Academic literature on the topic 'International Journal of Computer Science and Information Security (IJCSIS)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'International Journal of Computer Science and Information Security (IJCSIS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "International Journal of Computer Science and Information Security (IJCSIS)"

1

Bayan, Almulhim, and Alghamdi Rami. "Effective Information Security Awareness Emails." International Journal of Computer Science and Information Technology Research 11, no. 1 (2023): 1–2. https://doi.org/10.5281/zenodo.7505534.

Full text
Abstract:
<strong>Abstract:</strong> What are the factors that affect the awareness emails? How do I know if my emails have been read by the employees or not? How can a department protect critical information resources through efficient awareness? What types of procedures work best for an organization? These types of questions are commonly heard nowadays. Strong security awareness programs are the first line of defence against cybersecurity attacks. Because no matter how many tools an organization uses, there is always room for development. In this paper, we will discuss some of the crucial security awareness aspects that could influence behavioural shifts for the better. <strong>Keywords:</strong> Information security, Human factor, Cybersecurity, Analysis. <strong>Title:</strong> Effective Information Security Awareness Emails <strong>Author:</strong> Bayan Almulhim, Rami Alghamdi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 1, January 2023 - March 2023</strong> <strong>Page No: 1-2</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 05-January-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7505534</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/effective-information-security-awareness-emails</strong>
APA, Harvard, Vancouver, ISO, and other styles
2

Fahad, Jasim Alanezi. "Effective Information Security Policy." International Journal of Computer Science and Information Technology Research 12, no. 4 (2024): 1–4. https://doi.org/10.5281/zenodo.13892941.

Full text
Abstract:
<strong>Abstract:</strong> With the growth of technologies, interconnected systems and digitalization, establishing an effective information security policy becomes a crucial step for organizations toward protecting their data and information asset from unauthorized access, cyber threats, and data breaches. To ensure the policy is both practical and widely adopted, it should be well-structured, aligned with the organization&rsquo;s business objectives and clearly communicated. The key steps to endorse and implement effective information security policy include engaging senior management to help prioritize information security across the organization, align with business goals and risk management strategy, communicate and enforce the policy, and conduct regular review and update. This research paper is going to define the information security policy and how to be effective. Also, it will provide the characteristics of successful information security policy, the associated responsibilities with the entities in the organization and the lifecycle of this policy. <strong>Keywords:</strong><em> </em>Information Security Policy, policy lifecycle, Policy Development, Policy Adoption, publication, responsibilities, characteristics. <strong>Title:</strong> Effective Information Security Policy <strong>Author:</strong> Fahad Jasim Alanezi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 4, October 2024 - December 2024</strong> <strong>Page No: 1-4</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 05-October-2024</strong> <strong>DOI: </strong><strong>https://doi.org/10.5281/zenodo.13892941</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/effective-information-security-policy</strong>
APA, Harvard, Vancouver, ISO, and other styles
3

Siddiqui, Sana Afreen. "Analytical Study on Network Security Breach's." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 300–303. https://doi.org/10.5281/zenodo.3892611.

Full text
Abstract:
Throughout the previous few years, Computer systems were principally utilized by association for correspondence between various divisions. Under these conditions security was not a significant concern and it didnt get part of consideration. Be that as it may, presently, there is an extraordinary effect of between organize job in every single residents life, from Banking &acirc;&euro;&ldquo; Hospitals Education Transportation and so forth. However, presently arrange has sprouted different security concerns. In any case, presently with the expanding utilization of Computer in everyday action there is a serious requirement for robotized devices for securing touchy information and data put away on the Computer. Especially for the situation for a mutual framework, for example, time sharing framework and where the need is significantly increasingly intense for frameworks that is available for an open phone or an information organize. The standard name for the assortment of devices to ensure information and to forestall Hackers is Computer Security . This proposition talk about and depicts spoofing , which is if an aggressor can tune in for a customers ask for and imitate an answer before the genuine location server can, at that point the customer will utilize the data gave by the hacker. This is known as spoofing. Siddiqui Sana Afreen &quot;Analytical Study on Network Security Breach&rsquo;s&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30403.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/30403/analytical-study-on-network-security-breach%E2%80%99s/siddiqui-sana-afreen
APA, Harvard, Vancouver, ISO, and other styles
4

Jumanah, Hasan AlSanad. "Cybersecurity In Education." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 51–61. https://doi.org/10.5281/zenodo.12566761.

