skills. The task is to involve cyber security awareness education in the whole educational process. Based on the literature and conducted research this paper provides a set of recommendations for the designers of the cyber security school curriculum.
APA, Harvard, Vancouver, ISO, and other styles
36

Sverdlyk, Zoriana. "Cyber Security and Cyber Protection: Topics on the Agenda in Ukrainian Society." Ukrainian Journal on Library and Information Science, no. 10 (December 28, 2022): 175–88. https://doi.org/10.31866/2616-7654.10.2022.269495.

Full text
Abstract:
The aim of the article&nbsp;is to analyse the concepts of &laquo;cyber hygiene&raquo;, &laquo;cyber security&raquo;, &laquo;cyber protection&raquo;, and clarify the role of those processes which are interpreted by these terms in modern human life; to identify the main achievements in Ukrainian law system regarding the legal cybernetic sphere regulation; to highlight key rules for observing cyber hygiene. The research methodology&nbsp;has been implemented using scientific methods of terminological analysis when comparing the definitions of relevant terms. Statistical method has been used in order to generalise quantitative indicators characterising the increase in the interest of higher education establishments in cyber security specialists training. Comparison and generalisation have made it possible to comprehensively reveal the raised problem in this study. The scientific novelty&nbsp;of this research consists in the following: emphasising the cooperation importance and necessity of Ukrainian organisations with foreign partners in the sphere of information protection contained in cyber space; identifying and tracking tendencies in improving cyber security in the context of science, education and state administration. Conclusions.&nbsp;The issue studying of ensuring information cyber protection, as well as cyber security when using Internet and cyber hygiene in Ukraine, has highlighted the vision that Ukrainian specialists have made a significant step forward in these matters. This is confirmed by international statistical data. The analysis of recently adopted legislative, normative legal acts and regulatory documents at the national level has confirmed the thesis that Ukrainian legislation in cyber security issues is gradually reorienting itself to global tendencies, and borrowing positive foreign experience. However, there still exist urgent unresolved problems, the basis of which is the reduction of the conceptual cyber security apparatus to fixed at the legislative level interpretations. The issues of further international cooperation intensification in matters of cyber protection and cyber security, additionally, creation of common interstate platforms for information exchange, are necessary as well. No less important is the development and expansion of educational programmes in speciality 125 &laquo;Cyber Security&raquo; in higher education establishments of Ukraine. According to the obtained results of this study, the interest in this profession among youth has been growing recently.
APA, Harvard, Vancouver, ISO, and other styles
37

Sverdlyk, Zoriana. "Cyber Security and Cyber Protection: Topics on the Agenda in Ukrainian Society." Ukrainian Journal on Library and Information Science, no. 10 (December 28, 2022): 175–88. http://dx.doi.org/10.31866/2616-7654.10.2022.269495.

Full text
Abstract:
The aim of the article is to analyse the concepts of «cyber hygiene», «cyber security», «cyber protection», and clarify the role of those processes which are interpreted by these terms in modern human life; to identify the main achievements in Ukrainian law system regarding the legal cybernetic sphere regulation; to highlight key rules for observing cyber hygiene. The research methodology has been implemented using scientific methods of terminological analysis when comparing the definitions of relevant terms. Statistical method has been used in order to generalise quantitative indicators characterising the increase in the interest of higher education establishments in cyber security specialists training. Comparison and generalisation have made it possible to comprehensively reveal the raised problem in this study. The scientific novelty of this research consists in the following: emphasising the cooperation importance and necessity of Ukrainian organisations with foreign partners in the sphere of information protection contained in cyber space; identifying and tracking tendencies in improving cyber security in the context of science, education and state administration. Conclusions. The issue studying of ensuring information cyber protection, as well as cyber security when using Internet and cyber hygiene in Ukraine, has highlighted the vision that Ukrainian specialists have made a significant step forward in these matters. This is confirmed by international statistical data. The analysis of recently adopted legislative, normative legal acts and regulatory documents at the national level has confirmed the thesis that Ukrainian legislation in cyber security issues is gradually reorienting itself to global tendencies, and borrowing positive foreign experience. However, there still exist urgent unresolved problems, the basis of which is the reduction of the conceptual cyber security apparatus to fixed at the legislative level interpretations. The issues of further international cooperation intensification in matters of cyber protection and cyber security, additionally, creation of common interstate platforms for information exchange, are necessary as well. No less important is the development and expansion of educational programmes in speciality 125 «Cyber Security» in higher education establishments of Ukraine. According to the obtained results of this study, the interest in this profession among youth has been growing recently.
APA, Harvard, Vancouver, ISO, and other styles
38

