National Cyber Summit (NCS) Research Track 2021
- Length: 185 pages
- Edition: 1
- Language: English
- Publisher: Springer
- Publication Date: 2021-08-10
- ISBN-10: 303084613X
- ISBN-13: 9783030846138
- Sales Rank: #0 (See Top 100 Books)
This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit’s Research Track, reporting on latest advances on topics ranging from software security to cyber-attack detection and modelling to the use of machine learning in cyber security to legislation and policy to surveying of small businesses to cyber competition, and so on. Understanding the latest capabilities in cyber security ensures users and organizations are best prepared for potential negative events. This book is of interest to cyber security researchers, educators and practitioners, as well as students seeking to learn about cyber security.
Preface Organization Organizing Committee General Chairs Program Committee Chairs Program Committee and External Reviewers Program Committee Members External Reviewers Contents Cyber Security Education An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building 1 Introduction 2 Literature Review 3 The Cyberpassport System 3.1 System Design 3.2 Implementation 4 Usability Testing 5 Discussion 6 Conclusions References Simulating Industrial Control Systems Using Node-RED and Unreal Engine 4 1 Introduction 2 Industrial Control System Problems 3 Industrial Control System Prototypes Within Educational Modules - CyberForce Competition™ 4 Proposed Research Solution 4.1 Node-RED Software 4.2 Modeling 4.3 Wind Turbine Simulation 5 Future Research 6 Conclusion References Student Educational Learning Experience Through Cooperative Research 1 Introduction 2 Relevant Research 3 Methodology 4 Results 5 Summary 6 Future Work References Digital Forensics Education: Challenges and Future Opportunities 1 Introduction 2 Digital Forensics 2.1 The Multidisciplinary Nature of Digital Forensics 2.2 Topics in Digital Forensics Education 3 Discussion 3.1 Understanding Gaps Between Topics Taught and Emerging Trends 3.2 Challenges in Developing Digital Forensic Education Programs 3.3 Implications to Policy Makers and Higher Education 4 Conclusion A Appendix References Designing a Cybersecurity Curriculum Library: Best Practices from Digital Library Research 1 The Need for a Cybersecurity Digital Library 2 What Makes a Successful Digital Library? 3 CLARK - Cybersecurity Curriculum Library 3.1 The CLARK Curriculum Model 3.2 The CLARK System 4 Future Directions 4.1 Outreach and Innovation 4.2 Cyber Range 4.3 National Cyber Academy 5 Summary References Design of a Virtual Cybersecurity Escape Room 1 Introduction 1.1 Motivation 1.2 Problem Description 2 Literature Review 2.1 Benefits of Gamification 2.2 Benefits of Physical Escape Rooms 2.3 Benefits of a Virtual Cybersecurity Learning Environment 2.4 Artifact Requirements 3 Artifact Design and Development 3.1 Virtual Cybersecurity Escape Room Concept Map 3.2 Design/Refine of a Mental Model 3.3 Model Prototyping 4 Demonstration and Evaluation 5 Contribution, Limitations, and Future Work References Cyber Security Technology A Novel Method for the Automatic Generation of JOP Chain Exploits 1 Introduction 2 Related Work 2.1 Code-Reuse Attacks 2.2 Jump-Oriented Programming 2.3 Automatic Generation of ROP Chains 2.4 Code-Reuse Mitigations 3 Design and Evaluation of JOP ROCKET 3.1 Design of the JOP ROCKET 3.2 Discovery of Dispatcher Gadgets and Functional Gadgets 3.3 Classification of JOP Gadgets 3.4 Automatic JOP Chain Generation 3.5 Evaluation Criteria for JOP ROCKET 4 Evaluation Results and Contributions 4.1 Validity and Reliability of Results 4.2 Satisfying Design Science Requirements 4.3 Contributions 4.4 Practical Contributions 5 Final Remarks References Increasing Log Availability in Unmanned Vehicle Systems 1 Introduction 2 Background 2.1 Target System 2.2 Blockchain 2.3 Consensus 2.4 Protocol Requirements 3 Unmanned Vehicle System Logging Protocol (UVSLP) 3.1 Block Generation and Commitment 3.2 Blockchain Reconcile 4 Verification 4.1 Monterey Phoenix Behavioral Modeling 4.2 Full Implementation Testing 5 Conclusion and Implications References Testing Detection of K-Ary Code Obfuscated by Metamorphic and Polymorphic Techniques 1 Introduction 2 Background 2.1 Malware Detection Methods 2.2 Techniques of Malware to Avoid Detection 3 Our Methods 3.1 Implementation of Our K-Ary Program 3.2 Implementation of Anomaly-Based Malware Detection 4 Results 5 Conclusions and Future Work References Enhancing Secure Coding Assistant System with Design by Contract and Programming Logic 1 Introduction 2 Background and Related Work 2.1 Design by Contract 2.2 Secure Coding Assistant 2.3 Subcontractor 3 The Enhancement to Secure Coding Assistant 3.1 Goal 3.2 Functionality 3.3 Workflow 3.4 Implementation 4 Examples 5 Conclusion and Future Work References Social Engineering Attacks in Healthcare Systems: A Survey 1 Introduction 1.1 Cybersecurity Issues in Telehealth 2 Use of IoT in Healthcare 3 Social Engineering Attacks 3.1 Common Social Engineering Attacks 3.2 Social Engineering Attacks in Healthcare Systems 4 Handling Social Engineering Attacks 4.1 Tactics for Prevention 4.2 Using Automated Solutions 4.3 Use of Machine Learning to Detect Social Engineering Attacks 5 Summary References Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots 1 Introduction 2 Previous Work 3 Experiments 3.1 Design of Phases 1–2 3.2 Changes to the Conpot and GridPot Servers 3.3 Phases 1–2 Deployment 3.4 Phases 3–5 Deployment 3.5 Data Analysis Methods 4 Results 4.1 Network Scanning 4.2 Compromises in Phase 2 4.3 Overall Comparison of the Phases 5 Conclusions and Future Work References Risks of Electric Vehicle Supply Equipment Integration Within Building Energy Management System Environments: A Look at Remote Attack Surface and Implications 1 Introduction 1.1 Technical Background 2 EVSE Vulnerability Analysis Methodology 3 EVSE Findings 4 Risks of Exploitation 5 Expanding the EVSE Threat Model to Include BEMS/BMS 6 Conclusions 7 Future Research References Author Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.