Full text
Abstract:
<strong>Abstract</strong><strong>:</strong> In this research, we presented an explanation of the definition of cybersecurity, its importance, and its types. We also explained the difference between information security and cybersecurity, as well as the importance of both. we also mentioned how cyber security is important in the education sector and the Role of training and education in enhancing Cybersecurity. <strong>Keywords:</strong> cybersecurity, information security, education sector. <strong>Title:</strong> Cybersecurity In Education <strong>Author:</strong> Jumanah Hasan AlSanad <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 2, April 2024 - June 2024</strong> <strong>Page No: 51-61</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 27-June-2024</strong> <strong>DOI: https://doi.org/10.5281/zenodo.12566761</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/cybersecurity-in-education</strong>
APA, Harvard, Vancouver, ISO, and other styles
5

Mosaddeque, Ananna, Mantaka Rowshon, Tamim Ahmed, Umma Twaha, and Binso Babu. "The Role of AI and Machine Learning in Fortifying Cybersecurity Systems in the US Healthcare Industry." Inverge Journal of Social Sciences 1, no. 2 (2022): 70–81. https://doi.org/10.63544/ijss.v1i2.101.

Full text
Abstract:
The digital transformation of healthcare has brought about unprecedented advancements, but it has also introduced significant cybersecurity risks. Cyberattacks targeting sensitive patient data, employee information, and critical operational systems are on the rise, demanding innovative and robust security measures. Enter the powerful duo of Artificial Intelligence (AI) and Machine Learning (ML). These cutting-edge technologies offer a powerful arsenal against these cyber threats. AI algorithms can analyse massive datasets from various sources, such as network traffic, user behaviour, and medical device logs, to identify anomalies and detect malicious activity in real-time. This proactive approach allows security teams to swiftly respond to threats, minimizing the impact of cyberattacks and protecting patient safety. Furthermore, AI can leverage threat intelligence from diverse sources, including cybersecurity feeds, social media, and dark web forums, to proactively identify and mitigate emerging threats. This proactive approach empowers healthcare organizations to stay ahead of the curve, anticipating and neutralizing cyberattacks before they can cause significant damage. However, challenges remain. Implementing and maintaining AI/ML-based security solutions requires significant investment, both in terms of infrastructure and skilled personnel. Concerns surrounding data privacy and the potential for algorithmic bias also need careful consideration. Despite these challenges, the potential benefits of AI and ML in healthcare cybersecurity are undeniable. By embracing these technologies, healthcare organizations can enhance patient safety, improve operational efficiency, and build a more secure and resilient future in the face of evolving cyber threats. References Aarav, M., &amp; Layla, R. (2019). Cybersecurity in the cloud era: Integrating AI, firewalls, and engineering for robust protection. International Journal of Trend in Scientific Research and Development, 3(4), 1892-1899. Abie, H. (2019, May). Cognitive cybersecurity for CPS-IoT enabled healthcare ecosystems. In 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT) (pp. 1-6). IEEE. Aitazaz, F. (2018). Fortifying technology: Computer science solutions for cyber-attacks and cloud security. Alabdulatif, A., Khalil, I., &amp; Saidur Rahman, M. (2020). Security of blockchain and AI-empowered smart healthcare: Application-based analysis. Applied Sciences, 12(21), 11039. Alizai, S. H., Asif, M., &amp; Rind, Z. K. (2021). Relevance of Motivational Theories and Firm Health. Management (IJM), 12(3), 1130-1137. Asif, M. (2021). Contingent Effect of Conflict