Evaluation of a complementary cyber education program for a pathophysiology class.
Yoo, Ji-Soo; Ryue, Sook-Hee; Lee, Jung Eun; Ahn, Jeong-Ah
2009-12-01
The goal of this study was to develop and evaluate a complementary cyber education program for a required pathophysiology class for nursing students. The cyber education program comprised electronic bulletin boards, correspondence material storage, an announcement section, a report submission section, reference sites, and statistics on learning rates. Twelve online lectures complemented five lectures in the classroom. To evaluate the course's educational effectiveness, we performed an online objective questionnaire and an open questionnaire survey anonymously, and compared the complementary cyber education program with traditional classroom education. The complementary cyber education program effected significant improvements in scores for importance with regard to major, clarity of goals and education plans for courses, professor readiness, preciseness and description of lectures, amount and efficiency of assignments, and fairness in appraisal standards compared with the traditional classroom education group. This study indicates that a complementary cyber education program provides nursing students with the flexibility of time and space, the newest information through updated lectures, efficient motivational aids through intimacy between the lecturer and students, and concrete and meaningful tasks. The complementary cyber education course also increased student effort toward studying and student satisfaction with the class.
2009-01-01
objectives. The Air Force is struggling to determine the best way of developing offensive and defensive capabilities for cyber warfare . Our warfighting...education (IDE) cyber warfare program at the Air Force Institute of Technology (AFIT), located at Wright-Patterson AFB, Ohio. I propose that the Air...Force create a two-year professional military education (PME) path consisting of ACSC followed by AFIT’s cyber warfare program, paralleling the current path of ACSC followed by SAASS.
Self-Development for Cyber Warriors
2011-11-10
Aggressive self-development is a critical task for the cyber warfare professional. No matter the quality, formal training and education programs age...Books and Science Fiction); Technology and Cyber-Related Magazines and Blogs; Specific Cyber Warfare Journal and Magazine Articles; Key Documents on...the strengths and weaknesses of the major donor career fields to the cyber workforce, and a Self-Assessment of Cyber Domain Expertise for readers who wish to assess their own cyber warfare expertise.
ERIC Educational Resources Information Center
Liu, Wei
2012-01-01
This is an evaluative research study of a NSF-funded, DRK-12 cyber-enabled teacher professional development program in elementary engineering education. The finding shows the significant impact of the program on students' science and engineering knowledge in the second year of the program's implementation. However, student learning gain…
ERIC Educational Resources Information Center
Rursch, Julie A.; Luse, Andy; Jacobson, Doug
2010-01-01
The IT-Adventures program is dedicated to increasing interest in and awareness of information technology among high school students using inquiry-based learning focused on three content areas: cyber defense, game design programming, and robotics. The program combines secondary, post-secondary, and industry partnerships in educational programming,…
Electronic Warfare for Cyber Warriors
2008-06-01
This research paper provides complete course content for the AFIT EENG 509, Electronic Warfare class. It is intended as a replacement for the existing course and designed for Intermediate Developmental Education (IDE) students in the Cyber Warfare degree program. This course provides relevant academic courseware and study material to give cyber warriors an academic and operational perspective on electronic warfare and its integration in the cyber domain.
Software Acquisition in the Age of Cyber Warfare
2011-05-01
s c h o o l o f S Y S T E M S a n d L O G I S T I C S education service research Software Acquisition in the Age of Cyber Warfare Maj...DATE MAY 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Acquisition in the Age of Cyber Warfare 5a...AFIT Cyber 200/300 Courses Cyber Warfare IDE Program 34 Special Emphasis On… Enterprise Integration (Active Directory, PKI) Security
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6
2012-12-01
Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for
Cyber PCE Compendium: Cyber 300 Professional Continuing Education. Volume 1 Issue 2, Winter 2013.
2013-01-01
2003, a Naval Communications element decided to interrupt extremely high frequency (EHF) satellite service for routine maintenance during the same...defense programs.12 RECOMMENDATION 1. As a nation we should concentrate our efforts into the successful launching of a cyber- equivalent to " Apollo 11 ...mindset.” 11 4. The former communications and information community didn’t have a strong requirement for intelligence nor a close relationship with
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less
ERIC Educational Resources Information Center
Joo, Young Ju; Joung, Sunyoung; Kim, Jiyeon
2014-01-01
Learning persistence in a cyber-learning environment is not only an index determining the success or failure of individual learners but also a source of important information to establish the management direction of educational programs in an organization. Accordingly, learners need to be motivated to continue to grow in order to ensure both…
A Travel Agent in Cyber School: The Internet and the Library Media Program.
ERIC Educational Resources Information Center
LeBaron, John F.; And Others
The global computing networks that are revolutionizing our society have created an opportunity for school libraries and librarians. Taking the position that librarians occupy key positions in the educational technology revolution, this book explores how technology-enhanced education improvements fit together with the library media program and how…
Use of CYBER 203 and CYBER 205 computers for three-dimensional transonic flow calculations
NASA Technical Reports Server (NTRS)
Melson, N. D.; Keller, J. D.
1983-01-01
Experiences are discussed for modifying two three-dimensional transonic flow computer programs (FLO 22 and FLO 27) for use on the CDC CYBER 203 computer system. Both programs were originally written for use on serial machines. Several methods were attempted to optimize the execution of the two programs on the vector machine: leaving the program in a scalar form (i.e., serial computation) with compiler software used to optimize and vectorize the program, vectorizing parts of the existing algorithm in the program, and incorporating a vectorizable algorithm (ZEBRA I or ZEBRA II) in the program. Comparison runs of the programs were made on CDC CYBER 175. CYBER 203, and two pipe CDC CYBER 205 computer systems.
PLAYGROUND: Preparing Students for the Cyber Battleground
ERIC Educational Resources Information Center
Nielson, Seth James
2017-01-01
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Digital Citizenship Means Character Education for the Digital Age
ERIC Educational Resources Information Center
Ohler, Jason
2011-01-01
The reality of students' cyber lives has thrust upon educators a new approach: creating character education programs tuned to digital youth that are both proactive and aggressive. Taking this approach will help integrate students' digital activities within the context of the communities in which they live, both local and digital. The digital age…
Cyber Security and Resilient Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson
2009-07-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less
ERIC Educational Resources Information Center
Kowch, Eugene
2009-01-01
Cyber charter schools (CCS) and cyber schools may soon become the most "disruptive innovation" in the education system (Christensen, Horn & Johnson, 2008) so the author urges educational technologists to take up the imperative to develop new administration knowledge among the students along with educational technology skills to support future…
Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.
Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less
Developing a Hybrid Virtualization Platform Design for Cyber Warfare Training and Education
2010-06-01
CYBER WARFARE TRAINING AND EDUCATION THESIS Kyle E. Stewart 2nd...Government. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE TRAINING...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE
Cyber High School Students' Transition to a Traditional University
ERIC Educational Resources Information Center
Gracey, Dorothy M.
2010-01-01
This mixed-method study identifies cyber high school graduates' perceptions of the effect of a cyber high school education on successful transition to a traditional university. The study examined students' perceptions of the advantages and disadvantages their cyber education experience contributed to their academic and social transition to…
Digital Citizenship Means Character Education for the Digital Age
ERIC Educational Resources Information Center
Ohler, Jason
2012-01-01
The reality of students' cyber lives has thrust upon educators a new approach: creating character education programs tuned to digital youth that are proactive and aggressive. This will help integrate students' digital activities within the context of the communities in which they live, both local and digital. The digital age beckons a new era of…
Developing Reflective Cyber Communities in the Blogosphere: A Case Study in Taiwan Higher Education
ERIC Educational Resources Information Center
Sun, Yu-Chih
2010-01-01
The purpose of this study is to highlight the possibilities and challenges that underlie efforts to integrate blogs into teacher-education programs in Taiwan higher education. The participants were 12 pre-service teachers undertaking Master's level study in Teaching English to Speakers of Other Languages. The outcomes of the blogging project were…
NASA Technical Reports Server (NTRS)
Lakeotes, Christopher D.
1990-01-01
DEVECT (CYBER-205 Devectorizer) is CYBER-205 FORTRAN source-language-preprocessor computer program reducing vector statements to standard FORTRAN. In addition, DEVECT has many other standard and optional features simplifying conversion of vector-processor programs for CYBER 200 to other computers. Written in FORTRAN IV.
76 FR 20376 - Advisory Committee for Education and Human Resources; Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-12
... Arlington Hilton, 950 North Stafford Street, Gallery II, Mezzanine Level, Arlington, VA 22203. Type of... of Visitor Reports for: Math and Science Partnership program. Federal Cyber Service: Scholarship for...
76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-21
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...
Bullying and Cyber-Bullying in Higher Education: Current Institutional Practice and Prevention
ERIC Educational Resources Information Center
Early, Jeremy Scott
2014-01-01
Cyber-bullying led a Rutgers University student to commit suicide, which led the Federal government and institutions of higher education to take a closer look at bullying and cyber-bullying on college campuses. Congress introduced the "Tyler Clementi Higher Education Anti-Harassment Act" (Tyler Clementi Act) that would require…
A cognitive and economic decision theory for examining cyber defense strategies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bier, Asmeret Brooke
Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participantsmore » interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.« less
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
NASA Astrophysics Data System (ADS)
Spafford, Eugene H.
The number and sophistication of cyberattacks continues to increase, but no national policy is in place to confront them. Critical systems need to be built on secure foundations, rather than the cheapest general-purpose platform. A program that combines education in cyber security, increasing resources for law enforcement, development of reliable systems for critical applications, and expanding research support in multiple areas of security and reliability is essential to combat risks that are far beyond the nuisances of spam email and viruses, and involve widespread espionage, theft, and attacks on essential services.
Cho, Mi-Kyoung; Kim, Miyoung
2017-01-01
Background: School violence in early adolescence, whose frequency and status have recently changed significantly. Objective: This study attempts to detect the cyber bullying inclination of youth in early adolescence when aggressiveness reaches its peak, to identify school violence, and to develop a school violence prevention program. Method: This study was a survey research, investigating participants who were 470 middle school students in South Korea. For the analysis, independent t-test, one-way ANOVA and hierarchical regression analysis. Results: It is suggested that the school violence victimization experience and cyber bullying infliction experience has an influence in the school violence infliction. And the cyber bullying victimization experience and school violence victimization experience variables exert effects. Conclusion: The results of this study suggest that school nurses who are connecting to the community-school-home should take an active part in the development of school violence mediation education program, considering the cultural characteristics of the country. PMID:29081871
ERIC Educational Resources Information Center
Mariki, Belingtone Eliringia
2013-01-01
This study was carried out at Hanyang Cyber University (HYCU) in the Republic of Korea. The main purpose of this study was to explore Hanyang Cyber University's experience in the use of ICT in Distance Education (DE) so as to learn best practices that can be adapted by the Institute of Adult Education (IAE) in Tanzania. Specifically, the study…
Solez, Kim; Hales, Michele; Katz, Sheila Moriber
2005-09-01
Communication and medicine have evolved together. Internet resources now provide an unprecedented opportunity to provide health assistance to the developing world. The International Society of Nephrology Informatics Commission and National Kidney Foundation cyberNephrology initiative (http://www.cybernephrology.org) have created e-mail discussion groups (e.g., NEPHROL, NEPHKIDS, and so forth) and online texts and web resources (e.g., the Schrier Atlas: http://www.kidneyatlas.org) that are, in many respects, ahead of other areas of medicine. On the other hand, nephrology is quite behind in its embrace of some specific communications initiatives that could benefit emerging nations: the Health InterNetwork Access to Research Initiative program, which provides free full-text access to medical journals and books in poorer countries; the Global Health Network Supercourse, which provides specially designed online lectures for the developing world; and Internet2/Abilene and similar research networks around the world, which provide reliable, guaranteed bandwidth for high-quality Internet videoconferencing as an alternative to face-to-face lectures and meetings. The intent of many educational ventures in nephrology, particularly in the clinical practice guideline realm (National Kidney Foundation Kidney Disease Outcomes Quality Initiative, Kidney Disease Improving Global Outcomes, and so forth), is not just to disseminate information but to change human behavior: physician practice and referral patterns, patient compliance, and so forth. Concepts from the worlds of marketing and entertainment, where the science of changing human behavior is highly evolved, can be used to create high-impact, educational offerings to promote health. They can also be highly beneficial to share Internet educational innovations and future vision across boundaries of medical specialties, which is part of the intent of the cyberMedicine joint venture (http://www.cyber-medicine.org).
Medical education in cyberspace: critical considerations in the health system
YAZDANI, SHAHRAM; KHOSHGOFTAR, ZOHREH; AHMADY, SOLEIMAN; RASTEGARPOUR, HASSAN; FOROUTAN, SEYED ABBAS
2017-01-01
Introduction: Over the past few decades, two revolutionary approaches have emerged as a new form of medical education: Electronic Medical Education and Web-based Medical Education. A number of well-known medical institutions, such as Harvard and Johns Hopkins used a wide range of cyberspace capabilities to increase their competitiveness. Researchers have expressed that cyberspace will change health system’s main objective of training physicians and medical education. We conducted this study to identify the health system critical considerations on core issues, involving the development of medical education on cyberspace. Methods: In order to conduct this study, we observed the steps of a critical literature review, combined with the ‘Four-phase method’ adopted by Carnwell and Daly. We focused on particular literature on health and cyber system functions; it was associated with systemic approach. Results: We developed a six-level taxonomy, Cyber level, Governance level, Ministerial level, Organizational level, Program level and Performance level, as a key solution that can be applied for the success of medical education on cyberspace. The results were summarized and appraised in more details. Conclusion: Medical education on cyberspace is a complex interdisciplinary system. It is important that all aspects of the health systems be involved as integral to the development of cyber based medical education; without this convergence, we will be confused by the decisions made by others within the system. Health system should also communicate with those external sectors that are critical to achieving better learning on cyberspace. Integrated planning, governance and management of medical education in cyberspace are pivotal elements for the promotion. PMID:28124017
Impact of the ConRed program on different cyberbulling roles.
Del Rey, Rosario; Casas, José A; Ortega, Rosario
2016-01-01
This article presents results from an evaluation of the ConRed cyberbullying intervention program. The program's impacts were separately determined for the different roles within cyberbullying that students can take, i.e., cyber-victims, cyber-bullies, cyber-bully/victims, and bystanders. The ConRed program is a theory-driven program designed to prevent cyberbullying and improve cyberbullying coping skills. It involves students, teachers, and families. During a 3-month period, external experts conducted eight training sessions with students, two with teachers and one with families. ConRed was evaluated through a quasi-experimental design, in which students from three secondary schools were separated into experimental and control groups. The sample comprised 875 students, aged between 11 and 19 years. More students (n = 586) were allocated to the experimental groups at the specific insistence of the management of all schools; the remainder (n = 289) formed the control. Repeated measures MANOVA showed that cyber victims, cyber aggressors and cyberbully/victims reduced their involvement in cyberbullying. Moreover, cyber-victims and bystanders adjusted their perceptions about their control of personal information on the Internet, and cyber aggressors and bystanders reduced their Internet dependence. The ConRed program had stronger effects on male participants, especially in heightening their affective empathy. © 2015 Wiley Periodicals, Inc.
