Want to Raise Cybersecurity Awareness? Start with Future IT
Professionals
- URL: http://arxiv.org/abs/2307.07608v1
- Date: Fri, 14 Jul 2023 20:07:27 GMT
- Title: Want to Raise Cybersecurity Awareness? Start with Future IT
Professionals
- Authors: Lydia Kraus, Valdemar \v{S}v\'abensk\'y, Martin Hor\'ak, Vashek
Maty\'a\v{s}, Jan Vykopal, Pavel \v{C}eleda
- Abstract summary: Our university designed an innovative cybersecurity awareness course that is freely available online for students, employees, and the general public.
The course offers simple, actionable steps that anyone can use to implement defensive countermeasures.
To measure the course impact, we administered it to 138 computer science undergraduates within a compulsory information security and cryptography course.
- Score: 0.4893345190925178
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: As cyber threats endanger everyone, from regular users to computing
professionals, spreading cybersecurity awareness becomes increasingly critical.
Therefore, our university designed an innovative cybersecurity awareness course
that is freely available online for students, employees, and the general
public. The course offers simple, actionable steps that anyone can use to
implement defensive countermeasures. Compared to other resources, the course
not only suggests learners what to do, but explains why and how to do it. To
measure the course impact, we administered it to 138 computer science
undergraduates within a compulsory information security and cryptography
course. They completed the course as a part of their homework and filled out a
questionnaire after each lesson. Analysis of the questionnaire responses
revealed that the students valued the course highly. They reported new
learning, perspective changes, and transfer to practice. Moreover, they
suggested suitable improvements to the course. Based on the results, we have
distilled specific insights to help security educators design similar courses.
Lessons learned from this study are relevant for cybersecurity instructors,
course designers, and educational managers.
Related papers
- Cybersecurity Study Programs: What's in a Name? [0.2999888908665658]
Higher education institutions are introducing new cybersecurity programs, attracting students to this expanding field.
Top-ranked universities have not yet fully implemented the guidelines and offer programs that have "cyber" in their name but lack some essential elements of a cybersecurity program.
graduates of these programs may not meet employer expectations and may require additional training.
arXiv Detail & Related papers (2024-11-14T07:14:52Z) - Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report [1.099532646524593]
Training new cybersecurity professionals is a challenging task due to the broad scope of the area.
We propose a solution: integrating a real-world bug bounty programme into cybersecurity curriculum.
We let students choose to participate in a bug bounty programme as an option for the semester assignment in a secure coding course.
arXiv Detail & Related papers (2024-04-18T09:53:49Z) - The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning [87.1610740406279]
White House Executive Order on Artificial Intelligence highlights the risks of large language models (LLMs) empowering malicious actors in developing biological, cyber, and chemical weapons.
Current evaluations are private, preventing further research into mitigating risk.
We publicly release the Weapons of Mass Destruction Proxy benchmark, a dataset of 3,668 multiple-choice questions.
arXiv Detail & Related papers (2024-03-05T18:59:35Z) - knowCC: Knowledge, awareness of computer & cyber ethics between CS/non-CS university students [0.0]
This research focuses on the relations between cybersecurity awareness, cyber knowledge, computer ethics, cyber ethics, and cyber behavior.
The findings express that while internet users are alert of cyber threats, they only take the most elementary and easy-to-implement precautions.
arXiv Detail & Related papers (2023-10-19T12:29:26Z) - Cybersecurity as a Crosscutting Concept Across an Undergrad Computer
Science Curriculum: An Experience Report [1.6317061277457001]
We advocate to integrate cybersecurity as a crosscutting concept in Computer Science curricula.
The security education was incorporated within CS courses using a partnership between the responsible course instructor and a security expert.
We conducted a post-course survey to collect student perceptions, and semi-supervised interviews with responsible course instructors and the security expert to gauge their experience.
arXiv Detail & Related papers (2023-10-11T16:07:42Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Pre-trained Encoders in Self-Supervised Learning Improve Secure and
Privacy-preserving Supervised Learning [63.45532264721498]
Self-supervised learning is an emerging technique to pre-train encoders using unlabeled data.
We perform first systematic, principled measurement study to understand whether and when a pretrained encoder can address the limitations of secure or privacy-preserving supervised learning algorithms.
arXiv Detail & Related papers (2022-12-06T21:35:35Z) - XSS for the Masses: Integrating Security in a Web Programming Course
using a Security Scanner [3.387494280613737]
Cybersecurity education is an important part of undergraduate computing curricula.
Many institutions teach it only in dedicated courses or tracks.
An alternative approach is to integrate cybersecurity concepts across non-security courses.
arXiv Detail & Related papers (2022-04-26T16:20:36Z) - ProtoTransformer: A Meta-Learning Approach to Providing Student Feedback [54.142719510638614]
In this paper, we frame the problem of providing feedback as few-shot classification.
A meta-learner adapts to give feedback to student code on a new programming question from just a few examples by instructors.
Our approach was successfully deployed to deliver feedback to 16,000 student exam-solutions in a programming course offered by a tier 1 university.
arXiv Detail & Related papers (2021-07-23T22:41:28Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.