Management towards Psychological Capital and Employees’ Engagement in Financial Sector of Islamabad. Preston University, Kohat, Islamabad Campus. Bellamkonda, S. (2020). Cybersecurity in critical infrastructure: Protecting the foundations of modern society. International Journal of Communication Networks and Information Security, 12, 273-280. Bibi, P. (2020). AI-powered cybersecurity: Advanced database technologies for robust data protection. Chintala, S. (2020). Data privacy and security challenges in AI-driven healthcare systems in India. Journal of Data Acquisition and Processing, 37(5), 2769-2778. Chirra, D. R. (2021). Mitigating ransomware in healthcare: A cybersecurity framework for critical data protection. Revista de Inteligencia Artificial en Medicina, 12(1), 495-513. Chirra, D. R. (2021). Secure edge computing for IoT systems: AI-powered strategies for data integrity and privacy. Revista de Inteligencia Artificial en Medicina, 13(1), 485-507. Cooper, M. (2020). AI-driven early threat detection: Strengthening cybersecurity ecosystems with proactive cyber defense strategies. Elijah Roy, R. (2021). Harnessing AI and machine learning for enhanced security in cloud infrastructures. International Journal of Advanced Engineering Technologies and Innovations, 1(3), 14-28. Fatima, S. (2020). Fortifying the future: Advanced cybersecurity tactics for cloud platforms and device security. Hussain, A. H., Hasan, M. N., Prince, N. U., Islam, M. M., Islam, S., &amp; Hasan, S. K. (2021). Enhancing cyber security using quantum computing and artificial intelligence: A. Hussain, Z., &amp; Khan, S. (2021). AI and cloud security synergies: Building resilient information and network security circulation ecosystems. IBRAHIM, A. (2019). AI armory: Empowering cybersecurity through machine learning. Jimmy, F. (2021). Emerging threats: The latest cybersecurity risks and the role of artificial intelligence in enhancing cybersecurity defenses. Valley International Journal Digital Library, 564-574. Kasula, B. Y. (2017). Machine learning unleashed: Innovations, applications, and impact across industries. International Transactions in Artificial Intelligence, 1(1), 1-7. Maddireddy, B. R., &amp; Maddireddy, B. R. (2021). Enhancing endpoint security through machine learning and artificial intelligence applications. Revista Espanola de Documentacion Cientifica, 15(4), 154-164. Nimmagadda, V. S. P. (2021). Artificial intelligence and block chain integration for enhanced security in insurance: Techniques, models, and real-world applications. African Journal of Artificial Intelligence and Sustainable Development, 1(2), 187-224. Raza, H. (2021). Proactive cyber defense with AI: Enhancing risk assessment and threat detection in cybersecurity ecosystems. Reddy, A. R. P. (2021). The role of artificial intelligence in proactive cyber threat detection in cloud environments. Neuro Quantology, 19(12), 764-773. Shah, V. (2021). Machine learning algorithms for cybersecurity: Detecting and preventing threats. Revista Espanola de Documentacion Cientifica, 15(4), 42-66. Shukla, A. (2021). Leveraging AI and ML for advance cyber security. Journal of Artificial Intelligence &amp; Cloud Computing. SRC/JAICC-154. DOI: doi.org/10.47363/JAICC/2021 (1), 142, 2-3. Waqas, M., Tu, S., Halim, Z., Rehman, S. U., Abbas, G., &amp; Abbas, Z. H. (2020). The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges. Artificial Intelligence Review, 55(7), 5215-5261. Zygun, D. (2020). Cyber-attack resilience: Fortifying devices and cloud systems with computer science innovations.
APA, Harvard, Vancouver, ISO, and other styles
6

Ahangar, Adele, AlHawaeji Fahima Bab, Beheshti Moluksadat Hosseini, Najala Hariri, and Maryam Khademi. "Mapping and Analyzing the Conceptual Network Structure in the Field of Information Security." Journal of Information Processing and Management 37, no. 2 (2021): 473–96. https://doi.org/10.5281/zenodo.14039504.