Cyber Charter Schools: Evolution, Issues, and Opportunities in Funding and Localized Oversight
ERIC Educational Resources Information Center
Ellis, Kathleen
2008-01-01
Cyber schools, also known as virtual schools, are noteworthy charter school developments that provide viable options for education. Charter schools in general and cyber charter schools in particular are not "revenue neutral" to local school districts. Nationwide, hundreds of millions of dollars allocated for education are being routed…
75 FR 35508 - Draft Regulatory Guide: Issuance, Availability
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... Systems and Networks,'' requires licensees to develop cyber-security plans and programs to protect critical digital assets, including digital safety systems, from malicious cyber attacks. Regulatory Guide 5.71, ``Cyber Security Programs for Nuclear Facilities,'' provides guidance to meet the requirements of...
"Making Kind Cool": Parents' Suggestions for Preventing Cyber Bullying and Fostering Cyber Kindness
ERIC Educational Resources Information Center
Cassidy, Wanda; Brown, Karen; Jackson, Margaret
2012-01-01
Cyber bullying among youth is rapidly becoming a global phenomenon, as educators, parents and policymakers grapple with trying to curtail this negative and sometimes devastating behavior. Since most cyber bullying emanates from the home computer, parents can play an important role in preventing cyber bullying and in fostering a kinder online…
76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-21
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR...), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the... for all levels of government to complete a cyber network security assessment so that a full measure of...
Confronting the Pedagogical Challenge of Cyber Safety
ERIC Educational Resources Information Center
Hanewald, Ria
2008-01-01
Cyber violence and the antidote of cyber safety are fast becoming a global concern for governments, educational authorities, teachers, parents and children alike. Despite substantial funding for information dissemination on preventative strategies and the development of electronic responses to hinder perpetrators, the phenomenon of cyber violence…
Chinese National Strategy of Total War
2008-06-01
Cyber Warfare Michael J. Good, BA Major, USA June 2008 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS...who allowed me into the Cyber Warfare , my fellow students in the Cyber Warfare IDE program who have been great friends and mentors, and my fellow...Hackers and Other Cyber Criminals .............................................................................41 PLA Cyber Warfare
Teaching Thousands with Cloud-based GIS
NASA Astrophysics Data System (ADS)
Gould, Michael; DiBiase, David; Beale, Linda
2016-04-01
Teaching Thousands with Cloud-based GIS Educators often draw a distinction between "teaching about GIS" and "teaching with GIS." Teaching about GIS involves helping students learn what GIS is, what it does, and how it works. On the other hand, teaching with GIS involves using the technology as a means to achieve education objectives in the sciences, social sciences, professional disciplines like engineering and planning, and even the humanities. The same distinction applies to CyberGIS. Understandably, early efforts to develop CyberGIS curricula and educational resources tend to be concerned primarily with CyberGIS itself. However, if CyberGIS becomes as functional, usable and scalable as it aspires to be, teaching with CyberGIS has the potential to enable large and diverse global audiences to perform spatial analysis using hosted data, mapping and analysis services all running in the cloud. Early examples of teaching tens of thousands of students across the globe with cloud-based GIS include the massive open online courses (MOOCs) offered by Penn State University and others, as well as the series of MOOCs more recently developed and offered by Esri. In each case, ArcGIS Online was used to help students achieve educational objectives in subjects like business, geodesign, geospatial intelligence, and spatial analysis, as well as mapping. Feedback from the more than 100,000 total student participants to date, as well as from the educators and staff who supported these offerings, suggest that online education with cloud-based GIS is scalable to very large audiences. Lessons learned from the course design, development, and delivery of these early examples may be useful in informing the continuing development of CyberGIS education. While MOOCs may have passed the peak of their "hype cycle" in higher education, the phenomenon they revealed persists: namely, a global mass market of educated young adults who turn to free online education to expand their horizons. The ability of CyberGIS to attract and effectively serve this market may be one measure of its success.
2009-04-01
Significant and interrelated problems are hindering the Air Force’s development of cyber warfare capabilities. The first is a lack of awareness about...why the AF has chosen to take cyber warfare on as a core capability on par with air and space. The second stems from the lack of a commonly...the cyber capabilities needed in the future? The contributions of this research include a strategic vision for future cyber warfare capabilities that
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
... (DHS), Science and Technology, CyberForensics Electronic Technology Clearinghouse (CyberFETCH) Program... public to comment on data collection forms for the CyberForensics Electronic Technology Clearinghouse... for providing a collaborative environment for cyber forensics practitioners from law enforcement...
Cyber security evaluation of II&C technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Ken
The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less
TECHcitement: Advances in Technological Education, 2006
ERIC Educational Resources Information Center
American Association of Community Colleges (NJ1), 2006
2006-01-01
This publication includes 13 articles: (1) ATE [Advanced Technological Education] Attuned to Global Competition; (2) Materials Science Center Supplies Information on Often-Overlooked Field; (3) CSEC [Cyber Security Education Consortium] Builds Corps of Cyber Technicians; (4) KCTCS [Kentucky Community and Technical College System] Is U.S. Partner…
CyberMedVPS: visual programming for development of simulators.
Morais, Aline M; Machado, Liliane S
2011-01-01
Computer applications based on Virtual Reality (VR) has been outstanding in training and teaching in the medical filed due to their ability to simulate realistic in which users can practice skills and decision making in different situations. But was realized in these frameworks a hard interaction of non-programmers users. Based on this problematic will be shown the CyberMedVPS, a graphical module which implement Visual Programming concepts to solve an interaction trouble. Frameworks to develop such simulators are available but their use demands knowledge of programming. Based on this problematic will be shown the CyberMedVPS, a graphical module for the CyberMed framework, which implements Visual Programming concepts to allow the development of simulators by non-programmers professionals of the medical field.
ERIC Educational Resources Information Center
Ruben, Barbara
1994-01-01
Reviews a number of interactive environmental computer education networks and software packages. Computer networks include National Geographic Kids Network, Global Lab, and Global Rivers Environmental Education Network. Computer software involve environmental decision making, simulation games, tropical rainforests, the ocean, the greenhouse…
Discussing Cyber Ethics with Students Is Critical
ERIC Educational Resources Information Center
Kruger, Robert
2003-01-01
As computers become a larger part of the curriculum, educators everywhere are being asked to take a stand for cyber ethics, the right and wrong of computer and Internet use. Teachers cannot always depend on parents to instill cyber ethics. Parents may not know or follow the rules, either. Once students understand cyber ethics, they may have a…
Cyber Asynchronous versus Blended Cyber Approach in Distance English Learning
ERIC Educational Resources Information Center
Ge, Zi-Gang
2012-01-01
This study aims to compare the single cyber asynchronous learning approach with the blended cyber learning approach in distance English education. Two classes of 70 students participated in this study, which lasted one semester of about four months, with one class using the blended approach for their English study and the other only using the…
Coming Soon: More Cyber Careers?
exploring the possibility of creating a cyber career field for Army civilians," Lt. Gen. Edward C Programs and Posture," April 14. Establishing a cyber career management field for civilians may be working to implement a cyber career management field for enlisted personnel that will encompass accessions
75 FR 2187 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-14
... Review: New collection. Title: Authorized Cyber Assistant Host Application. Form: Not yet assigned. Description: The form is used by a business to apply to become an Authorized Cyber Assistant Host. Information... become a Cyber Assistant Host. Cyber Assistant is a software program that assists in the preparation of...
Development of a CRAY 1 version of the SINDA program. [thermo-structural analyzer program
NASA Technical Reports Server (NTRS)
Juba, S. M.; Fogerson, P. E.
1982-01-01
The SINDA thermal analyzer program was transferred from the UNIVAC 1110 computer to a CYBER And then to a CRAY 1. Significant changes to the code of the program were required in order to execute efficiently on the CYBER and CRAY. The program was tested on the CRAY using a thermal math model of the shuttle which was too large to run on either the UNIVAC or CYBER. An effort was then begun to further modify the code of SINDA in order to make effective use of the vector capabilities of the CRAY.
ERIC Educational Resources Information Center
Kim, Youngsoo; Lee, Jong Yeon
1999-01-01
Provides an overview of cyber education in Korea that is meeting the educational needs of corporations as well as universities. Topics include Web pages; plans for performance evaluation; system architecture; and future possibilities, including service providers, information infrastructure, and rules and regulations. (Contains 23 references.) (LRW)
Cyber-Harassment in Higher Education: A Study of Institutional Policies and Procedures
ERIC Educational Resources Information Center
Schaefer-Ramirez, Victoria Ann
2017-01-01
Cyberbullying is a growing phenomenon, causing concern among students, parents, and professionals in the educational community. Although no federal law specifically addresses cyber-harassment in higher education, institutions have a legal obligation to address all claims of harassment, regardless of the location or platform in which the harassing…
DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT
2016-08-01
AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT...iii ABSTRACT During operations in a contested air environment, adversary electronic warfare (EW) and cyber-attack capability will pose a high...10 Russian Federation Electronic Warfare Systems ...................................................12 Chinese Cyber Warfare Program
Open cyberGIS software for geospatial research and education in the big data era
NASA Astrophysics Data System (ADS)
Wang, Shaowen; Liu, Yan; Padmanabhan, Anand
CyberGIS represents an interdisciplinary field combining advanced cyberinfrastructure, geographic information science and systems (GIS), spatial analysis and modeling, and a number of geospatial domains to improve research productivity and enable scientific breakthroughs. It has emerged as new-generation GIS that enable unprecedented advances in data-driven knowledge discovery, visualization and visual analytics, and collaborative problem solving and decision-making. This paper describes three open software strategies-open access, source, and integration-to serve various research and education purposes of diverse geospatial communities. These strategies have been implemented in a leading-edge cyberGIS software environment through three corresponding software modalities: CyberGIS Gateway, Toolkit, and Middleware, and achieved broad and significant impacts.
Addressing Human Factors Gaps in Cyber Defense
2016-09-23
Factors Gaps in Cyber Defense 5a. CONTRACT NUMBER FA8650-14-D-6501-0009 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Alex... Cyber security is a high-ranking national priority that is only likely to grow as we become more dependent on cyber systems. From a research perspective...currently available work often focuses solely on technological aspects of cyber , acknowledging the human in passing, if at all. In recent years, the
Towards a Cyber-Constructivist Perspective (CCP) of Educational Design.
ERIC Educational Resources Information Center
Luppicini, Rocci
2003-01-01
This theoretical paper uses cybernetic-based approaches and communications theory to advance knowledge of constructivist learning. Explores a cyber-constructivist perspective (CCP) as a tool for increasing awareness of factors that may contribute to effective constructivist educational design within learning communities, and discusses advantages…
The Relationship between Cyber-Loafing and Internet Addiction
ERIC Educational Resources Information Center
Keser, Hafize; Kavuk, Melike; Numanoglu, Gulcan
2016-01-01
The goal of this study was to investigate the relationship between preservice teachers' internet addiction level and cyber-loafing activities. This study was conducted as a survey study. Participants of the study was Computer Education and Instructional Technology department students (n = 139) at Ankara University. "Cyber loafing activity…
Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)
2016-07-27
Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) 5a. CONTRACT NUMBER FA8650-16-C-6722 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...network analysts. Therefore, a new cyber STE focused on network analysts called the Air Force Cyber Intruder Alert Testbed (CIAT) was developed. This...Prescribed by ANSI Std. Z39-18 Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) Gregory Funke, Gregory Dye, Brett Borghetti
Computer program documentation: CYBER to Univac binary conversion user's guide
NASA Technical Reports Server (NTRS)
Martin, E. W.
1980-01-01
A user's guide for a computer program which will convert SINDA temperature history data from CDC (Cyber) binary format to UNIVAC 1100 binary format is presented. The various options available, the required input, the optional output, file assignments, and the restrictions of the program are discussed.
2010-12-01
pharmaceutical formulas, and like data can reap huge profits for criminals” 8 . If cyber criminals are capable of these crimes imagine if Bin Laden could hire...and develops a framework to work with civilian agencies to combat cyber criminals and terrorists. The CNCI comprises of education, defensive...trillion dollars worth of intellectual property to data theft. It is quite obvious that if we don’t get a handle on cyber criminals it’s only a
The Human Side of Cyber Conflict: Organizing, Training, and Equipping the Air Force Cyber Workforce
2016-06-01
Breakdown of the 17D community as of 31 March 2014. (Reproduced from 17D Officer Assignment Team, Cyberspace Operations “Spread the Word” briefing, 9– 11 ...surety 3D0X4 Computer systems programs 3D1X1 Client systems 3D1X2 Cyber transport 3D1X3 Radio frequency transport 3D1X4 Spectrum operations 3D1X5 Radar...Computer systems programs 3D1X1 Client systems 3D1X2 Cyber transport systems 3D1X3 Radio frequency transmissionsystems FORCE DEVELOPMENT │ 123 Table 8
Cyber-Herding and Cyber Activism: Countering Qutbists on the Internet
2007-12-01
13 f. Phase 6, Concentrate Web Sites ..........14 g. Phase 7, Develop Darknet ................16 B. CYBER ACTIVISM...continues in Phase 3 with the introduction of web sites owned by the cyber herding program and later on with the introduction of Darknets . The...own doppelganger.) Create several content-rich Darknet environments—a private virtual network where users connect only to people they trust8—that
Network and computing infrastructure for scientific applications in Georgia
NASA Astrophysics Data System (ADS)
Kvatadze, R.; Modebadze, Z.
2016-09-01
Status of network and computing infrastructure and available services for research and education community of Georgia are presented. Research and Educational Networking Association - GRENA provides the following network services: Internet connectivity, network services, cyber security, technical support, etc. Computing resources used by the research teams are located at GRENA and at major state universities. GE-01-GRENA site is included in European Grid infrastructure. Paper also contains information about programs of Learning Center and research and development projects in which GRENA is participating.
Tearing down the Walls: Cyber Charter Schools and the Public Endorsement of Religion
ERIC Educational Resources Information Center
Cambre, Belinda M.