Aphane, Mmabatho Portia. "Cybersecurity Awareness on Cybercrime Among the Youth in Gauteng Province." International Journal of Social Science Research and Review 6, no. 8 (2023): 23–32. http://dx.doi.org/10.47814/ijssrr.v6i8.1414.

Full text
Abstract:
The increased independence on Internet has raised growing concerns that cyber security is becoming difficult to maintain. Not only do businesses depend on the internet for all types of electronic transactions, but home users increasingly also experience the immense benefit of the internet especially during the COVID-19 pandemic. Cyber security awareness and education are central to any attempt to secure cyber space. In the education system, youth must be made aware of the possible attacks and types of intruders. The rapid growth in the use of cyber space is not matched by the necessary skills. Therefore, there is a need for broad-based education initiatives on Internet safety and security to tackle the issues of child protection and social security in general. Cyber security and awareness become a vital issue because promoting awareness would contribute greatly towards cyber security as a whole. An interpretive research approach was adopted using a qualitative research method. The semi-structured interviews were conducted with 37 participants, eight from the SAPS Crime Intelligence Unit. Five participants from Crime Intelligence Unit, which constituted of males, participated in this study and for the youth, the first author interviewed 29 participants, which consisted of 17 female and 12 male participants who were between the ages of 19 to 35 years. The findings indicated that there are currently no existing initiatives in the field of policing cybercrime in South Africa. There are currently no cyber security awareness programmes or preventive techniques by the SAPS targeting the youth. South Africa is still lacking behind in the strategy development regarding cybercrime and cyber security.
APA, Harvard, Vancouver, ISO, and other styles
39

Patel, Dhyan. "Cyber Security: Study on Attack, Threat, Vulnerability." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (2024): 1074–78. http://dx.doi.org/10.22214/ijraset.2024.58472.

Full text
Abstract:
Abstract: The main aim of this research is to examine the various aspects of cyber infrastructure, encompassing both hardware and software systems, networks, enterprise networks, intranets, and the occurrence of cyber intrusions. The paper intends to elucidate the significance of network intrusions and cyber-theft, along with delving into the factors contributing to the proliferation of cybercrime. Furthermore, it provides a comprehensive definition of cyber security and its role in addressing network intrusion and cyber theft, while also exploring the drivers behind the surge in cybercrime and their repercussions. The authors conclude by suggesting preventive measures and potential solutions to mitigate the risks associated with cyber attacks. They emphasize that while technological advancements can aid in minimizing the impact of cyber attacks, human behavior and psychological tendencies remain significant vulnerabilities. Despite this, the authors express optimism in reducing cyber attacks through investment in organizational education campaigns that address psychological susceptibilities.
APA, Harvard, Vancouver, ISO, and other styles
40

Sareen, Dr Anshu, and Shubhangi Jasaiwal. "Need of cyber security education in modern times." International Journal of Multidisciplinary Trends 3, no. 2 (2021): 188–91. http://dx.doi.org/10.22271/multi.2021.v3.i2c.179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ashraf M. Sharif, Amreen, and Jaflah Alammary. "Development of Cyber Security Awareness and Education Framework." International Journal of Computing and Digital Systems 17, no. 1 (2025): 1–13. https://doi.org/10.12785/ijcds/1571048308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Arockiavathy S, Antony, Kavitha R, and Aravind S. "Cyber Security Trends in Education: A Scientometric Study." International Research Journal of Multidisciplinary Scope 05, no. 02 (2024): 265–74. http://dx.doi.org/10.47857/irjms.2024.v05i02.0447.