Full text
Abstract:
Today, with the expansion of semantic web services, the need for search engines to utilize conceptual networks and domain ontologies for logical inference and reasoning from user queries, as well as for optimal (accurate and relevant) retrieval, is increasing. This applied research aims to analyze the structure of the conceptual network in the field of information security, and its domain structure was discovered through combined methods of co-occurrence analysis of keywords and social network analysis. The statistical population of this study consists of 10,227 scientific documents in the field of information security, including books, journal articles, and conference papers at the international level, sourced from the Scopus and Web of Science databases during the years 2013-2017. For preprocessing keywords and tags, the Zotero software was used, while Excel was employed to match them with information security and computer science vocabularies. For visualization and analysis of thematic networks, VosViewer and Gephi were utilized.&nbsp; By examining 19,648 keywords and tags, 207 keywords were extracted based on the latest version of the information security vocabulary. The findings of the study revealed that this network consists of 14 clusters: 5 mature clusters, 7 semi-mature clusters, and 2 immature clusters, indicating that the conceptual network in the field of information security has good coherence and density. The concepts of "security," "information security," "information systems," "privacy," "information," "telecommunications," "cryptography," "encryption," "authentication," "cybersecurity," "network," "cloud computing," "security attacks," "access control," "intrusion detection systems," "security protocols," "risk," "risk management and its frameworks," and "access level agreements" are among the most important concepts in this network, possessing the highest betweenness centrality. The nature of their interconnections and internal links is direct.
APA, Harvard, Vancouver, ISO, and other styles
7

VivekThoutam. "Architectures of Intelligent Systems in Engineering." Biolife 8, no. 4 (2022): 8–14. https://doi.org/10.5281/zenodo.7407829.

Full text
Abstract:
<strong>ABSTRACT</strong> Artificial Intelligence (AI) has come a long way coming from its early roots, steered through dedicated scientists. AI truly started to intrigue analysts with the development of the personal computer in 1943. Modern technology eventually appeared, to simulate intelligent actions. Over the next 4 years, even with numerous stumbling blocks, AI has grown from a lots scientists to 1000s of engineers as well as professionals; and coming from courses with the ability to play checkers, to bodies created to diagnose disease, skilled safety and security devices as well as the similarity it. <strong>Key words:</strong>Artificial Intelligence, Intelligent systems, architectures. <strong>REFERENCES</strong> C. Sampada,, et al, &quot;Adaptive Neuro-Fuzzy Intrusion Detection Systems&quot;, Proceedings: International Conference on Information Technology: Coding and Computing (ITCC"04),2004. Daniel B. Neill, &ldquo;Using Artificial Intelligence to Improve Hospital Inpatient Care&rdquo;. Daniel&nbsp;&nbsp; E.O."Leary&nbsp;&nbsp; Artificial&nbsp;&nbsp; Intelligence&nbsp;&nbsp; and&nbsp;&nbsp; Expert System in Accounting Databases: Survey and Extensions&rdquo;, Expert Systems with Applications, vol-3, 1991. FataiAdesinaAnifowose, SafiriyuIbiyemiEludiora, &ldquo;Application of Artificial Intelligence in Network Intrusion Detection&rdquo;, World Applied Programming, Vol (2), No (3), March 2012. F.D. Laramee, Genetic Algorithms: Evolving the Perfect Troll, AI Game Programming Wisdom, Charles River Media, Inc., Hingham, MA, 2002 VivekThoutam, &ldquo;An Overview On The Reference Model And Stages Of lot Architecture&rdquo;, &ldquo;Journal of Artificial Intelligence, Machine Learning and Neural Network&rdquo;, Vol 01, No 01, Aug-Sept 2021 VivekThoutam, &ldquo;A Study On Python Web Application Framework&rdquo;, &ldquo;Journal of E1ectronics, Computer Networking and Applied mathematics&rdquo;, Vol 01 , No 01, Aug-Sept 2021 VivekThoutam, &ldquo;Physical Design, Origins And Applications Of lot&rdquo;, Journal of Multidisciplinary Cases, Vol 01 , No 01 , Aug-Sept 2021 Swapna Gurrapu and Estari Mamidala. In vitro HIV-Reverse Transcriptase Inhibition of Andrographolide Isolatedfrom Andrographis Paniculata. European Journal of Biomedical and Pharmaceutical Sciences. 2017. Volume 4, Issue 12. 516-522. AnumandlaMounika, &ldquo;Process Of Migrating Into a Cloud And Issues In Cloud Computing&rdquo;, Journal of Interdisciplinary Cycle Research, Volume 2, Issue 1, January-June-2010 AnumandlaMounika, &ldquo;Security And Privacy Issue Towards Data Security In Cloud Computing&rdquo;, JASC: Journal of Applied Science and Computations, Volume 1, Issue 1, January-June2014 AnumandlaMounika, &ldquo;Technical Benefits And Architecting Cloud Applications In The Aws Cloud&rdquo;, Parishodh Journal, Volume VIII, Issue III, March-2019 AnumandlaMounika, &ldquo;a Study On Cloud Computing Strategy Planning And Sla Management In Cloud&rdquo;, International Journal of Research, Volume 7, Issue VII, JULY2018 VivekThoutam, &ldquo;ModelsAnd Algorithms Of Artificial Intelligence&rdquo;, International Journal of Management, Technology And Engineering, Volume X, Issue XI, NOVEMBER 2020 VivekThoutam, &ldquo;Machine Learning Vs Artificial Intelligence&rdquo;, International Journal of Scientific Research in Science and Technology, Volume 6, Issue 4, July-August-2019 VivekThoutam, &ldquo;Unique Security Challenges of IoT Devices and Spectrum of Security Considerations&rdquo;, Journal of Artificial Intelligence, Machine Learning and Neural Network, Vol 01, No. 2, Oct-Nov 2021 VivekThoutam, &ldquo;Artificial Intelligence And Machine Learning In Regulatory Compliance And Supervision&rdquo;, JASC: Journal of Applied Science and Computations, Volume VII, Issue V, May2020 VivekThoutam, &ldquo;IoT Clod Convergence, Emerging Economy and Development Issues&rdquo;, Journal of Environmental Impact and Management Policy, Vol 01, No 02, 2021 VivekThoutam, &ldquo;A comprehensive review on communication enablers and communication models of IoT&rdquo;, Journal of Community phramacy practice, Vol 1, No 2, 2021 VivekThoutam, &ldquo;Pros and Cons of Artificial Intelligence&rdquo;, Journal of Emerging Technologies and Innovative Research, volume 2, Issue 12, December 2015. VivekThoutam, &ldquo;Difficulties with Missing Data in Different Applications&rdquo;, Journal of Emerging Technologies and Innovative Research, volume 5, Issue 6, June 2018
APA, Harvard, Vancouver, ISO, and other styles
8