2009-01-01
States have the ability to regulate cyber charter schools just as they regulate traditional schools, private schools, and homeschooling. The situation becomes trickier in terms of religion. In homeschool settings, parents have the right to deliver religious education to their children. Under "Zelman v. Simmons-Harris" (2002), a cyber charter…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-25
... (DHS), Science and Technology, CyberForensics Electronic Technology Clearinghouse (CyberFETCH) Program... public to comment on data collection forms for the CyberForensics Electronic Technology Clearinghouse... forensics practitioners from law enforcement, private sector and academia. This clearinghouse will enable...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... (DHS), Science and Technology, CyberForensics Electronic Technology Clearinghouse (CyberFETCH) Program... public to comment on data collection forms for the CyberForensics Electronic Technology Clearinghouse... forensics practitioners from law enforcement, private sector and academia. This clearinghouse will enable...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-07
... (DHS), Science and Technology, CyberForensics Electronic Technology Clearinghouse (CyberFETCH) Program... public to comment on data collection forms for the CyberForensics Electronic Technology Clearinghouse... forensics practitioners from law enforcement, private sector and academia. This clearinghouse will enable...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-01
... Defense of Infrastructure Against Cyber Threats (PREDICT) Program AGENCY: Science and Technology... Defense of Infrastructure Against Cyber Threats (PREDICT) initiative. PREDICT is an initiative to... new models, technologies and products that support effective threat assessment and increase cyber...
Code of Federal Regulations, 2014 CFR
2014-07-01
... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...
Code of Federal Regulations, 2012 CFR
2012-07-01
... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...
Code of Federal Regulations, 2013 CFR
2013-07-01
... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... a recurring basis, and to the greatest extent possible, cyber security information relating to... Office is the overall point of contact for the program. The DoD Cyber Crime Center's DoD-DIB...
2011-06-01
EMERGING ROLES OF COMBAT COMMUNICATION SQUADRONS IN CYBER WARFARE AS RELATED TO COMPUTER NETWORK ATTACK, DEFENSE AND EXPLOITATION GRADUATE RESEARCH...Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation GRADUATE RESEARCH PROJECT Presented to the Faculty...Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Cyber Warfare Michael J. Myers Major, USAF June 2011
ERIC Educational Resources Information Center
Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond
2015-01-01
Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…
2016-09-01
Congress. Consequently, as prepared now, this report does not help DOD leaders identify assets that could be used in a cyber crisis scenario...Guidance. GAO-13-128. Washington, D.C.: October 24, 2012. Defense Cyber Efforts: Management Improvements Needed to Enhance Programs Protecting the...DEFENSE CIVIL SUPPORT DOD Needs to Identify National Guard’s Cyber Capabilities and Address Challenges in Its
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-14
... Infrastructure against Cyber Threats (PREDICT) Program AGENCY: Science and Technology Directorate, DHS. ACTION... Infrastructure Against Cyber Threats (PREDICT) initiative. PREDICT is an initiative to facilitate the... effective threat assessment and increase cyber security capabilities. (4) An estimate of the total number of...
77 FR 29616 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-18
.... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program, 1235 South Clark Street, Suite 1500, Arlington, VA 22202. DoD Cyber Crime Center, 911 Elkridge Landing...
Protecting water and wastewater infrastructure from cyber attacks
NASA Astrophysics Data System (ADS)
Panguluri, Srinivas; Phillips, William; Cusimano, John
2011-12-01
Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.
You Are What You Read: The Belief Systems of Cyber-Bystanders on Social Networking Sites
Leung, Angel N. M.; Wong, Natalie; Farver, JoAnn M.
2018-01-01
The present study tested how exposure to two types of responses to a hypothetical simulated Facebook setting influenced cyber-bystanders’ perceived control and normative beliefs using a 4 cyberbully-victim group (pure cyberbullies, non-involved, pure cyberbullied victims, and cyberbullied-victims) × 2 condition (offend vs. defend) experimental design. 203 Hong Kong Chinese secondary school and university students (132 females, 71 males; 12 to 28; M = 16.70; SD = 3.03 years old) were randomly assigned into one of two conditions. Results showed that participants’ involvement in cyberbullying significantly related to their control beliefs about bully and victim assisting behaviors, while exposure to the two different conditions (offend vs. defend comments) was related to both their control and normative beliefs. In general, the defend condition promoted higher control beliefs to help the victims and promoted higher normative beliefs to help the victims. Regardless of their past involvement in cyberbullying and exposure to offend vs. defend conditions, both cyber-bullies and cyber-victims were more inclined to demonstrate normative beliefs to help victims than to assist bullies. These results have implications for examining environmental influences in predicting bystander behaviors in cyberbullying contexts, and for creating a positive environment to motivate adolescents to become “upstanders” in educational programs to combat cyberbullying. PMID:29740362
You Are What You Read: The Belief Systems of Cyber-Bystanders on Social Networking Sites.
Leung, Angel N M; Wong, Natalie; Farver, JoAnn M
2018-01-01
The present study tested how exposure to two types of responses to a hypothetical simulated Facebook setting influenced cyber-bystanders' perceived control and normative beliefs using a 4 cyberbully-victim group (pure cyberbullies, non-involved, pure cyberbullied victims, and cyberbullied-victims) × 2 condition (offend vs. defend) experimental design. 203 Hong Kong Chinese secondary school and university students (132 females, 71 males; 12 to 28; M = 16.70; SD = 3.03 years old) were randomly assigned into one of two conditions. Results showed that participants' involvement in cyberbullying significantly related to their control beliefs about bully and victim assisting behaviors, while exposure to the two different conditions (offend vs. defend comments) was related to both their control and normative beliefs. In general, the defend condition promoted higher control beliefs to help the victims and promoted higher normative beliefs to help the victims. Regardless of their past involvement in cyberbullying and exposure to offend vs. defend conditions, both cyber-bullies and cyber-victims were more inclined to demonstrate normative beliefs to help victims than to assist bullies. These results have implications for examining environmental influences in predicting bystander behaviors in cyberbullying contexts, and for creating a positive environment to motivate adolescents to become "upstanders" in educational programs to combat cyberbullying.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, Robert S.; Benjamin, Jacob; Wright, Virginia L.
A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.
2017-06-09
those with talent in the computer sciences. Upon graduation from high school, computer -proficient teenagers are selected for an elite cyber force and...Arguably, the Massachusetts Institute of Technology (M.I.T.) is the premiere institution for computer science. M.I.T. graduates make, on average, $83,455...study specific to computer science and provide certification in programs like ethical hacking, cyber security, and programing. As with the other
New Educational Modules Using a Cyber-Distribution System Testbed
Xie, Jing; Bedoya, Juan Carlos; Liu, Chen-Ching; ...
2018-03-30
At Washington State University (WSU), a modern cyber-physical system testbed has been implemented based on an industry grade distribution management system (DMS) that is integrated with remote terminal units (RTUs), smart meters, and a solar photovoltaic (PV). In addition, the real model from the Avista Utilities distribution system in Pullman, WA, is modeled in DMS. The proposed testbed environment allows students and instructors to utilize these facilities for innovations in learning and teaching. For power engineering education, this testbed helps students understand the interaction between a cyber system and a physical distribution system through industrial level visualization. The testbed providesmore » a distribution system monitoring and control environment for students. Compared with a simulation based approach, the testbed brings the students' learning environment a step closer to the real world. The educational modules allow students to learn the concepts of a cyber-physical system and an electricity market through an integrated testbed. Furthermore, the testbed provides a platform in the study mode for students to practice working on a real distribution system model. Here, this paper describes the new educational modules based on the testbed environment. Three modules are described together with the underlying educational principles and associated projects.« less
New Educational Modules Using a Cyber-Distribution System Testbed
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xie, Jing; Bedoya, Juan Carlos; Liu, Chen-Ching
At Washington State University (WSU), a modern cyber-physical system testbed has been implemented based on an industry grade distribution management system (DMS) that is integrated with remote terminal units (RTUs), smart meters, and a solar photovoltaic (PV). In addition, the real model from the Avista Utilities distribution system in Pullman, WA, is modeled in DMS. The proposed testbed environment allows students and instructors to utilize these facilities for innovations in learning and teaching. For power engineering education, this testbed helps students understand the interaction between a cyber system and a physical distribution system through industrial level visualization. The testbed providesmore » a distribution system monitoring and control environment for students. Compared with a simulation based approach, the testbed brings the students' learning environment a step closer to the real world. The educational modules allow students to learn the concepts of a cyber-physical system and an electricity market through an integrated testbed. Furthermore, the testbed provides a platform in the study mode for students to practice working on a real distribution system model. Here, this paper describes the new educational modules based on the testbed environment. Three modules are described together with the underlying educational principles and associated projects.« less
A Deeper Level of Network Intelligence: Combating Cyber Warfare
2010-04-01
A Deeper Level of Network Intelligence: Combating Cyber Warfare This information is provided for your review only and is not for any distribution...A Deeper Level of Network Intelligence: Combating Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d
76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... regulations and restrictions. SUMMARY: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an interagency working group that coordinates cyber security research...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
... (DHS), Science and Technology, Protected Repository for the Defense of Infrastructure Against Cyber... the Defense of Infrastructure against Cyber Threats (PREDICT) program, and is a revision of a... operational data for use in cyber security research and development through the establishment of distributed...
77 FR 63423 - Proposed Collection; Comment Request for Information Collection Tools
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-16
... the Authorized Cyber Assistant Host Application form; Form 11-C, Occupational Tax and Register Return... record-keeping requirements: (1) Title: Authorized Cyber Assistant Host Application. OMB Number: 1545-2170. Form Number: N/A. Abstract: The IRS web-based software program, referred to as Cyber Assistant...
Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.
Sackner-Bernstein, Jonathan
2017-03-01
The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.
Training Cyber Warriors: What Can Be Learned from Defense Language Training?
2015-01-01
other agencies. In addition, the National Cryp- tologic School , Foreign Service Institute, and CIA University, among others, each train students for...They provide a variety of services, including group instruction , distance learning , and one-on-one tutoring. Pipeline-Building Programs The Language...commonly monolingual English speakers,1 (2) the U.S. education system provides limited opportunities for students to learn other languages in
Bull, Sheana; Prescott, Tonya L.; Birungi, Ruth
2013-01-01
Capitalizing on emerging data suggesting that HIV preventive behaviors can be positively affected by Internet-based programs, we developed and tested CyberSenga, an Internet-based, comprehensive sexuality education program for adolescents in Mbarara, Uganda. Three hundred and sixty-six secondary school students were randomly assigned to either the 5-lesson program (+ booster) or a treatment-as-usual control. At three-month follow-up, intervention participants provided feedback on program acceptability. Six focus groups with intervention participants were additionally conducted after the final follow-up at 6 months. Data support a hypothesis of feasibility: Despite schedule interruptions, 95% of intervention participants completed all 5 modules; only 17% deviated from the once-a-week intended delivery schedule. Internet service was uninterrupted during the field period and, in general, the technology performed to specifications. The intervention also appears to be acceptable: 94% of intervention youth somewhat or strongly agreed that they learned a lot and 93% said they were somewhat or very likely to recommend the program. Although more than two in three youth somewhat or strongly agreed that the program talked too much about sex (70%) and condoms (75%), 89% somewhat or strongly disagreed that “I do not think kids like me should do the CyberSenga program”. Feedback from focus group participants further suggested that the content was generally acceptable and did not contradict local norms in most cases. In fact, despite concerns from some local stakeholders to the contrary, information about condoms did not appear to be confusing or contradictory for youth who were abstinent. Nonetheless, some of the sexual topics seemed to be unfamiliar or uncomfortable for some participants – particularly brief references to oral and anal sex. Together, both qualitative and quantitative data suggest that the program is a feasible and acceptable way of delivering HIV preventive information to both sexually experienced and inexperienced adolescents in Mbarara, Uganda. PMID:24093828
ERIC Educational Resources Information Center
Shariff, Shaheen
2009-01-01
This book is directed to academics, educators, and government policy-makers who are concerned about addressing emerging cyber-bullying and anti-authority student expressions through the use of cell phone and Internet technologies. There is a current policy vacuum relating to the extent of educators' legal responsibilities to intervene when such…
Reliable Assessment with CyberTutor, a Web-Based Homework Tutor.
ERIC Educational Resources Information Center
Pritchard, David E.; Morote, Elsa-Sofia
This paper demonstrates that an electronic tutoring program can collect data that enables a far more reliable assessment of students' skills than a standard examination. Socratic electronic homework tutor, CyberTutor can integrate effectively instruction and assessment. CyberTutor assessment has about 62 times less variance due to random test…
78 FR 28809 - Reserve Forces Policy Board (RFPB); Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-16
... Assessment and Program Evaluation; the Deputy Commander, U.S. Cyber Command; Dr. Paul Stockton, former...; and the cost to maintain a strong Reserve Component. Additionally, the Deputy Commander, U.S. Cyber Command, will discuss his views on the increased emphasis placed on cyber security and the logical mission...
10 CFR 73.54 - Protection of digital computer and communication systems and networks.
Code of Federal Regulations, 2011 CFR
2011-01-01
....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...
10 CFR 73.54 - Protection of digital computer and communication systems and networks.
Code of Federal Regulations, 2010 CFR
2010-01-01
....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...
10 CFR 73.54 - Protection of digital computer and communication systems and networks.
Code of Federal Regulations, 2014 CFR
2014-01-01
....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...
10 CFR 73.54 - Protection of digital computer and communication systems and networks.
Code of Federal Regulations, 2012 CFR
2012-01-01
....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... Operating Licenses include: (1) The proposed Cyber Security Plan for CCNPP, Ginna, and NMPNS, (2) an... provisions of the Nuclear Regulatory Commission-approved Cyber Security Plan for CCNPP, Ginna, and NMPNS as... Communication Systems and Networks,'' establish the requirements for a cyber security program. This regulation...
10 CFR 73.54 - Protection of digital computer and communication systems and networks.
Code of Federal Regulations, 2013 CFR
2013-01-01
....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...
RFID as a Tool in Cyber Warfare
2010-11-01
RTO-MP-IST-091 P4 - 1 RFID as a Tool in Cyber Warfare Mikko Kiviharju P.O.Box 10 FIN-11311 Riihimaki FINLAND mikko.kiviharju@mil.fi...auditing existing systems and planning new establishments. 1 INTRODUCTION Cyber warfare , especially computer network operations (CNO) have a deep...SUBTITLE RFID as a Tool in Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK
CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical Systems
2018-04-19
AFRL-AFOSR-JP-TR-2018-0035 CORESAFE:A Formal Approach against Code Replacement Attacks on Cyber Physical Systems Sandeep Shukla INDIAN INSTITUTE OF...Formal Approach against Code Replacement Attacks on Cyber Physical Systems 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA2386-16-1-4099 5c. PROGRAM ELEMENT...Institute of Technology Kanpur India Final Report for AOARD Grant “CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical
Defense Standardization Program Journal, April/Jun 2007
2007-06-01
Delivers Far-Reaching Standardization 9 Air Force Cyber Warfare Training 14 DMSMS Working Group Reaches Out to Programs 18 An Effects-Based Metrics...defend- ers their first 10 cyber warfare combat "sorties" and prepared them for net- work crew positions. Four MAJCOMs participated in BD 2002.The Air
Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety
Sackner-Bernstein, Jonathan
2017-01-01
Background: The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware. PMID:27837161
ERIC Educational Resources Information Center
Cassidy, Wanda; Jackson, Margaret; Brown, Karen N.