Full text
Abstract:
This paper presents a study on the quantitative analysis of global research trends in cybersecurity in education, focusing on 136 documents published between 2018 and 2022 retrieved from the Web of Science database. Various quantitative indicators were calculated and tabulated, and different graphs were plotted to understand growth patterns, citations with H-Index, country-wise contributions, affiliations, and other aspects. The study found the United States of America has the highest number of publications on cybersecurity in education research. Based on this, the authors suggest that Indian institutions should prioritize cybersecurity in education and strategize for the future with effective collaborations. The best defense strategy in cyberspace is preventive measures supported by continuous research efforts.
APA, Harvard, Vancouver, ISO, and other styles
43

Urbanovics, Anna, and Peter Sasvari. "Cyber Security Master's degrees in the United Kingdom: a comparative analysis." Central and Eastern European eDem and eGov Days 338 (July 15, 2020): 161–71. http://dx.doi.org/10.24989/ocg.338.13.

Full text
Abstract:
In today’s digitized world, where most of our activities are related to online platforms, the information security has become more essential than ever. Most countries have launched national strategies for the implementation of cyber security. In these, the education and training of information security professionals get particular roles. The National Cyber Security Centre created a common framework for cyber security education in the United Kingdom for the universities offering degrees in information security. The aim of this paper is to examine and compare the British cyber security degrees. The first chapter examines and compares the British universities and degrees from a theoretical aspect, including the necessity of these programs. The second chapter examines the degrees from several aspects based on the data of the Scopus database, with a special focus on the thematic modules, and the academic activities of the 1,650 examined university instructors.
APA, Harvard, Vancouver, ISO, and other styles
44

Arina, Alexei. "Network Security Threats to Higher Education Institutions." Central and Eastern European eDem and eGov Days 341 (March 17, 2022): 323–33. http://dx.doi.org/10.24989/ocg.v341.24.

Full text
Abstract:
The Covid-19 pandemic has significantly changed the way higher education institutions (HEIs) operate around the world. Distance learning has become the unique opportunity that the process further education in conditions where most economic activities were put on hold. To ensure the quality of distance learning have been implemented and used extensively online learning platforms, applications, video conferencing and cloud computing facilities in HEIs. However, this has increased the threats to information security, so that in 2020, in the field of education in general, and HEIs in particular, the number of cyber-attacks has increased, which has led to significant financial losses but also to activity interruption and theft of personal data or intellectual property. In order to identify the biggest threats of the 2020 year, for HEIs, several security reports and scientific articles related to the studied field were analyzed, in order to identify the most common security threats. As a result, of the research conducted, the top Cyber threats of HEIs are: malware attacks, DoS / DDos attacks and phishing attacks. Securing university networks in 2020 was a challenge for specialists in this field.
APA, Harvard, Vancouver, ISO, and other styles
45

Custodio, Eunice Bondoc, and Gilbert Malawit Tumibay. "Cybersecurity for higher education institutions: adopting regulatory framework." Global Journal of Engineering and Technology Advances 2, no. 3 (2020): 016–21. https://doi.org/10.5281/zenodo.4467382.

Full text
Abstract:
Cybersecurity is defined as the protection of networks, data and systems in the cyberspace.&nbsp; It should have the ability to protect or defend an organization&rsquo;s use of cyberspace from any attack, conducted via cyberspace with the intention of disrupting, disabling, destroying, or maliciously controlling a computing environment and even destroying the integrity of the data or stealing controlled information. As the rapid technological developments have provided vast opportunities and potential sources of efficiency to every organization, these new technologies have also brought unprecedented threats and could be a critical issue for every organization. In this study, Phase I delved into the different Cybersecurity frameworks and regulatory environments presented through review of related literature. One of the frameworks is the Cybersecurity Framework released in 2014 by the National Institute of Standards and Technology (NIST). Establishing an internal cyber security policies and procedures, management of cyber security risk and the alignment to international information security standards will be the highlight of the literature review of this study. The Phase II will focus on the design, and analysis of a specific cyber security dealings guided by the standard regulatory framework intended for selected State Universities in Region III in the Philippines. Facing the threat of cyber-attacks, the researchers believed that educational administrators and leaders need to implement the right solutions to protect their resources from cyber threats. All organizations need to understand these cyber threats they face. The challenge now is the establishment of imperative tasks related to preservation of confidentiality, integrity and availability of information in the Cyberspace while facilitating an essential operating function.
APA, Harvard, Vancouver, ISO, and other styles
46

