Cultivating Cybersecurity: Designing a Cybersecurity Curriculum for the Food and Agriculture Sector
- URL: http://arxiv.org/abs/2503.16292v1
- Date: Thu, 20 Mar 2025 16:17:11 GMT
- Title: Cultivating Cybersecurity: Designing a Cybersecurity Curriculum for the Food and Agriculture Sector
- Authors: George Grispos, Logan Mears, Larry Loucks, William Mahoney,
- Abstract summary: Many farmers and food producers lack the cybersecurity education they require to identify and mitigate the growing number of threats and risks impacting the industry.<n>This paper presents an ongoing research effort describing a cybersecurity initiative to educate various populations in the farming and agriculture community.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As technology increasingly integrates into farm settings, the food and agriculture sector has become vulnerable to cyberattacks. However, previous research has indicated that many farmers and food producers lack the cybersecurity education they require to identify and mitigate the growing number of threats and risks impacting the industry. This paper presents an ongoing research effort describing a cybersecurity initiative to educate various populations in the farming and agriculture community. The initiative proposes the development and delivery of a ten-module cybersecurity course, to create a more secure workforce, focusing on individuals who, in the past, have received minimal exposure to cybersecurity education initiatives.
Related papers
- Llama-3.1-FoundationAI-SecurityLLM-Base-8B Technical Report [50.268821168513654]
We present Foundation-Sec-8B, a cybersecurity-focused large language model (LLMs) built on the Llama 3.1 architecture.
We evaluate it across both established and new cybersecurity benchmarks, showing that it matches Llama 3.1-70B and GPT-4o-mini in certain cybersecurity-specific tasks.
By releasing our model to the public, we aim to accelerate progress and adoption of AI-driven tools in both public and private cybersecurity contexts.
arXiv Detail & Related papers (2025-04-28T08:41:12Z) - Frontier AI's Impact on the Cybersecurity Landscape [42.771086928042315]
This paper presents an in-depth analysis of frontier AI's impact on cybersecurity.
We first define and categorize the marginal risks of frontier AI in cybersecurity.
We then systemically analyze the current and future impacts of frontier AI in cybersecurity.
arXiv Detail & Related papers (2025-04-07T18:25:18Z) - Investigating The Implications of Cyberattacks Against Precision Agricultural Equipment [0.0]
This paper attempts to quantify the cybersecurity risks associated with cyberattacks on farming equipment that utilize CAN bus technology.<n>It presents a hypothetical case study, using real-world data, to illustrate the specific and wider impacts of a cyberattack on a CAN bus-driven fertilizer applicator.
arXiv Detail & Related papers (2025-03-20T16:10:35Z) - A Review of Cybersecurity Incidents in the Food and Agriculture Sector [2.0358239640633737]
This manuscript reviews disclosed and documented cybersecurity incidents in the Food & Agriculture (FA) sector.
Thirty cybersecurity incidents were identified, which took place between July 2011 and April 2023.
The need for AI assurance in the FA sector is explained, and the Farmer-Centered AI (FCAI) framework is proposed.
arXiv Detail & Related papers (2024-03-12T19:15:20Z) - A Safe Harbor for AI Evaluation and Red Teaming [124.89885800509505]
Some researchers fear that conducting such research or releasing their findings will result in account suspensions or legal reprisal.
We propose that major AI developers commit to providing a legal and technical safe harbor.
We believe these commitments are a necessary step towards more inclusive and unimpeded community efforts to tackle the risks of generative AI.
arXiv Detail & Related papers (2024-03-07T20:55:08Z) - The New Frontier of Cybersecurity: Emerging Threats and Innovations [0.0]
The research delves into the consequences of these threats on individuals, organizations, and society at large.
The sophistication and diversity of these emerging threats necessitate a multi-layered approach to cybersecurity.
This study emphasizes the importance of implementing effective measures to mitigate these threats.
arXiv Detail & Related papers (2023-11-05T12:08:20Z) - Empowering Agrifood System with Artificial Intelligence: A Survey of the Progress, Challenges and Opportunities [86.89427012495457]
We review how AI techniques can transform agrifood systems and contribute to the modern agrifood industry.
We present a progress review of AI methods in agrifood systems, specifically in agriculture, animal husbandry, and fishery.
We highlight potential challenges and promising research opportunities for transforming modern agrifood systems with AI.
arXiv Detail & Related papers (2023-05-03T05:16:54Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Global Pandemics Influence on Cyber Security and Cyber Crimes [5.8010446129208155]
COVID-19 has caused widespread damage across many areas of life and has made humans more dependent on the internet and technology.
This paper examines the different types of security threats and cyber crimes that people faced in the pandemic time and the need for a safe and secure cyber infrastructure.
arXiv Detail & Related papers (2023-02-24T05:26:42Z) - Emerging Technology and Policy Co-Design Considerations for the Safe and
Transparent Use of Small Unmanned Aerial Systems [55.60330679737718]
The rapid technological growth observed in the sUAS sector has left gaps in policies and regulations to provide for a safe and trusted environment in which to operate these devices.
From human factors to autonomy, we recommend a series of steps that can be taken by partners in the academic, commercial, and government sectors to reduce policy gaps introduced in the wake of the growth of the sUAS industry.
arXiv Detail & Related papers (2022-12-06T07:17:46Z) - Towards a Cybersecurity Testbed for Agricultural Vehicles and
Environments [0.0]
An increasing number of agricultural systems and vehicles are connected to the Internet.
Previous research has focused on general cybersecurity concerns in the farming and agricultural industries.
This paper presents STAVE - a Security Testbed for Agricultural Vehicles and Environments.
arXiv Detail & Related papers (2022-05-12T03:27:06Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.