2009-01-01
Educators and the public alike are often perplexed with the enormous and evolving cyber mise en scene. Youth of the digital generation are interacting in ways our fore-mothers and fathers never imagined--using electronic communications that until 30 years ago never existed. This article reports on a study of cyber-bullying conducted with students…
Comparative Analysis of Curricula for Bachelor's Degree in Cyber Security in the USA and Ukraine
ERIC Educational Resources Information Center
Bystrova, Bogdana
2017-01-01
At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…
ORGANIZING, TRAINING, AND RETAINING INTELLIGENCE PROFESSIONALS FOR CYBER OPERATIONS
2016-02-13
in Education,” Preventing School Failure 57(3), (2013): 162-170. Wall , Andru, “Demystifying the Title 10-Title 50 Debate,” Harvard Law School...AIR WAR COLLEGE AIR UNIVERSITY ORGANIZING, TRAINING, AND RETAINING INTELLIGENCE PROFESSIONALS FOR CYBER OPERATIONS by Melissa A...to adequately organize, train and retain cyber expertise. This is especially true within Air Force intelligence, a critical component of the
2009-10-09
Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and...the People?s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 2 US-China Economic and Security Review
Gamification for Measuring Cyber Security Situational Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Best, Daniel M.; Manz, David O.
Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporatesmore » augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.« less
ERIC Educational Resources Information Center
Collins, Kathleen M.; Green, Preston C., III; Nelson, Steven L.; Madahar, Santosh
2015-01-01
This article takes up the question of equity, access, and cyber charter schools from the perspective of disability studies in education (DSE). DSE positions inclusion and educational access as social justice concerns. In doing so, we assert the importance of making visible the social justice implications of the current laws that impact cyber…
Seeking Balance in Cyber Education
2015-02-01
properties that can be applied to computer systems, networks, and software. For example, in our Introduction to Cyber Security Course, given to...Below is the submittal schedule for the areas of emphasis we are looking for: Data Mining in Metrics? Jul/ JAug 2015 Issue Submission Deadline: Feb...Phone Arena. PhoneArena.com, 12 Nov. 2013. Web. 08 Aug. 2014. 8. Various. “SI110: Introduction to Cyber Security, Technical Foundations.” SI110
Mission Assurance Modeling and Simulation: A Cyber Security Roadmap
NASA Technical Reports Server (NTRS)
Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna
2012-01-01
This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.
Water Exploration: An Online High School Water Resource Education Program
NASA Astrophysics Data System (ADS)
Ellins, K. K.; McCall, L. R.; Amos, S.; McGowan, R. F.; Mote, A.; Negrito, K.; Paloski, B.; Ryan, C.; Cameron, B.
2010-12-01
The Institute for Geophysics at The University of Texas at Austin and 4empowerment.com, a Texas-based for-profit educational enterprise, teamed up with the Texas Water Development Board to develop and implement a Web-based water resources education program for Texas high school students. The program, Water Exploration uses a project-based learning approach called the Legacy Cycle model to permit students to conduct research and build an understanding about water science and critical water-related issues, using the Internet and computer technology. The three Legacy Cycle modules in the Water Exploration curriculum are: Water Basics, Water-Earth Dynamics and People Need Water. Within each Legacy Cycle there are three different challenges, or instructional modules, laid out as projects with clearly stated goals for students to carry out. Each challenge address themes that map to the water-related “Big Ideas” and supporting concepts found in the new Earth Science Literacy Principles: The Big Ideas and Supporting Concepts of Earth Science. As students work through a challenge they follow a series of steps, each of which is associated (i.e., linked online) with a manageable number of corresponding, high quality, research-based learning activities and Internet resources, including scholarly articles, cyber tools, and visualizations intended to enhance understanding of the concepts presented. The culmination of each challenge is a set of “Go Public” products that are the students’ answers to the challenge and which serve as the final assessment for the challenge. The “Go Public” products are posted to a collaborative workspace on the Internet as the “legacy” of the students’ work, thereby allowing subsequent groups of students who take the challenge to add new products. Twenty-two science educators have been trained on the implementation of the Water Exploration curriculum. A graduate student pursuing a master’s degree in science education through The University of Texas’ UTEACH program is conducting research to track the teachers’ implementation of Water Exploration and assess their comfort with cyber-education through classroom observations, students and teacher surveys, and evaluation of students’ “Go Public” products.
Examining Acquisition Leaders Readiness to Support Future LandCyber Operations
2014-04-15
Their article acknowledged the need for educational training as a forum where cyberspace concerns can be discussed by senior leaders. While their... article focused on senior leaders’ cyber development, 19 this cyberspace training and curriculum can be extended to educate leaders at all levels...systems. The literature reviewed included peer-reviewed articles and publications, DoD and Army doctrines, policies, studies, instructions, reports, and
Examining Acquisition Leaders’ Readiness to Support Future LandCyber Operations
2014-04-15
Their article acknowledged the need for educational training as a forum where cyberspace concerns can be discussed by senior leaders. While their... article focused on senior leaders’ cyber development, 19 this cyberspace training and curriculum can be extended to educate leaders at all levels...systems. The literature reviewed included peer-reviewed articles and publications, DoD and Army doctrines, policies, studies, instructions, reports, and
Evolving Intelligence, Surveillance & Reconnaissance (ISR) for Air Force Cyber Defense
2013-02-14
Telecommunications and Assessment Program ( TMAP ) notes in Air Force Instruction (AFI) 10-712 that “adversaries can easily monitor (unclassified) systems to...Instruction (AFI) 10-712, Telecommunications Monitoring And Assessment Program ( TMAP ), 2011, 4. 23. Lt Col Hugh M. Ragland., interview with author...Monitoring And Assessment Program ( TMAP ), 8 June 2011. Brenner, Carl N. Col, USAF. NASIC Air & Cyber Analysis Group/CC. Interview by the author. 29
Hemphill, Sheryl A; Kotevski, Aneta; Heerde, Jessica A
2015-02-01
To investigate associations between Grade 9 and 10 cyber-bullying perpetration and victimization and Grade 11 problem behavior and mental health problems after controlling for risk factors for these outcomes in the analyses. The sample comprised 927 students from Victoria, Australia who completed a modified version of the self-report Communities That Care Youth Survey in Grades 9-11 to report on risk factors, traditional and cyber-bullying perpetration and victimization, problem behavior, and mental health. Complete data on over 650 participants were analyzed. Five per cent of Grade 9 and 10 students reported cyber-bullying perpetration only, 6-8% reported victimization only, and 8-9% both cyber-bullied others and were cyber-bullied. Results showed that cyber-bullying others in Grade 10 was associated with theft in Grade 11, cyber-victimization in Grade 10 was linked with Grade 11 depressive symptoms, and Grade 10 cyber-bullying perpetration and victimization combined predicted Grade 11 school suspension and binge drinking. Prevention approaches that target traditional and cyber-bullying, and established risk factors are necessary. Such multi-faceted programs may also reduce problem behavior and mental health problems.
Longitudinal impact of the Cyber Friendly Schools program on adolescents' cyberbullying behavior.
Cross, Donna; Shaw, Thérèse; Hadwen, Kate; Cardoso, Patricia; Slee, Phillip; Roberts, Clare; Thomas, Laura; Barnes, Amy
2016-01-01
Cyberbullying is a major public health problem associated with serious mental, social, and academic consequences for young people. To date, few programs addressing cyberbullying have been developed and empirically tested. The Cyber Friendly Schools (CFS) group-randomized controlled trial measured the longitudinal impact of a whole-school online cyberbullying prevention and intervention program, developed in partnership with young people. Non-government secondary schools in Perth, Western Australia, (N = 35; 3,000+ students) were randomized to an intervention (n = 19) or usual practice control group (n = 16 schools). Students completed online questionnaires in 2010, 2011, and at 1-year follow-up in 2012, measuring their cyberbullying experiences during the previous school term. The intervention group received the program in Grades 8 and 9 (aged 13-14 years). Program effects were tested using two-part growth models. The program was associated with significantly greater declines in the odds of involvement in cyber-victimization and perpetration from pre- to the first post-test, but no other differences were evident between the study conditions. However, teachers implemented only one third of the program content. More work is needed to build teacher capacity and self-efficacy to effectively implement cyberbullying programs. Whole-school cyberbullying interventions implemented in conjunction with other bullying prevention programs may reduce cyber-victimization more than traditional school-based bullying prevention programs alone. Aggr. Behav. 42:166-180, 2016. © 2015 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
ERIC Educational Resources Information Center
Wang, Yuping; Chen, Nian-Shing; Levy, Mike
2010-01-01
This article discusses the learning process undertaken by language teachers in a cyber face-to-face teacher training program. Eight tertiary Chinese language teachers attended a 12-week training program conducted in an online synchronous learning environment characterized by multimedia-based, oral and visual interaction. The term "cyber…
Leedahl, Skye N; Brasher, Melanie Sereny; Estus, Erica; Breck, Bethany M; Dennis, Cory B; Clark, Samantha C
2018-01-24
Intergenerational service-learning in higher education positively affects older adults and students, but little is known about the effectiveness of interdisciplinary, reverse mentoring programs that use technology as the medium of bringing generations together. This study describes an intergenerational service-learning program that utilizes reverse mentoring within higher education, the "Engaging Generations Program," at a midsized public university in New England where students help older adults learn about technology, and students gain communication and teaching skills. In this article, we outline how the program was implemented, present quantitative data on participation outcomes for students and older adults and qualitative data from older adults, and discuss best practices. Analysis of pre/post surveys found that students' attitudes toward aging improved (p < 0.01) and older adults interest in technology improved (p < 0.05) after program participation. Best practices identified included: multiple meetings with the same pair to deepen friendships, in-person training for student leaders, student responsibility for scheduling, tailoring sessions to each participant, student documentation of meetings, and active involvement by community partners.
Developement of an Optimum Interpolation Analysis Method for the CYBER 205
NASA Technical Reports Server (NTRS)
Nestler, M. S.; Woollen, J.; Brin, Y.
1985-01-01
A state-of-the-art technique to assimilate the diverse observational database obtained during FGGE, and thus create initial conditions for numerical forecasts is described. The GLA optimum interpolation (OI) analysis method analyzes pressure, winds, and temperature at sea level, mixing ratio at six mandatory pressure levels up to 300 mb, and heights and winds at twelve levels up to 50 mb. Conversion to the CYBER 205 required a major re-write of the Amdahl OI code to take advantage of the CYBER vector processing capabilities. Structured programming methods were used to write the programs and this has resulted in a modular, understandable code. Among the contributors to the increased speed of the CYBER code are a vectorized covariance-calculation routine, an extremely fast matrix equation solver, and an innovative data search and sort technique.
Partnership in Innovative Preparation for Educators and Students (PIPES)
2013-12-23
it? Sign up for this workshop to find out! You will construct a working wind generator to find out which turbine generates the most electricity...program an advanced robot that will accomplish a greater number of amazing tasks using additional sensors and commands. Requires some previous NXT...tech wireless networks and cell phones to solve a cyber-bullying mystery . Learn ways to stay safe online. 19 Kitchen Chemistry – Science and
Cyberforce 2025: Crafting a Selection Program for Tomorrow’s Cyber Warriors
2013-02-14
One of the more current and commonly used adult IQ tests is the Wechsler Adult Intelligence Scale – fourth edition (WAIS- IV), which currently...LeMay Center for Doctrine Development and Education, 2011. David J. Kay, Terry J. Pudas, and Brett Young. Preparing the Pipeline: The...34 May/June 1973: 30-34. Times, The New York. Foreign Intelligence Surveillance Act (FISA). New York, September 13, 2012. Trollman, Capt David
Data to DecisionsTerminate, Tolerate, Transfer, or Treat
2016-07-25
and patching, a risk-based cyber - security decision model that enables a pre- dictive capability to respond to impending cyber -attacks is needed...States. This sensitive data includes business proprietary information on key programs of record and infrastructure, including government documents at...leverage nationally. The Institute for Defense Analyses (IDA) assisted the DoD CIO in formalizing a proof of concept for cyber initiatives and
National Guard Forces in the Cyber Domain
2015-05-22
TITLE AND SUBTITLE National Guard Forces in the Cyber Domain 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...Soldiers. Army Cyber Command (ARCYBER) commander, Lieutenant General Edward Cardon stated that Guard will begin to build combat power with...90 2014 Quadrennial Defense Review, 15. 91 Ibid. 92 Edward C. Cardon , "ARMY.MIL, The Official Homepage of the United
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's abilitymore » to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.« less
An Examination of the Partner Cyber Abuse Questionnaire in a College Student Sample.
Wolford-Clevenger, Caitlin; Zapor, Heather; Brasfield, Hope; Febres, Jeniimarie; Elmquist, JoAnna; Brem, Meagan; Shorey, Ryan C; Stuart, Gregory L
2016-01-01
To examine the factor structure and convergent validity of a newly developed measure of an understudied form of partner abuse, cyber abuse, and to examine the prevalence of, and gender differences in, victimization by cyber abuse. College students in a dating relationship ( N = 502) completed the Partner Cyber Abuse Questionnaire (Hamby, 2013), as well as measures of partner abuse victimization and depression. Using exploratory factor analysis, we determined a one-factor solution was the most statistically and conceptually best fitting model. The cyber abuse victimization factor was correlated with depressive symptoms and physical, psychological, and sexual partner abuse victimization, supporting the convergent validity of the measure. The overall prevalence of victimization by cyber abuse was 40%, with victimization by specific acts ranging from 2-31%. Men and women did not differ in their victimization by cyber abuse. Cyber abuse is prevalent among college students and occurs concurrently with other partner abuse forms and depressive symptoms. Given the interrelated nature of partner abuse forms, prevention and intervention programs should address partner abuse occurring in-person and through technology. Cyber abuse should also be considered in the conceptualization and measurement of partner abuse to more fully understand this social problem.
Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying.