Renaud, Karen, Basie Von Solms, and Rossouw Von Solms. "How does intellectual capital align with cyber security?" Journal of Intellectual Capital 20, no. 5 (2019): 621–41. http://dx.doi.org/10.1108/jic-04-2019-0079.

Full text
Abstract:
Purpose The purpose of this paper is to position the preservation and protection of intellectual capital as a cyber security concern. The paper outlines the security requirements of intellectual capital to help boards of directors (BoDs) and executive management teams to understand their responsibilities and accountabilities in this respect. Design/methodology/approach The research methodology is desk research. In other words, we gathered facts and existing research publications that helped us to define key terms, to formulate arguments to convince BoDs of the need to secure their intellectual capital and to outline actions to be taken by BoDs to do so. Findings Intellectual capital, as a valuable business resource, is related to information, knowledge and cyber security. Hence, preservation thereof is also related to cyber security governance and merits attention from BoDs. Research limitations/implications This paper clarifies BoDs intellectual capital governance responsibilities, which encompass information, knowledge and cyber security governance. Practical implications The authors hope that BoDs will benefit from the clarifications, and especially from the positioning of intellectual capital in cyber space. Social implications If BoDs know how to embrace their intellectual capital governance responsibilities, this will help to ensure that such intellectual capital is preserved and secured. Originality/value This paper extends a previous paper published by Von Solms and Von Solms, which clarified the key terms of information and cyber security, and the governance thereof. The originality and value is the focus on the securing of intellectual capital, a topic that has not yet received a great deal of attention from security researchers.
APA, Harvard, Vancouver, ISO, and other styles
47

Manić, Ljiljana, and Jovan Miljković. "Cyber security of the elderly." Bezbednost, Beograd 64, no. 3 (2022): 120–39. http://dx.doi.org/10.5937/bezbednost2203120m.

Full text
Abstract:
Increasing the share of the elderly in the total population and the increase of the average age of the population is a feature of the demographic picture of Serbia and a process that will continue in the years to come. Although the share of the elderly in the total population is high, their knowledge and use of digital technologies is lower compared to other categories of the population. As a result, people over the age of 65 are at greater risk of digital exclusion, which results in not only social exclusion but also difficult access to public services and the exercise of other rights. Apart from the inadequate level of digital literacy and financial costs, the issues that most often demotivate older people to join the Internet community are related to security, namely financial security, privacy, data protection, the device itself, and other issues related to mental and moral security, personal integrity and physical health. The aim of this paper is to answer the research question: is the issue of cyber security of the elderly subject of Serbian and European adult education policies and how? Aside from scientific sources, legislative documents of the EU and Serbia related to older people and digitalization are also analyzed. The descriptive method was used, and within it the analysis of content, discourse and narrative. The analysis of EU and Serbian legislative documents related to lifelong learning and digitalization shows that the goals of digital education are primarily economic, and the real target group to which the analyzed documents are aimed at are persons under 65 years of age. The security of the elderly in the digital world is currently not a priority in either European or Serbian educational policies. The results of the research indicate that a more intensive and systematic support is needed for the development of digital competencies and security of the elderly on the Internet, and that the creation of educational models for the elderly is a necessary precondition for improving their position and their full participation in different aspects of life.
APA, Harvard, Vancouver, ISO, and other styles
48

Rai, Gulshan. "Instrumental in Setting up of the First Large Scale Education and Research Network in close Collaboration with the Leading Educational and Research Institutions Dr." Global Journal of Enterprise Information System 9, no. 3 (2017): 106. http://dx.doi.org/10.18311/gjeis/2017/17978.