MD, Shahnawaz Sakib, Danyaal Muhammad, and Bo Lili. "Hardware System Security: A Comprehensive Approach." International Journal of Computer Science and Information Technology Research 13, no. 1 (2025): 1–3. https://doi.org/10.5281/zenodo.14631605.

Full text
Abstract:
<strong>Abstract:</strong> In today&rsquo;s digital landscape, safeguarding sensitive data and critical systems from hardware-based threats is crucial. This research proposes a multi-layered security framework to defend against physical attacks, supply chain vulnerabilities, and side-channel attacks. The framework integrates hardware-based security mechanisms, software countermeasures, and rigorous security management practices to provide comprehensive protection. <strong>Keywords:</strong> Hardware System Security, digital landscape, critical systems, multi-layered security. Framework. <strong>Title:</strong> Hardware System Security: A Comprehensive Approach <strong>Author:</strong> MD Shahnawaz Sakib, Muhammad Danyaal, Lili Bo <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 13, Issue 1, January 2025 - March 2025</strong> <strong>Page No: 1-3</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 11-January-2025</strong> <strong>DOI: https://doi.org/10.5281/zenodo.14631605</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/hardware-system-security-a-comprehensive-approach</strong>
APA, Harvard, Vancouver, ISO, and other styles
9

Dr., E. J. Thomson Fedrik, Vinitha A., and Vanitha B. "Review on Vulnerabilities of IoT Security." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1117–19. https://doi.org/10.31142/ijtsrd24020.

Full text
Abstract:
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha &quot;Review on Vulnerabilities of IoT Security&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
APA, Harvard, Vancouver, ISO, and other styles
10

Johara, Al Jarri, Alharthi Danyah, and Alquraishi Mashael. "Security Implications of Serverless Computing in the Cloud." International Journal of Computer Science and Information Technology Research 12, no. 3 (2024): 1–4. https://doi.org/10.5281/zenodo.12634327.