Modecki, Kathryn L; Minchin, Jeannie; Harbaugh, Allen G; Guerra, Nancy G; Runions, Kevin C
2014-11-01
Bullying involvement in any form can have lasting physical and emotional consequences for adolescents. For programs and policies to best safeguard youth, it is important to understand prevalence of bullying across cyber and traditional contexts. We conducted a thorough review of the literature and identified 80 studies that reported corresponding prevalence rates for cyber and traditional bullying and/or aggression in adolescents. Weighted mean effect sizes were calculated, and measurement features were entered as moderators to explain variation in prevalence rates and in traditional-cyber correlations within the sample of studies. Prevalence rates for cyber bullying were lower than for traditional bullying, and cyber and traditional bullying were highly correlated. A number of measurement features moderated variability in bullying prevalence; whereas a focus on traditional relational aggression increased correlations between cyber and traditional aggressions. In our meta-analytic review, traditional bullying was twice as common as cyber bullying. Cyber and traditional bullying were also highly correlated, suggesting that polyaggression involvement should be a primary target for interventions and policy. Results of moderation analyses highlight the need for greater consensus in measurement approaches for both cyber and traditional bullying. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
Hemphill, Sheryl A; Tollit, Michelle; Kotevski, Aneta; Heerde, Jessica A
2015-09-01
The purpose of the present article is to compare the individual, peer, family, and school risk and protective factors for both traditional and cyber-bullying victimization. This article draws on data from 673 students from Victoria, Australia, to examine Grade 7 (aged 12-13 years) predictors of traditional and cyber-bullying victimization in Grade 9 (aged 14-15 years). Participants completed a modified version of the Communities That Care youth survey. There were few similarities and important differences in the predictors of traditional and cyber-bullying victimization. For Grade 9 cyber-bullying victimization, in the fully adjusted model, having been a victim of traditional bullying in Grade 7 and emotional control in Grade 7 were predictors. For Grade 9 traditional bullying victimization, predictors were Grade 7 traditional bullying victimization, association with antisocial peers, and family conflict, with family attachment and emotional control marginally statistically significant. The use of evidence-based bullying prevention programs is supported to reduce experiences of both traditional and cyber-bullying victimization, as is the implementation of programs to assist students to regulate their emotions effectively. In addition, traditional bullying victimization may be reduced by addressing association with antisocial friends, family conflict, and bonding to families. © The Author(s) 2014.
The past, present and future of cyber-physical systems: a focus on models.
Lee, Edward A
2015-02-26
This paper is about better engineering of cyber-physical systems (CPSs) through better models. Deterministic models have historically proven extremely useful and arguably form the kingpin of the industrial revolution and the digital and information technology revolutions. Key deterministic models that have proven successful include differential equations, synchronous digital logic and single-threaded imperative programs. Cyber-physical systems, however, combine these models in such a way that determinism is not preserved. Two projects show that deterministic CPS models with faithful physical realizations are possible and practical. The first project is PRET, which shows that the timing precision of synchronous digital logic can be practically made available at the software level of abstraction. The second project is Ptides (programming temporally-integrated distributed embedded systems), which shows that deterministic models for distributed cyber-physical systems have practical faithful realizations. These projects are existence proofs that deterministic CPS models are possible and practical.
The Past, Present and Future of Cyber-Physical Systems: A Focus on Models
Lee, Edward A.
2015-01-01
This paper is about better engineering of cyber-physical systems (CPSs) through better models. Deterministic models have historically proven extremely useful and arguably form the kingpin of the industrial revolution and the digital and information technology revolutions. Key deterministic models that have proven successful include differential equations, synchronous digital logic and single-threaded imperative programs. Cyber-physical systems, however, combine these models in such a way that determinism is not preserved. Two projects show that deterministic CPS models with faithful physical realizations are possible and practical. The first project is PRET, which shows that the timing precision of synchronous digital logic can be practically made available at the software level of abstraction. The second project is Ptides (programming temporally-integrated distributed embedded systems), which shows that deterministic models for distributed cyber-physical systems have practical faithful realizations. These projects are existence proofs that deterministic CPS models are possible and practical. PMID:25730486
ViNEL: A Virtual Networking Lab for Cyber Defense Education
ERIC Educational Resources Information Center
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie
2018-01-01
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
An Examination of the Partner Cyber Abuse Questionnaire in a College Student Sample
Wolford-Clevenger, Caitlin; Zapor, Heather; Brasfield, Hope; Febres, Jeniimarie; Elmquist, JoAnna; Brem, Meagan; Shorey, Ryan C.; Stuart, Gregory L.
2015-01-01
Objective To examine the factor structure and convergent validity of a newly developed measure of an understudied form of partner abuse, cyber abuse, and to examine the prevalence of, and gender differences in, victimization by cyber abuse. Method College students in a dating relationship (N = 502) completed the Partner Cyber Abuse Questionnaire (Hamby, 2013), as well as measures of partner abuse victimization and depression. Results Using exploratory factor analysis, we determined a one-factor solution was the most statistically and conceptually best fitting model. The cyber abuse victimization factor was correlated with depressive symptoms and physical, psychological, and sexual partner abuse victimization, supporting the convergent validity of the measure. The overall prevalence of victimization by cyber abuse was 40%, with victimization by specific acts ranging from 2–31%. Men and women did not differ in their victimization by cyber abuse. Conclusions Cyber abuse is prevalent among college students and occurs concurrently with other partner abuse forms and depressive symptoms. Given the interrelated nature of partner abuse forms, prevention and intervention programs should address partner abuse occurring in-person and through technology. Cyber abuse should also be considered in the conceptualization and measurement of partner abuse to more fully understand this social problem. PMID:27014498
CyberArts: Exploring Art and Technology.
ERIC Educational Resources Information Center
Jacobson, Linda, Ed.
This book takes the position that CyberArts(TM) is the new frontier in creativity, where the worlds of science and art meet. Computer technologies, visual design, music and sound, education and entertainment merge to form the new artistic territory of interactive multimedia. This diverse collection of essays, articles, and commentaries…
Cyber Savvy: Embracing Digital Safety and Civility
ERIC Educational Resources Information Center
Willard, Nancy
2012-01-01
Concerns about children's online safety have evolved from protecting them to focusing on encouraging positive social norms, transmitting effective skills, and encouraging students to be helpful allies. In fact, federal law now requires schools that receive funding to educate students about cyber safety. Nancy Willard integrates her expertise in…
Axelrod, Robert; Iliev, Rumen
2014-01-28
Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.
75 FR 26171 - Cyber Security Certification Program
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-11
...-sector auditors who will examine those provider's adherence to stringent cyber security practices that... the auditors who will conduct security assessments of communications service providers; (3) establish... whether the auditors should also be private-sector entities. If so, in order to prevent conflicts of...
Cyber Security--Are You Prepared?
ERIC Educational Resources Information Center
Newman, Scott
2007-01-01
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Recommended Practice: Creating Cyber Forensics Plans for Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eric Cornelius; Mark Fabro
Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are notmore » comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.« less
Experiences in using the CYBER 203 for three-dimensional transonic flow calculations
NASA Technical Reports Server (NTRS)
Melson, N. D.; Keller, J. D.
1982-01-01
In this paper, the authors report on some of their experiences modifying two three-dimensional transonic flow programs (FLO22 and FLO27) for use on the NASA Langley Research Center CYBER 203. Both of the programs discussed were originally written for use on serial machines. Several methods were attempted to optimize the execution of the two programs on the vector machine, including: (1) leaving the program in a scalar form (i.e., serial computation) with compiler software used to optimize and vectorize the program, (2) vectorizing parts of the existing algorithm in the program, and (3) incorporating a new vectorizable algorithm (ZEBRA I or ZEBRA II) in the program.
A computer program for analyzing unresolved Mossbauer hyperfine spectra
NASA Technical Reports Server (NTRS)
Schiess, J. R.; Singh, J. J.
1978-01-01
The program for analyzing unresolved Mossbauer hyperfine spectra was written in FORTRAN 4 language for the Control Data CYBER 170 series digital computer system with network operating system 1.1. With the present dimensions, the program requires approximately 36,000 octal locations of core storage. A typical case involving two innermost coordination shells in which the amplitudes and the peak positions of all three components were estimated in 25 iterations requires 30 seconds on CYBER 173. The program was applied to determine the effects of various near neighbor impurity shells on hyperfine fields in dilute FeAl alloys.
Trompeter, Nora; Bussey, Kay; Fitzpatrick, Sally
2018-07-01
Cyber victimization has consistently been associated with internalizing difficulties in adolescents. However, the underlying psychological mechanisms linking this relationship have not been adequately examined. The present study aimed to investigate the mediational roles of coping self-efficacy and emotion dysregulation in the relationships between cyber victimization with depression and social anxiety. Participants were 459 students (199 girls) from independent middle-class schools in grades 8 (M age = 13 years 9 months) and 10 (M age = 15 years 7 months). They completed a self-report questionnaire about cyberbullying participation, internalizing symptoms, coping self-efficacy, and emotion dysregulation. Structural equation modeling revealed that most domains of coping self-efficacy and emotion dysregulation partially mediated the relationship between cyber victimization and depression, and fully mediated the relationship between cyber victimization and social anxiety. The results highlight the importance of targeting these mediating factors in intervention programs to reduce the negative impact of cyber victimization on adolescents.
Parents and Educators [Tip Card
ERIC Educational Resources Information Center
US Department of Homeland Security, 2011
2011-01-01
Stop.Think.Connect. is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. The Campaign's main objective is to help individuals become more aware of growing cyber threats and arm them with the tools to protect themselves, their families,…
Video Games as a Training Tool to Prepare the Next Generation of Cyber Warriors
2014-10-01
2. REPORT TYPE N/A 3. DATES COVERED - 4 . TITLE AND SUBTITLE Video Games as a Training Tool to Prepare the Next Generation of Cyber Warriors...CYBERSECURITY WORKFORCE SHORTAGE .......................................................................... 3 4 1.1 GREATER CYBERSECURITY EDUCATION IS... 4 6 2.1 HOW VIDEO GAMES CAN BE EFFECTIVE LEARNING TOOLS
Cyberaggression among Adolescents: Prevalence and Gender Differences
ERIC Educational Resources Information Center
Álvarez-García, David; Barreiro-Collazo, Alejandra; Núñez, José-Carlos
2017-01-01
The objective of the present work is to analyse the prevalence of cyber-aggression and cyber-victimization among adolescents in Asturias (Spain) and to identify possible gender differences. To this end, 3,175 adolescents aged 12 to 18 years were randomly selected from the student population attending compulsory secondary education in Asturias and…
Adult Basic Education and the Cyber Classroom
ERIC Educational Resources Information Center
Johnson-Bailey, Juanita
2016-01-01
In this brief article, the author expresses her greatest concerns regarding learning in the cyber world: the appropriateness of online learning for courses with sensitive subject matter, the comfort level of nontraditional learners in this new setting, and the inability as an instructor to fully engage with the learner in real time. As an adult…
Hemphill, Sheryl A.; Heerde, Jessica A.
2014-01-01
Purpose The purpose of the current paper was to examine the adolescent risk and protective factors (at the individual, peer group, and family level) for young adult cyber-bullying perpetration and victimization. Methods Data from 2006 (Grade 9) to 2010 (young adulthood) were analyzed from a community sample of 927 Victorian students originally recruited as a state-wide representative sample in Grade 5 (age 10–11 years) in 2002 and followed up to age 18–19 years in 2010 (N = 809). Participants completed a self-report survey on adolescent risk and protective factors and traditional and cyber-bullying perpetration and victimization, and young adult cyber-bullying perpetration and victimization. Results As young adults, 5.1% self-reported cyber-bullying perpetration only, 5.0% cyber-bullying victimization only, and 9.5% reported both cyber-bullying perpetration and victimization. In fully adjusted logistic regression analyses, the adolescent predictors of cyber-bullying perpetration only were traditional bullying perpetration, traditional bullying perpetration and victimization, and poor family management. For young adulthood cyber-bullying victimization only, the adolescent predictor was emotion control. The adolescent predictors for young adult cyber-bullying perpetration and victimization were traditional bullying perpetration and cyber-bullying perpetration and victimization. Conclusions Based on the results of this study, possible targets for prevention and early intervention are reducing adolescent involvement in (traditional or cyber-) bullying through the development of social skills and conflict resolution skills. In addition, another important prevention target is to support families with adolescents to ensure they set clear rules and monitor adolescent’s behavior. Universal programs that assist adolescents to develop skills in emotion control are warranted. PMID:24939014
GeoBrain Computational Cyber-laboratory for Earth Science Studies
NASA Astrophysics Data System (ADS)
Deng, M.; di, L.
2009-12-01
Computational approaches (e.g., computer-based data visualization, analysis and modeling) are critical for conducting increasingly data-intensive Earth science (ES) studies to understand functions and changes of the Earth system. However, currently Earth scientists, educators, and students have met two major barriers that prevent them from being effectively using computational approaches in their learning, research and application activities. The two barriers are: 1) difficulties in finding, obtaining, and using multi-source ES data; and 2) lack of analytic functions and computing resources (e.g., analysis software, computing models, and high performance computing systems) to analyze the data. Taking advantages of recent advances in cyberinfrastructure, Web service, and geospatial interoperability technologies, GeoBrain, a project funded by NASA, has developed a prototype computational cyber-laboratory to effectively remove the two barriers. The cyber-laboratory makes ES data and computational resources at large organizations in distributed locations available to and easily usable by the Earth science community through 1) enabling seamless discovery, access and retrieval of distributed data, 2) federating and enhancing data discovery with a catalogue federation service and a semantically-augmented catalogue service, 3) customizing data access and retrieval at user request with interoperable, personalized, and on-demand data access and services, 4) automating or semi-automating multi-source geospatial data integration, 5) developing a large number of analytic functions as value-added, interoperable, and dynamically chainable geospatial Web services and deploying them in high-performance computing facilities, 6) enabling the online geospatial process modeling and execution, and 7) building a user-friendly extensible web portal for users to access the cyber-laboratory resources. Users can interactively discover the needed data and perform on-demand data analysis and modeling through the web portal. The GeoBrain cyber-laboratory provides solutions to meet common needs of ES research and education, such as, distributed data access and analysis services, easy access to and use of ES data, and enhanced geoprocessing and geospatial modeling capability. It greatly facilitates ES research, education, and applications. The development of the cyber-laboratory provides insights, lessons-learned, and technology readiness to build more capable computing infrastructure for ES studies, which can meet wide-range needs of current and future generations of scientists, researchers, educators, and students for their formal or informal educational training, research projects, career development, and lifelong learning.
Cybersecurity:The Road Ahead for Defense Acquisition
2016-06-01
tion programs. A key challenge for DoD acquisition addressing the cyber threat is how do we “ bake in” cybersecurity for our DoD ac- quisition programs...cybersecurity must be “ baked in” the design of our warfighting systems. Supporting policy and best practices for effective cyberse- curity in acquisition...contacted at steve.mills@dau.mil and steve.monks@ dau.mil. A key challenge for DoD acquisition addressing the cyber threat is how do we “ bake in” cybersecurity for our DoD acquisition programs vs. “bolting it on.”
A computer program for estimation from incomplete multinomial data
NASA Technical Reports Server (NTRS)
Credeur, K. R.
1978-01-01
Coding is given for maximum likelihood and Bayesian estimation of the vector p of multinomial cell probabilities from incomplete data. Also included is coding to calculate and approximate elements of the posterior mean and covariance matrices. The program is written in FORTRAN 4 language for the Control Data CYBER 170 series digital computer system with network operating system (NOS) 1.1. The program requires approximately 44000 octal locations of core storage. A typical case requires from 72 seconds to 92 seconds on CYBER 175 depending on the value of the prior parameter.