Full text
Abstract:
Cyber security expert Gulshan Rai will now take charge as special secretary for cyber security as the first cyber security chief under the Prime Ministers Office. Before the current appointment he was heading the Computer Emergency Response Team (CERT) at the Department of electronics and information technology (DeitY). Rai’s appointment comes at a time when cyber security assumes importance in the backdrop of growing network intrusions and hacking attempts on not just businesses but also on the government.
APA, Harvard, Vancouver, ISO, and other styles
49

Urbanovics, Anna, and Péter Sasvári. "Az Egyesült Királyságban működő kiberbiztonsági képzésekbe bevont oktatók tudományos teljesítményének elemzése." Információs Társadalom 18, no. 3-4 (2019): 105. http://dx.doi.org/10.22503/inftars.xviii.2018.3-4.5.

Full text
Abstract:
A mai digitalizált világban, amelyben az ügyintézés jelentős része az online felületekhez köthető, az információs rendszerek biztonsága még hangsúlyosabbá vált. A kiberbiztonság megvalósítására több országban állami szinten készítettek átfogó stratégiát, amelyben kiemelkedő szerep jut a kiberbiztonsági szakemberek képzésének. Az Egyesült Királyságban működő Nemzeti Kiberbiztonsági Központ egységes képzési programot alkotott meg azon egyetemek számára, amelyek kiberbiztonságot oktatnak. A dolgozat célja, hogy a brit egyetemek kiberbiztonsági képzéseit vizsgálja és hasonlítsa össze egymással. Az első nagyobb fejezet elméleti megközelítésből szemléli eme brit egyetemeket és azok képzéseit, valamint ez utóbbiak szükségességét. A második fejezet pedig különböző szempontok szerint vizsgálja a képzések tematikáit, kurzusait, tananyagait, valamint a vizsgálatra került 1650 brit oktató tudományos tevékenységét – elsősorban a Scopus adatai alapján. &#x0D; &#x0D; ---&#x0D; &#x0D; Research Activities of Academics Involved in Cyber Security Master’s Degree Programs in the United Kingdom: a Comparative Analysis&#x0D; &#x0D; In today’s digitized world, where most of our activities are related to online platforms, information security has become more essential than ever. Most countries have launched national strategies for the implementation of cyber security. In these, the education and training of information security professionals is accorded specific roles. The National Cyber Security Centre created a common framework for cyber security education in the United Kingdom for the universities offering information security degrees. The aim of this essay is to examine and compare the British cyber security degrees. The first chapter examines and compares the British universities and degrees from a theoretical aspect, including the necessity of these programs. The second chapter examines the degrees from several aspects, with special focus on the thematic, modules, and the academic activities of the 1,650 university instructors who were examined based on the Scopus database.&#x0D; &#x0D; Keywords: cyber security education, National Cyber Security Centre, United Kingdom, Scopus
APA, Harvard, Vancouver, ISO, and other styles
50

Mednikarov, Boyan, Yuliyan Tsonev, Borislav Nikolov, and Andon Lazarov. "Characteristics and Components of the Cyber Hygiene as a Subclass of Cyber Security in Military Environment and Educational Issues." Strategies for Policy in Science and Education-Strategii na Obrazovatelnata i Nauchnata Politika 31, no. 2 (2023): 154–69. http://dx.doi.org/10.53656/str2023-2-3-cha.

Full text
Abstract:
In the present study based on the main characteristics and components of the cyber hygiene as a subclass of the cyber security, educational challenges on the cyber hygiene in military area are considered. Based on institutional experience in the scope of the cyber security in the digital environment, a sequence of activities to keep resilient and reliable cyber hygiene in army organizations are analyzed and recommended. Definitions of basic cyber hygiene characteristics are suggested. Cyber hygiene software issues and institutional information security controls are discussed. A malware infection as main cyber hygiene concern is analyzed. Fundamental cyber hygiene instructions to ensure military Internet users and institutions stay protected are defined. Exemplary curriculum for education of military staff with basic themes is presented.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!