Social engineering attacks: A survey
F Salahdine, N Kaabouch - Future internet, 2019 - mdpi.com
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …
between humans more accessible and instant. However, personal and sensitive information …
Analysis of cyber security knowledge gaps based on cyber security body of knowledge
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is
required to evaluate the knowledge gap between cyber security education and industrial …
required to evaluate the knowledge gap between cyber security education and industrial …
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security: A Survey of Social Engineering Attacks and Steps for Mitigation of These Attacks
N Yathiraju, G Jakka, SK Parisa, O Oni - … Capabilities in Developing …, 2022 - igi-global.com
Cybersecurity refers to the organizational practices followed by the different multinational
companies to defend their computers, servers, mobile devices, and networks from malicious …
companies to defend their computers, servers, mobile devices, and networks from malicious …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
Evidence-based cybersecurity policy? A meta-review of security control effectiveness
DW Woods, S Seymour - Journal of Cyber Policy, 2023 - Taylor & Francis
Cybersecurity policy should guide firms towards implementing the most effective security
controls and procedures. However, there is no authority that collects evidence and ranks …
controls and procedures. However, there is no authority that collects evidence and ranks …
Bringing cyber to school: Integrating cybersecurity into secondary school education
Based on three one-day workshops with teachers, we identify drivers and barriers for
introducing cybersecurity into secondary school education. We found that students, although …
introducing cybersecurity into secondary school education. We found that students, although …
A study on social engineering attacks in cybersecurity
Due to improvements in data communication technology, humans can communicate with
each other in the world instantly. Private and confidential information available on virtual …
each other in the world instantly. Private and confidential information available on virtual …
Knowledge, skills, and abilities for specialized curricula in cyber defense: Results from interviews with cyber professionals
More specialized cybersecurity education programs are needed to address workforce
needs, but it is unclear which knowledge, skills, and abilities (KSAs) fulfil industry needs. We …
needs, but it is unclear which knowledge, skills, and abilities (KSAs) fulfil industry needs. We …
Practical cybersecurity ethics: mapping CyBOK to ethical concerns
I Flechais, G Chalhoub - Proceedings of the 2023 New Security …, 2023 - dl.acm.org
Research into the ethics of cybersecurity is an established and growing topic of
investigation, however the translation of this research into practice is lacking: there exists a …
investigation, however the translation of this research into practice is lacking: there exists a …
Mirror, mirror, on the wall: What are we teaching them all? Characterising the focus of cybersecurity curricular frameworks
Many cybersecurity curricular frameworks exist, but are they all equal? If a student takes a
course based on one framework, what should they expect to get out of it? Different …
course based on one framework, what should they expect to get out of it? Different …