Axelrod, Robert; Iliev, Rumen
2014-01-01
Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran’s nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide. PMID:24474752
Gradinger, Petra; Yanagida, Takuya; Strohmeier, Dagmar; Spiel, Christiane
2016-01-01
We investigated whether the general anti-bullying program ViSC sustainably prevents cyberbullying and cyber-victimization. A longitudinal randomized control group design was used to examine (i) program effectiveness immediately after a 1 year implementation phase and (ii) sustainable program effects 6 months later taking several moderators on the class level (class climate and ethnic diversity) and on the individual level (gender, age, internet usage, traditional bullying/victimization) into account. Effectiveness (e.g., the change between waves 2 and 1) was examined in 2,042 students (47.6% girls), aged 11.7 years (SD = 0.88) enrolled in 18 schools and 103 classes. Sustainability (e.g., the change between waves 3 and 2) was examined in a sub-sample of 6 schools and 35 classes comprising 659 students. The self-assessment multiple-item scales showed longitudinal and multiple group invariance. Factor scores were extracted to compute difference scores for effectiveness (Posttest minus Pretest) and sustainability (Follow-up test minus Posttest) for cyberbullying and cyber-victimization. Multilevel Modeling was applied to examine (i) the effectiveness and (ii) the sustainability of the ViSC intervention controlling for several individual and class level variables. Controlling for covariates, it was demonstrated that the ViSC program is effective in preventing cyberbullying and cyber-victimization and that the effects are sustainable after 6 months. The consequences for cyberbullying prevention are discussed. © 2016 Wiley Periodicals, Inc.
LASL benchmark performance 1978. [CDC STAR-100, 6600, 7600, Cyber 73, and CRAY-1
DOE Office of Scientific and Technical Information (OSTI.GOV)
McKnight, A.L.
1979-08-01
This report presents the results of running several benchmark programs on a CDC STAR-100, a Cray Research CRAY-1, a CDC 6600, a CDC 7600, and a CDC Cyber 73. The benchmark effort included CRAY-1's at several installations running different operating systems and compilers. This benchmark is part of an ongoing program at Los Alamos Scientific Laboratory to collect performance data and monitor the development trend of supercomputers. 3 tables.
Kids Food CyberClub. Teacher's Guide. First Edition.
ERIC Educational Resources Information Center
Belyea, Monica
This guide is designed to help teachers educate students to be healthier now and in the future. It presents fun, learner-centered activities about nutrition, food, hunger, and food sources. It offers an overview of each section of the Kids Food CyberClub web site, and classroom activities teachers can use to expand on information students will…
Defining Differentiation in Cyber Schools: What Online Teachers Say
ERIC Educational Resources Information Center
Beasley, Jennifer G.; Beck, Dennis E.
2017-01-01
Online education has grown over the last ten years and with it has been an increase in diverse learners. In an effort to understand how online teachers meet the needs of diverse learners, researchers surveyed teachers in two cyber schools. 118 participants were asked their definition of differentiation and how differentiation is seen in their…
University Students' Views about Their Cyber Bullying Behaviors and Self-Exposition
ERIC Educational Resources Information Center
Usta, Ertugrul
2017-01-01
The purpose of this research is to examine the views of university students on the presence and exposure of cyber bully behavior. The research study group consists of 10 male students who are higher education students. One of the qualitative research methods is "case study". In this direction, a "semi-structured interview form"…
ERIC Educational Resources Information Center
Shamel, Kimberly A.
2013-01-01
Bullying is a large scale social problem impacting educational systems nationwide, and has been linked to negative outcomes for both bullies and targets. Bullying has become more highly technological and is most often referred to as cyber bullying. Bullies have begun to use the internet, social networking sites, e-mail, instant messaging (IM),…
Using Student Voice to Examine Teacher Practices at a Cyber Charter High School
ERIC Educational Resources Information Center
Borup, Jered; Stevens, Mark A.
2017-01-01
Efforts to identify K-12 online instructional best practices and standards have been limited because they largely ignored students' voice--the primary stakeholder in any educational context. In this case study, we conducted 20 interviews among 10 students enrolled in a cyber charter high school. Qualitative analysis of interviews found that…
Cyber bullying behaviors among middle and high school students.
Mishna, Faye; Cook, Charlene; Gadalla, Tahany; Daciuk, Joanne; Solomon, Steven
2010-07-01
Little research has been conducted that comprehensively examines cyber bullying with a large and diverse sample. The present study examines the prevalence, impact, and differential experience of cyber bullying among a large and diverse sample of middle and high school students (N = 2,186) from a large urban center. The survey examined technology use, cyber bullying behaviors, and the psychosocial impact of bullying and being bullied. About half (49.5%) of students indicated they had been bullied online and 33.7% indicated they had bullied others online. Most bullying was perpetrated by and to friends and participants generally did not tell anyone about the bullying. Participants reported feeling angry, sad, and depressed after being bullied online. Participants bullied others online because it made them feel as though they were funny, popular, and powerful, although many indicated feeling guilty afterward. Greater attention is required to understand and reduce cyber bullying within children's social worlds and with the support of educators and parents.
The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.
Dawson, Jessica; Thomson, Robert
2018-01-01
One of the challenges in writing an article reviewing the current state of cyber education and workforce development is that there is a paucity of quantitative assessment regarding the cognitive aptitudes, work roles, or team organization required by cybersecurity professionals to be successful. In this review, we argue that the people who operate within the cyber domain need a combination of technical skills, domain specific knowledge, and social intelligence to be successful. They, like the networks they operate, must also be reliable, trustworthy, and resilient. Defining the knowledge, skills, attributes, and other characteristics is not as simple as defining a group of technical skills that people can be trained on; the complexity of the cyber domain makes this a unique challenge. There has been little research devoted to exactly what attributes individuals in the cyber domain need. What research does exist places an emphasis on technical and engineering skills while discounting the important social and organizational influences that dictate success or failure in everyday settings. This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars.
The Students' Experiences of Ethics in Online Systems: A Phenomenological Study
ERIC Educational Resources Information Center
Mosalanejad, Leili; Dehghani, Ali; Abdolahifard, Khadije
2014-01-01
Cyber ethics is the philosophical study of ethics pertaining to computer networks encompassing users' behavior, what networked computers are programmed to do, and how this affects the individuals and the society. This study aimed to investigate the students' experiences of ethics in cyber systems.In the present study, the researchers conducted…
2017-02-01
SUPPLEMENTARY NOTES 14. ABSTRACT The goal of this research project is to develop, test, analyze and assess cybersecurity tactical and strategic gaming ...the next generation of cyber experts through education and hands-on defense gaming strategies. The USCC participated in the White House Cybersecurity...heatmap.htmlThe role of cybersecurity competitions in workforce development https://www.cybercompex.org/clip/cybersecurity- games -building-tomorrow-s
Cyber Compendium, Professional Continuing Education Course Papers. Volume 2, Issue 1, Spring 2015
2015-01-01
250,000 mobile devices.23 Cutting just 20% of this infrastructure would translate to a potential savings of over $7 Billion per year. Air...BYOD device extends beyond the device itself. There is the supporting infrastructure such as the Mobile Application Store (MAS), which provides access...96 Prioritizing Cyber Capabilities: to Protect U.S. Critical Infrastructure
If It's about Me, Why Do It without Me? Genuine Student Engagement in School Cyberbullying Education
ERIC Educational Resources Information Center
Cross, Donna; Lester, Leanne; Barnes, Amy; Cardoso, Patricia; Hadwen, Kate
2015-01-01
This study reports on a three-year group randomized controlled trial, the Cyber Friendly Schools Project (CFSP), aimed to reduce cyberbullying among grade 8 students during 2010-2012. In each year, 14-15 year old student "cyber" leaders acted as catalysts to develop and implement whole-school activities to reduce cyberbullying-related…
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
Hemphill, Sheryl A.; Kotevski, Aneta; Tollit, Michelle; Smith, Rachel; Herrenkohl, Todd I.; Toumbourou, John W.; Catalano, Richard F.
2013-01-01
Purpose Cyber bullying perpetration (using communication technology to engage in bullying) is a recent phenomenon that has generated much concern. There are few prospective longitudinal studies of cyber bullying. The current paper examines the individual, peer, family and school risk factors for both cyber and traditional bullying (the latter is bullying that does not utilize technology) in adolescents. Methods This paper draws on a rich data set from the International Youth Development Study, a longitudinal study of students in Victoria, Australia and Washington State, United States, which began in 2002. In this paper, data from almost 700 Victorian students recruited in Grade 5 is analyzed to examine Grade 7 (aged 12-13 years) predictors of traditional and cyber bullying perpetration in Grade 9 (aged 14-15 years). Results Fifteen per cent of students engaged in cyber bullying, 21% in traditional bullying and 7% in both. There are similarities and important differences in the predictors of cyber and traditional bullying. In the fully adjusted model, only prior engagement in relational aggression (a covert form of bullying such as spreading rumors about another student) predicted cyber bullying perpetration. For traditional bullying, previous relational aggression was also predictive, as was having been a victim and perpetrator of traditional bullying, family conflict, and academic failure. Conclusions The use of evidence-based bullying prevention programs is supported to reduce experiences of all forms of bullying perpetration(cyber, traditional, and relational aggression). In addition, for traditional bullying perpetration, addressing family conflict and student academic support are also important. PMID:22727078
Research Note--A Pilot Cyber Counseling Course in a Graduate Social Work Program
ERIC Educational Resources Information Center
Mishna, Faye; Tufford, Lea; Cook, Charlene; Bogo, Marion
2013-01-01
Cyber counseling is a new and growing medium for offering mental health services to children and youth. However, there is a lack of identification of the core competencies required to provide effective online counseling. A school of social work, in partnership with a national service agency providing online counseling to children and youth,…
The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance
Dawson, Jessica; Thomson, Robert
2018-01-01
One of the challenges in writing an article reviewing the current state of cyber education and workforce development is that there is a paucity of quantitative assessment regarding the cognitive aptitudes, work roles, or team organization required by cybersecurity professionals to be successful. In this review, we argue that the people who operate within the cyber domain need a combination of technical skills, domain specific knowledge, and social intelligence to be successful. They, like the networks they operate, must also be reliable, trustworthy, and resilient. Defining the knowledge, skills, attributes, and other characteristics is not as simple as defining a group of technical skills that people can be trained on; the complexity of the cyber domain makes this a unique challenge. There has been little research devoted to exactly what attributes individuals in the cyber domain need. What research does exist places an emphasis on technical and engineering skills while discounting the important social and organizational influences that dictate success or failure in everyday settings. This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars. PMID:29946276
ERIC Educational Resources Information Center
Shin, Ji Hye; Albers, Peggy
2015-01-01
This study examined the effectiveness of a Cyber Home Learning System (CHLS), an online learning system currently being employed in South Korea to improve the access and quality of public education as well as to reduce private tutoring expenditures. The quasi-experimental research design used experiment and survey methods to learn about the impact…
U.S. Cyber Command Support to Geographic Combatant Commands
2011-03-02
State Association of Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher Education is an...the Middle States Association of Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher...Defense Regarding Cybersecurity. 33 The NCCIC is augmented by the Cyber Unified Coordination Group ( UCG ) made up of public and private sector officials
[HIV prevention program for young people--the WYSH Project as a model of "combination prevention"].
Ono-Kihara, Masako
2010-03-01
In face of the HIV pandemic that still grows, unsuccessful efforts of developing biomedical control measures or the failure of cognitive-behavioral approach to show sustained social level effectiveness, behavioral strategy is now expected to evolve into a structural prevention ("combination prevention") that involves multiple behavioral goals and multilevel approaches. WYSH Project is a combination prevention project for youth developed through socio-epidemiological approach that integrates epidemiology with social science such as social marketing and mixed method. WYSH Project includes mass education programs for youth in schools and programs for out-of-school youth through cyber network and peer communication. Started in 2002, it expanded nationwide with supports from related ministries and parent-teacher associations and has grown into a single largest youth prevention project in Japan.
The Penn State ``Cyber Wind Facility''
NASA Astrophysics Data System (ADS)
Brasseur, James; Vijayakumar, Ganesh; Lavely, Adam; Nandi, Tarak; Jayaraman, Balaji; Jha, Pankaj; Dunbar, Alex; Motta-Mena, Javier; Haupt, Sue; Craven, Brent; Campbell, Robert; Schmitz, Sven; Paterson, Eric
2012-11-01
We describe development and results from a first generation Penn State ``Cyber Wind Facility'' (CWF). The aim of the CWF program is to develop and validate a computational ``facility'' that, in the most powerful HPC environments, will be basis for the design and implementation of cyber ``experiments'' at a level of complexity, fidelity and resolution to be treated similarly to field experiments on wind turbines operating in true atmospheric environments. We see cyber experiments as complimentary to field experiments in the sense that, whereas field data can record over ranges of events not representable in the cyber environment, with sufficient resolution, numerical accuracy, and HPC power, it is theoretically possible to collect cyber data from more true, albeit canonical, atmospheric environments can produce data from extraordinary numbers of sensors impossible to obtain in the field. I will describe our first generation CWF, from which we have quantified and analyzed useful details of the interactions between atmospheric turbulence and wind turbine loadings for an infinitely stiff commercial-scale turbine rotor in a canonical convective daytime atmospheric boundary layer over horizontally homogeneous rough flat terrain. Supported by the DOE Offshore Initiative and the National Science Foundation.
Cyber situation awareness as distributed socio-cognitive work
NASA Astrophysics Data System (ADS)
Tyworth, Michael; Giacobe, Nicklaus A.; Mancuso, Vincent
2012-06-01
A key challenge for human cybersecurity operators is to develop an understanding of what is happening within, and to, their network. This understanding, or situation awareness, provides the cognitive basis for human operators to take action within their environments. Yet developing situation awareness of cyberspace (cyber-SA) is understood to be extremely difficult given the scope of the operating environment, the highly dynamic nature of the environment and the absence of physical constraints that serve to bound the cognitive task23. As a result, human cybersecurity operators are often "flying blind" regarding understanding the source, nature, and likely impact of malicious activity on their networked assets. In recent years, many scholars have dedicated their attention to finding ways to improve cyber-SA in human operators. In this paper we present our findings from our ongoing research of how cybersecurity analysts develop and maintain cyber-SA. Drawing from over twenty interviews of analysts working in the military, government, industrial, and educational domains, we find that cyber-SA to be distributed across human operators and technological artifacts operating in different functional areas.
2016-07-13
adequate security testing , and segment their networks and systems into separate defended enclaves. Finally, cyber defenders should posi- tion themselves...explicitly tied to following security practices, and there should be consequences for security failures that are regularly tested via a continuing testing ...program. Users should be routinely tested and probed, and those who do not perform well should face escalating consequences. For example, cyber
Cyber Security Considerations for Autonomous Tactical Wheeled Vehicles
2016-04-01
extraordinarily significant (Office of the Press Secretary, 2015). The White House added that cybersecurity is a shared responsibility between the...cannot, nor would Americans want it to, provide cybersecurity for every private network. Therefore, the private sector plays a crucial role in our... Cybersecurity Initiative,” that established the procedures the Acquisition community should use to manage future of Acquisition programs. Cyber Security
NASA Astrophysics Data System (ADS)
Callaghan, S.; Maechling, P. J.; Juve, G.; Vahi, K.; Deelman, E.; Jordan, T. H.
