The United States Air Force and Department of Defense continues to rely on its total workforce to provide the first layer of protection against cyber intrusion. Prior research has shown that the workforce is not adequately educated to perform this task. As a result, DoD cybersecurity strategy now includes attempting to improve education and training on cyber-related concepts and technical skills to all users of DoD networks. This paper describes an experiment designed to understand the broad methods that non-expert users may use to educate themselves on how to perform technical tasks. Preliminary results informed subsequent experiments that directly compared frequently utilized, but flawed resources to improved versions of those resources t...
The critical shortage of cybersecurity talent urged the President of the United States to issue the ...
The people responsible for building the IT products and infrastructure of tomorrow – today’s student...
Network security analysis has evolved as cyber threats have grown and adapted to new technologies an...
The development and integration of computer systems into today’s society and the subsequent growth o...
The Internet has created many new technology advances that make everyday life easier and more effici...
A recent study by Cybersecurity Ventures (Morgan 2018), predicts that 3.5 million cybersecurity jobs...
Cyberspace is the digital communications network that supports the internet of battlefield things (I...
Development of information technology and the globalization require constant investment in people. N...
The US Department of Defense defines cyberspace as a “domain characterized by the use of electronics...
As society advances in terms of information technology, the dependency on cyber secure systems incre...
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the thr...
This thesis assesses and expands the potential of extracurricular activities to address the shortage...
BIGBADABOOM-2. That's the name of a recent cybersecurity breach affecting 5 million stolen credit ca...
The frequency of cyberattacks against governments has increased at an alarming rate and the lack of ...
The authors may share the final published article on public non-commercial sites in the terms of the...
The critical shortage of cybersecurity talent urged the President of the United States to issue the ...
The people responsible for building the IT products and infrastructure of tomorrow – today’s student...
Network security analysis has evolved as cyber threats have grown and adapted to new technologies an...
The development and integration of computer systems into today’s society and the subsequent growth o...
The Internet has created many new technology advances that make everyday life easier and more effici...
A recent study by Cybersecurity Ventures (Morgan 2018), predicts that 3.5 million cybersecurity jobs...
Cyberspace is the digital communications network that supports the internet of battlefield things (I...
Development of information technology and the globalization require constant investment in people. N...
The US Department of Defense defines cyberspace as a “domain characterized by the use of electronics...
As society advances in terms of information technology, the dependency on cyber secure systems incre...
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the thr...
This thesis assesses and expands the potential of extracurricular activities to address the shortage...
BIGBADABOOM-2. That's the name of a recent cybersecurity breach affecting 5 million stolen credit ca...
The frequency of cyberattacks against governments has increased at an alarming rate and the lack of ...
The authors may share the final published article on public non-commercial sites in the terms of the...
The critical shortage of cybersecurity talent urged the President of the United States to issue the ...
The people responsible for building the IT products and infrastructure of tomorrow – today’s student...
Network security analysis has evolved as cyber threats have grown and adapted to new technologies an...