Full text
Abstract:
<strong>Abstract:</strong> The promise of easier development, scalability, and cost-effectiveness has made serverless computing quite popular in recent years. But this fundamental change in the architecture of cloud computing brings new security concerns. The security implications of serverless computing are examined in this paper, along with potential threats, weaknesses, and best practices to improve the overall security posture in a serverless computing. <strong>Keywords:</strong> Serverless, Function As A service, FaaS, Vulnerabilities, Security. <strong>Title:</strong> Security Implications of Serverless Computing in the Cloud <strong>Author:</strong> Johara Al Jarri, Danyah Alharthi, Mashael Alquraishi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 3, July 2024 - September 2024</strong> <strong>Page No: 1-4</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 03-July-2024</strong> <strong>DOI: https://doi.org/10.5281/zenodo.12634327</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/security-implications-of-serverless-computing-in-the-cloud</strong>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "International Journal of Computer Science and Information Security (IJCSIS)"

1

Koblitz, Neal. Towards a Quarter-Century of Public Key Cryptography: A Special Issue of DESIGNS, CODES AND CRYPTOGRAPHY An International Journal. Volume 19, No. 2/3 (2000). Springer US, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "International Journal of Computer Science and Information Security (IJCSIS)"

1

Østby, Grethe, Bjørn Emil Selebø, and Stewart Kowalski. "Training the Trainers for Cybersecurity Exercises - Developing EXCON-teams." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003725.

Full text
Abstract:
In recent years there has been a large increase in advanced computer attacks targeting Norwegian authorities and businesses (PST, 2021). At the same time there is a great shortage of trained and qualified personnel within cyber- and information security (Cisco, 2018). To fill this demand supply gap there has been an increased focus to educate new personnel through exercises and training (Nikolova, 2017). To meet this increased demand the Norwegian government in cooperation with several private and public organizations and academia established the Norwegian Cyber Range (NCR) in 2018 (NTNU, 2019). NCR is an arena for testing, training, and exercising in cyber- and information security. Running the training and exercises in a realistic and safe environment is a demanding task, which requires a well-trained Exercise Control (EXCON) team. In a military context NATO’s Bilateral Strategic Command (BI-SC) Directive 75-003 – Collective Training and Evaluation appendix H;” Roles and responsibilities of the exercise control (EXCON)” (NATO, 2013), provides a clear plan for how to establish an EXCON team that can properly direct and control an exercise (NATO, 2013, pg. 166). In addition, Østby et. al have suggested how to build an EXCON team to train public emergency organizations (Østby et al., 2019). Neither of these specify how the EXCON-team itself should be trained. In this paper we present results from in-depth interviews which were conducted with information security and/or exercise experts from different Norwegian organizations with relevant EXCON experience, and suggest a future train-the trainer concept to meet the challenges found in the study.The result from the research shows that the development of exercise control teams is not prioritized by organizations, and not given time or resources for education or team development. Being part of an exercise control teams is a side job where organizations mostly rely on hiring external experts. Another key finding in this research is the importance of exercise planning competence amongst the exercise control team, for the exercises to be successfully executed. Results also shows that a core team of experts is necessary to continuously improve the exercises, and also the need for these experts participating in the preparation for exercises.References:Cisco. (2018). Annual cyber security report.NATO. (2013). Resilient e-Communications Networks Good Practice Guide on National Exercises Enhancing the Resilience of Public Communications Networks Good Practice Guide on Exercises 2 Good Practice Guide on National Exercises. http://www.enisa.europa.eu/act/resNikolova, I. (2017). Best Practice for Cybersecurity Capacity Building in Bulgaria’s Public Sector. Information &amp; Security: An International Journal, 38, 79–92. https://doi.org/10.11610/isij.3806NTNU. (2019). The Norwegian Cyber Range. https://www.ntnu.no/ncrØstby, G., Lovell, K. N., &amp; Katt, B. (2019). EXCON teams in cyber security training. Proceedings - 6th Annual Conference on Computational Science and Computational Intelligence, CSCI 2019, 14–19. https://doi.org/10.1109/CSCI49370.2019.00010PST 2021, (2021). https://www.pst.no/alle-artikler/trusselvurderinger/nasjonal-trusselvurdering-2021/
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!