2015-12-01
The CyberShake computational platform, developed by the Southern California Earthquake Center (SCEC), is an integrated collection of scientific software and middleware that performs 3D physics-based probabilistic seismic hazard analysis (PSHA) for Southern California. CyberShake integrates large-scale and high-throughput research codes to produce probabilistic seismic hazard curves for individual locations of interest and hazard maps for an entire region. A recent CyberShake calculation produced about 500,000 two-component seismograms for each of 336 locations, resulting in over 300 million synthetic seismograms in a Los Angeles-area probabilistic seismic hazard model. CyberShake calculations require a series of scientific software programs. Early computational stages produce data used as inputs by later stages, so we describe CyberShake calculations using a workflow definition language. Scientific workflow tools automate and manage the input and output data and enable remote job execution on large-scale HPC systems. To satisfy the requests of broad impact users of CyberShake data, such as seismologists, utility companies, and building code engineers, we successfully completed CyberShake Study 15.4 in April and May 2015, calculating a 1 Hz urban seismic hazard map for Los Angeles. We distributed the calculation between the NSF Track 1 system NCSA Blue Waters, the DOE Leadership-class system OLCF Titan, and USC's Center for High Performance Computing. This study ran for over 5 weeks, burning about 1.1 million node-hours and producing over half a petabyte of data. The CyberShake Study 15.4 results doubled the maximum simulated seismic frequency from 0.5 Hz to 1.0 Hz as compared to previous studies, representing a factor of 16 increase in computational complexity. We will describe how our workflow tools supported splitting the calculation across multiple systems. We will explain how we modified CyberShake software components, including GPU implementations and migrating from file-based communication to MPI messaging, to greatly reduce the I/O demands and node-hour requirements of CyberShake. We will also present performance metrics from CyberShake Study 15.4, and discuss challenges that producers of Big Data on open-science HPC resources face moving forward.
Bannink, Rienke; Broeren, Suzanne; van de Looij – Jansen, Petra M.; de Waart, Frouwkje G.; Raat, Hein
2014-01-01
Purpose To examine whether traditional and cyber bullying victimization were associated with adolescent's mental health problems and suicidal ideation at two-year follow-up. Gender differences were explored to determine whether bullying affects boys and girls differently. Methods A two-year longitudinal study was conducted among first-year secondary school students (N = 3181). Traditional and cyber bullying victimization were assessed at baseline, whereas mental health status and suicidal ideation were assessed at baseline and follow-up by means of self-report questionnaires. Logistic regression analyses were conducted to assess associations between these variables while controlling for baseline problems. Additionally, we tested whether gender differences in mental health and suicidal ideation were present for the two types of bullying. Results There was a significant interaction between gender and traditional bullying victimization and between gender and cyber bullying victimization on mental health problems. Among boys, traditional and cyber bullying victimization were not related to mental health problems after controlling for baseline mental health. Among girls, both traditional and cyber bullying victimization were associated with mental health problems after controlling for baseline mental health. No significant interaction between gender and traditional or cyber bullying victimization on suicidal ideation was found. Traditional bullying victimization was associated with suicidal ideation, whereas cyber bullying victimization was not associated with suicidal ideation after controlling for baseline suicidal ideation. Conclusions Traditional bullying victimization is associated with an increased risk of suicidal ideation, whereas traditional, as well as cyber bullying victimization is associated with an increased risk of mental health problems among girls. These findings stress the importance of programs aimed at reducing bullying behavior, especially because early-onset mental health problems may pose a risk for the development of psychiatric disorders in adulthood. PMID:24718563
Bannink, Rienke; Broeren, Suzanne; van de Looij-Jansen, Petra M; de Waart, Frouwkje G; Raat, Hein
2014-01-01
To examine whether traditional and cyber bullying victimization were associated with adolescent's mental health problems and suicidal ideation at two-year follow-up. Gender differences were explored to determine whether bullying affects boys and girls differently. A two-year longitudinal study was conducted among first-year secondary school students (N = 3181). Traditional and cyber bullying victimization were assessed at baseline, whereas mental health status and suicidal ideation were assessed at baseline and follow-up by means of self-report questionnaires. Logistic regression analyses were conducted to assess associations between these variables while controlling for baseline problems. Additionally, we tested whether gender differences in mental health and suicidal ideation were present for the two types of bullying. There was a significant interaction between gender and traditional bullying victimization and between gender and cyber bullying victimization on mental health problems. Among boys, traditional and cyber bullying victimization were not related to mental health problems after controlling for baseline mental health. Among girls, both traditional and cyber bullying victimization were associated with mental health problems after controlling for baseline mental health. No significant interaction between gender and traditional or cyber bullying victimization on suicidal ideation was found. Traditional bullying victimization was associated with suicidal ideation, whereas cyber bullying victimization was not associated with suicidal ideation after controlling for baseline suicidal ideation. Traditional bullying victimization is associated with an increased risk of suicidal ideation, whereas traditional, as well as cyber bullying victimization is associated with an increased risk of mental health problems among girls. These findings stress the importance of programs aimed at reducing bullying behavior, especially because early-onset mental health problems may pose a risk for the development of psychiatric disorders in adulthood.
Lo, Wai Kei
2009-01-01
The International Society for Peritoneal Dialysis (ISPD) was established in 1984. Throughout the years, the ISPD has been playing a pivotal role in the development of peritoneal dialysis (PD) through organizing congresses, publishing the Peritoneal Dialysis International formation of treatment and training guidelines, and supporting international studies. In recent years, it has enhanced its educational programs through organizing PD courses in developing countries, online education videos and a function 'Questions about PD' on its website. Several regional chapters - Asian, North American and Latin American - have been formed to target the special needs of different regions. To move forward, apart from enhancing the current activities, good use of cyber technology for out-reaching and educational purposes, and collaboration with other international or national societies particularly in the area of national policy making are envisaged.
Individual differences in cyber security behaviors: an examination of who is sharing passwords.
Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns.
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
Abstract In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697
NASA Astrophysics Data System (ADS)
Bandaragoda, C.; Castronova, A. M.; Phuong, J.; Istanbulluoglu, E.; Strauch, R. L.; Nudurupati, S. S.; Tarboton, D. G.; Wang, S. W.; Yin, D.; Barnhart, K. R.; Tucker, G. E.; Hutton, E.; Hobley, D. E. J.; Gasparini, N. M.; Adams, J. M.
2017-12-01
The ability to test hypotheses about hydrology, geomorphology and atmospheric processes is invaluable to research in the era of big data. Although community resources are available, there remain significant educational, logistical and time investment barriers to their use. Knowledge infrastructure is an emerging intellectual framework to understand how people are creating, sharing and distributing knowledge - which has been dramatically transformed by Internet technologies. In addition to the technical and social components in a cyberinfrastructure system, knowledge infrastructure considers educational, institutional, and open source governance components required to advance knowledge. We are designing an infrastructure environment that lowers common barriers to reproducing modeling experiments for earth surface investigation. Landlab is an open-source modeling toolkit for building, coupling, and exploring two-dimensional numerical models. HydroShare is an online collaborative environment for sharing hydrologic data and models. CyberGIS-Jupyter is an innovative cyberGIS framework for achieving data-intensive, reproducible, and scalable geospatial analytics using the Jupyter Notebook based on ROGER - the first cyberGIS supercomputer, so that models that can be elastically reproduced through cloud computing approaches. Our team of geomorphologists, hydrologists, and computer geoscientists has created a new infrastructure environment that combines these three pieces of software to enable knowledge discovery. Through this novel integration, any user can interactively execute and explore their shared data and model resources. Landlab on HydroShare with CyberGIS-Jupyter supports the modeling continuum from fully developed modelling applications, prototyping new science tools, hands on research demonstrations for training workshops, and classroom applications. Computational geospatial models based on big data and high performance computing can now be more efficiently developed, improved, scaled, and seamlessly reproduced among multidisciplinary users, thereby expanding the active learning curriculum and research opportunities for students in earth surface modeling and informatics.
Key issues and technical route of cyber physical distribution system
NASA Astrophysics Data System (ADS)
Zheng, P. X.; Chen, B.; Zheng, L. J.; Zhang, G. L.; Fan, Y. L.; Pei, T.
2017-01-01
Relying on the National High Technology Research and Development Program, this paper introduced the key issues in Cyber Physical Distribution System (CPDS), mainly includes: composite modelling method and interaction mechanism, system planning method, security defence technology, distributed control theory. Then on this basis, the corresponding technical route is proposed, and a more detailed research framework along with main schemes to be adopted is also presented.
Cyber Test Form Development and Follow-On Cyber Applications
2014-10-01
construct of mathematical reasoning, they also measure a second construct irrelevant dimension of baseball knowledge (Camilli & Shepard , 1994). We... Shepard , L. A. (1994). Methods for identifying biased test items. Newbury Park, CA: Sage. Campbell & D.J. Knapp (Eds.) (2001), Exploring the limits in...Applied Psychological Measurement, 7, 201-210. 26 Thissen, D. (2003). MULTILOG user’s guide, version 7.03 [computer program]. Chicago
Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Franusich, Michael D.
SpiralGen, Inc. built a proof-of-concept toolkit for enhancing the cyber security of nuclear power plants and other critical infrastructure with high-assurance instrumentation and control code. The toolkit is based on technology from the DARPA High-Assurance Cyber Military Systems (HACMS) program, which has focused on applying the science of formal methods to the formidable set of problems involved in securing cyber physical systems. The primary challenges beyond HACMS in developing this toolkit were to make the new technology usable by control system engineers and compatible with the regulatory and commercial constraints of the nuclear power industry. The toolkit, packaged as amore » Simulink add-on, allows a system designer to assemble a high-assurance component from formally specified and proven blocks and generate provably correct control and monitor code for that subsystem.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hamlet, Jason R.; Keliiaa, Curtis M.
This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes thatmore » may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.« less
Towards a Cyber-Constructivist Perspective (CCP) of Educational Design
ERIC Educational Resources Information Center
Luppicini, Rocci
2003-01-01
This theoretical paper utilizes cybernetic-based approaches (Bopry, 1999; Wiener, 1954) and communications theory (Habermas, 1984, 1990; Krippendorff, 1994) to advance knowledge of constructivist learning. I argue that past educational research literature on constructivist learning is partly responsible for limiting how educational designers…
Cyber dating abuse among teens using school-based health centers.
Dick, Rebecca N; McCauley, Heather L; Jones, Kelley A; Tancredi, Daniel J; Goldstein, Sandi; Blackburn, Samantha; Monasterio, Erica; James, Lisa; Silverman, Jay G; Miller, Elizabeth
2014-12-01
To estimate the prevalence of cyber dating abuse among youth aged 14 to 19 years seeking care at school-based health centers and associations with other forms of adolescent relationship abuse (ARA), sexual violence, and reproductive and sexual health indicators. A cross-sectional survey was conducted during the 2012-2013 school year (participant n = 1008). Associations between cyber dating abuse and study outcomes were assessed via logistic regression models for clustered survey data. Past 3-month cyber dating abuse was reported by 41.4% of this clinic-based sample. More female than male participants reported cyber dating abuse victimization (44.6% vs 31.0%). Compared with no exposure, low- ("a few times") and high-frequency ("once or twice a month" or more) cyber dating abuse were significantly associated with physical or sexual ARA (low: adjusted odds ratio [aOR] 2.8, 95% confidence interval [CI] 1.8-4.4; high: aOR 5.4, 95% CI 4.0-7.5) and nonpartner sexual assault (low: aOR 2.7, 95% CI 1.3-5.5; high: aOR 4.1, 95% CI 2.8-5.9). Analysis with female participants found an association between cyber dating abuse exposure and contraceptive nonuse (low: aOR 1.8, 95% CI 1.2-2.7; high: aOR 4.1, 95% CI 2.0-8.4) and reproductive coercion (low: aOR 3.0, 95% CI 1.4-6.2; high: aOR 5.7, 95% CI 2.8-11.6). Cyber dating abuse is common and associated with ARA and sexual assault in an adolescent clinic-based sample. The associations of cyber dating abuse with sexual behavior and pregnancy risk behaviors suggest a need to integrate ARA education and harm reduction counseling into sexual health assessments in clinical settings. Copyright © 2014 by the American Academy of Pediatrics.
Kennedy Space Center ITC-1 Internship Overview
NASA Technical Reports Server (NTRS)
Ni, Marcus
2011-01-01
As an intern for Priscilla Elfrey in the ITC-1 department, I was involved in many activities that have helped me to develop many new skills. I supported four different projects during my internship, which included the Center for Life Cycle Design (CfLCD), SISO Space Interoperability Smackdown, RTI Teacher Mentor Program, and the Discrete Event Simulation Integrated Visualization Environment Team (DIVE). I provided the CfLCD with web based research on cyber security initiatives involving simulation, education for young children, cloud computing, Otronicon, and Science, Technology, Engineering, and Mathematics (STEM) education initiatives. I also attended STEM meetings regarding simulation courses, and educational course enhancements. To further improve the SISO Simulation event, I provided observation feedback to the technical advisory board. I also helped to set up a chat federation for HLA. The third project involved the RTI Teacher Mentor program, which I helped to organize. Last, but not least, I worked with the DIVE team to develop new software to help visualize discrete event simulations. All of these projects have provided experience on an interdisciplinary level ranging from speech and communication to solving complex problems using math and science.
ERIC Educational Resources Information Center
Wu, Ejean; Lin, Wen-Chuan; Yang, Shu Ching
2013-01-01
This study examines the effects of two types of e-tutoring interventions (text-based vs. face-to-face videoconferencing, TB vs. F2F) on the grammar performance and motivation of low-achieving students. The study investigates the patterns of interaction between tutors and students in both platforms, including the manner in which tutors and students…
A Communication Protocol for CyAMS and the Cyber Fighter Associate Interface
2015-05-01
by David Harman , Scott Brown, Brian Henz, and Lisa M Marvel Approved for public release; distribution unlimited...Laboratory A Communication Protocol for CyAMS and the Cyber Fighter Associate Interface by David Harman College Qualified Leaders Student...CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) David Harman , Scott Brown, Brian Henz, and Lisa M Marvel 5d. PROJECT
Cyber Enabled Direct Digital Manufacturing
2015-05-15
5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) The Pennsylvania State University Applied Research Labotatory Office of...MONITORING AGENCY NAME(S) AND ADDRESS(ES) Office of Naval Research 875 North Randolph Street Arlington, VA 22203-1995 10. SPONSOR/MONITOR’S ACRONYM(S...the Office of Naval Research "Cyber Enabled Direct Digital Manufacturing" program, award N00014-11-1-0668 are discussed. Achievements include the
Virtually Forgotten: Special Education Students in Cyber Schools
ERIC Educational Resources Information Center
Carnahan, Chris; Fulton, Lacey
2013-01-01
The area of online K-12 education is experiencing rapid growth, yet practice has greatly surpassed the research. This article looks to add to the field by examining special education students enrolled in the Commonwealth of Pennsylvania. There were over 2600 students in the state that were identified as special education students and enrolled in…
The Role of Student Affairs in Distance Education: Cyber-Services or Virtual Communities
ERIC Educational Resources Information Center
Kretovics, Mark
2003-01-01
As distance education technology enables institutions of higher education to offer courses to students throughout the country, it is important for student affairs to offer opportunities for these students to connect with the institution. This article reviews the relevant literature on distance education and discusses differences between providing…
Cyber-intrusion Auto-response and Policy Management System (CAPMS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lusk, Steve; Lawrence, David; Suvana, Prakash
The Cyber-intrusion Auto-response and Policy Management System (CAPMS) project was funded by a grant from the US Department of Energy (DOE) Cybersecurity for Energy Delivery Systems (CEDS) program with contributions from two partner electric utilities: Southern California Edison (SCE) and Duke Energy. The goal of the project was to demonstrate protecting smart grid assets from a cyber attack in a way that “does not impede critical energy delivery functions.” This report summarizes project goals and activities for the CAPMS project and explores what did and did not work as expected. It concludes with an assessment of possible benefits and valuemore » of the system for the future.« less
A Cloud-Based Global Flood Disaster Community Cyber-Infrastructure: Development and Demonstration
NASA Technical Reports Server (NTRS)
Wan, Zhanming; Hong, Yang; Khan, Sadiq; Gourley, Jonathan; Flamig, Zachary; Kirschbaum, Dalia; Tang, Guoqiang
2014-01-01
Flood disasters have significant impacts on the development of communities globally. This study describes a public cloud-based flood cyber-infrastructure (CyberFlood) that collects, organizes, visualizes, and manages several global flood databases for authorities and the public in real-time, providing location-based eventful visualization as well as statistical analysis and graphing capabilities. In order to expand and update the existing flood inventory, a crowdsourcing data collection methodology is employed for the public with smartphones or Internet to report new flood events, which is also intended to engage citizen-scientists so that they may become motivated and educated about the latest developments in satellite remote sensing and hydrologic modeling technologies. Our shared vision is to better serve the global water community with comprehensive flood information, aided by the state-of-the- art cloud computing and crowdsourcing technology. The CyberFlood presents an opportunity to eventually modernize the existing paradigm used to collect, manage, analyze, and visualize water-related disasters.
SEI Software Engineering Education Directory.
1987-02-01
Software Design and Development Gilbert. Philip Systems: CDC Cyber 170/750 CDC Cyber 170760 DEC POP 11/44 PRIME AT&T 3B5 IBM PC IBM XT IBM RT...Macintosh VAx 8300 Software System Development and Laboratory CS 480/480L U P X T Textbooks: Software Design and Development Gilbert, Philip Systems: CDC...Acting Chair (618) 692-2386 Courses: Software Design and Development CS 424 U P E Y Textbooks: Software Design and Development, Gilbert, Philip Topics
Determinants of Student and Parent Satisfaction at a Cyber Charter School
ERIC Educational Resources Information Center
Beck, Dennis E.; Maranto, Robert; Lo, Wen-Juo
2014-01-01
Research indicates that in traditional public schools the subjective well-being of students and parents varies by gender, race, and special education status. Prior studies suggest that general education students are more satisfied with their schooling than special education students, that female students have greater satisfaction with their…
Cyber threats within civil aviation
NASA Astrophysics Data System (ADS)
Heitner, Kerri A.
Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.
Coping in the Cyberworld: Program Implementation and Evaluation--A Pilot Project
ERIC Educational Resources Information Center
Lam, Cecilia Wing Chi; Frydenberg, Erica
2009-01-01
As increasing numbers of adolescents become involved in online activities, many also become victims of cyberharassment. This pilot project investigates how a program teaching coping skills (Best of Coping program, BOC) and a program teaching cybersafety (Cyber Savvy Teens program, CST) can optimise adolescents' capacity to cope online.…
NASA Technical Reports Server (NTRS)
Gentzsch, W.
1982-01-01
Problems which can arise with vector and parallel computers are discussed in a user oriented context. Emphasis is placed on the algorithms used and the programming techniques adopted. Three recently developed supercomputers are examined and typical application examples are given in CRAY FORTRAN, CYBER 205 FORTRAN and DAP (distributed array processor) FORTRAN. The systems performance is compared. The addition of parts of two N x N arrays is considered. The influence of the architecture on the algorithms and programming language is demonstrated. Numerical analysis of magnetohydrodynamic differential equations by an explicit difference method is illustrated, showing very good results for all three systems. The prognosis for supercomputer development is assessed.
A Comparative Study of E-Learning System for Smart Education
ERIC Educational Resources Information Center
An, SangJin; Lee, Eunkyoung; Lee, YoungJun
2013-01-01
Korean government aims to implement SMART education nationwide, so it is planning many ways to provide digital learning contents. There are some ways of distributing digital contents, and each way has its own characteristics. Edunet is a nationwide system for providing educational resource. Cyber Home Learning System is a regional service which…
Weathering the Cyber Storm: The Military’s Resiliency to Cyber Attacks in Future Warfare
2012-06-01
observation. While the ability to collect intelligence is important, it falls under a different rubric than warfare itself. 20 Another term worth...the use of antivirus programs, firewalls, and security policies. These measures also fall under the rubric of information assurance, or “measures that...specifying how it is to be accomplished.” of genetic diversity. 13 A complaint after Operation Iraqi Freedom (OIF) was that soldiers had to
ERIC Educational Resources Information Center
Van Vooren, Scott E.
2017-01-01
This study harvested and synthesized information on K-12 online educators within the State of Pennsylvania through structured interviews and artifact evaluations. As parents, students, and the greater K-12 educational community look for innovative ways to increase rigor and student achievement in the 21st century, educational technology is viewed…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kuykendall, Tommie G.; Allsop, Jacob Lee; Anderson, Benjamin Robert
The cybersecurity consortium, which was established by DOE/NNSA’s Minority Serving Institutions Partnerships Program (MSIPP), allows students from any of the partner schools (13 HBCUs, two national laboratories, and a public school district) to have all consortia options available to them, to create career paths and to open doors to DOE sites and facilities to student members of the consortium. As a part of this year consortium activities, Sandia National Laboratories and the University of Virgin Islands conducted a week long cyber workshop that consisted of three courses; Digital Forensics and Malware Analysis, Python Programming, and ThunderBird Cup. These courses aremore » designed to enhance cyber defense skills and promote learning within STEM related fields.« less
Final LDRD Report: Using Linkography of Cyber Attack Patterns to Inform Honeytoken Placement.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mitchell, Robert; Jarocki, John Charles; Fisher, Andrew N
The war to establish cyber supremacy continues, and the literature is crowded with strictly technical cyber security measures. We present the results of a three year LDRD project using Linkography, a methodology new to the field of cyber security, we establish the foundation neces- sary to track and profile the microbehavior of humans attacking cyber systems. We also propose ways to leverage this understanding to influence and deceive these attackers. We studied the sci- ence of linkography, applied it to the cyber security domain, implemented a software package to manage linkographs, generated the preprocessing blocks necessary to ingest raw data,more » produced machine learning models, created ontology refinement algorithms and prototyped a web applica- tion for researchers and practitioners to apply linkography. Machine learning produced some of our key results: We trained and validated multinomial classifiers with a real world data set and predicted the attacker's next category of action with 86 to 98% accuracy; dimension reduction techniques indicated that the linkography-based features were among the most powerful. We also discovered ontology refinement algorithms that advanced the state of the art in linkography in general and cyber security in particular. We conclude that linkography is a viable tool for cyber security; we look forward to expanding our work to other data sources and using our prediction results to enable adversary deception techniques. Acknowledgements Thanks to Phil Bennett, Michael Bernard, Jeffrey Bigg, Marshall Daniels, Tyler Dean, David Dug- gan, Carson Kent, Josh Maine, Marci McBride, Nick Peterson, Katie Rodhouse, Asael Sorenson, Roger Suppona, Scott Watson and David Zage. We acknowledge support for this work by the LDRD Program at Sandia National Laboratories. Sandia National Laboratories is a multi-mission laboratory operated by Sandia Corporation for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. This page intentionally left blank.« less
2015-03-13
A. Lee. “A Programming Model for Time - Synchronized Distributed Real- Time Systems”. In: Proceedings of Real Time and Em- bedded Technology and Applications Symposium. 2007, pp. 259–268. ...From MetroII to Metronomy, Designing Contract-based Function-Architecture Co-simulation Framework for Timing Verification of Cyber-Physical Systems...the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data
Olenik-Shemesh, Dorit; Heiman, Tali
2017-01-01
The authors examined cyberbullying victimization in the context of issues of key importance to youth: body esteem, social support, and social self-efficacy. Research has found that traditional peer-bullying victimization is significantly correlated with low body esteem in Western societies, especially pertaining to weight (R. Puhl & J. Luedicke, 2012 ). Studies have also found a relationship among bullying victimization, appearance-related bullying, low body esteem, and psychosocial difficulties among youth (L. E. Park, R. M. Calogero, A.F. Young, & A. Diraddo, 2010 ). However, the emergence of cyberbullying, characterized by its own special features (P. K. Smith et al., 2008 ), has raised a salient need to explore the relationship between cyber victimization and body esteem, no less important with social framework, because both are key components in adolescents' lives that may be associated with cyberbullying victimization. The authors examined these relationships among 204 Israeli adolescents 14-16 years old. The results indicate a noteworthy prevalence (45%) of cyber victims. Cyber victimization is significantly correlated with low body esteem and low social support and social self-efficacy. Low body esteem and low social support predicted the probability of being a cyber victim. The results extend the knowledge about potential personal and social risk factors for cyber victimization during adolescence. Implications for specific intervention programs are discussed.
School Choice in Philadelphia.
ERIC Educational Resources Information Center
Keefe, Connie; Scher, Lauren; Sparks, Andrew; Weinbaum, Elliot
Throughout the country, a wide range of educational options exist, from neighborhood public schools to cyber-schools. This study focuses on school choice in improving the educational experience in one city, Philadelphia. The study employed interviews with policymakers, teachers, and others; a focus group of middle-school students; a collection of…
ERIC Educational Resources Information Center
Tan, Thomas
2011-01-01
Digital citizenship is how educators, citizens, and parents can teach where the lines of cyber safety and ethics are in the interconnected online world their students will inhabit. Aside from keeping technology users safe, digital citizenship also prepares students to survive and thrive in an environment embedded with information, communication,…
Education and the Degree of Data Security
ERIC Educational Resources Information Center
Spears, Phillip Dewitt
2013-01-01
New technology development has researchers inundated with a plethora of data security issues linked to cyber attacks and hackers' ability to transmogrify their techniques. The present research focused on the information technology managing officers' (ITMOs') level of education, size of organization, organization's industry, and effect they have on…
Cyber Forensics Ontology for Cyber Criminal Investigation
NASA Astrophysics Data System (ADS)
Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul
We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brasseur, James G.
The central aims of the DOE-supported “Cyber Wind Facility” project center on the recognition that wind turbines over land and ocean generate power from atmospheric winds that are inherently turbulent and strongly varying, both spatially over the rotor disk and in temporally as the rotating blades pass through atmospheric eddies embedded within the mean wind. The daytime unstable atmospheric boundary layer (ABL) is particularly variable in space time as solar heating generates buoyancy-driven motions that interact with strong mean shear in the ABL “surface layer,” the lowest 200 - 300 m where wind turbines reside in farms. With the “Cybermore » Wind Facility” (CWF) program we initiate a research and technology direction in which “cyber data” are generated from “computational experiments” within a “facility” akin to a wind tunnel, but with true space-time atmospheric turbulence that drive utility-scale wind turbines at full-scale Reynolds numbers. With DOE support we generated the key “modules” within a computational framework to create a first generation Cyber Wind Facility (CWF) for single wind turbines in the daytime ABL---both over land where the ABL globally unstable and over water with closer-to-neutral atmospheric conditions but with time response strongly affected by wave-induced forcing of the wind turbine platform (here a buoy configuration). The CWF program has significantly improved the accuracy of actuator line models, evaluated with the Cyber Wind Facility in full blade-boundary-layer-resolved mode. The application of the CWF made in this program showed the existence of important ramp-like response events that likely contribute to bearing fatigue failure on the main shaft and that the advanced ALM method developed here captures the primary nonsteady response characteristics. Long-time analysis uncovered distinctive key dynamics that explain primary mechanisms that underlie potentially deleterious load transients. We also showed that blade bend-twist coupling plays a central role in the elastic responses of the blades to atmospheric turbulence, impacting turbine power.« less
ERIC Educational Resources Information Center
Ramaswami, Rama
2008-01-01
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
ERIC Educational Resources Information Center
Gardella, Joseph H.; Fisher, Benjamin W.; Teurbe-Tolon, Abbie R.
2017-01-01
Adolescents' Internet use is increasingly mobile, private, and unsupervised, which raises concerns given that the Internet increasingly serves as a medium for experiencing victimization. Although it is widely recognized that in-person victimization has a deleterious effect on adolescents' educational outcomes, the extent to which…
Factors Affecting Adult Student Dropout Rates in the Korean Cyber-University Degree Programs
ERIC Educational Resources Information Center
Choi, Hee Jun; Kim, Byoung Uk
2018-01-01
Few empirical studies of adult distance learners' decisions to drop out of degree programs have used large enough sample sizes to generalize the findings or data sets drawn from multiple online programs that address various subjects. Accordingly, in this study, we used a large administrative data set drawn from multiple online degree programs to…
77 FR 14955 - DoD Information Assurance Scholarship Program (IASP)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-14
... IA and information technology (IT) management, technical, digital and multimedia forensics, cyber..., digital and multimedia forensics, electrical engineering, electronics engineering, information security...
NASA Langley Teacher Resource Center at the Virginia Air and Space Center
NASA Technical Reports Server (NTRS)
Maher, Kim L.
1999-01-01
Nation's education goals through expanding and enhancing the scientific an technological competence of students and educators. To help disseminate NASA instructional materials and educational information, NASA's Education Division has established the Educator Resource Center Network. Through this network (ERCN), educators are provided the opportunity to receive free instructional information, materials, consultation, and training workshops on NASA educational products. The Office of Education at NASA Langley Research Center offers an extension of its Precollege Education program by supporting the NASA LARC Educator Resource Center at the Virginia Air & Space Center, the official visitor center for NASA LARC. This facility is the principal distribution point for educators in the five state service region that includes Virginia, West Virginia, Kentucky, North Carolina and South Carolina. The primary goal, to provide expertise and facilities to help educators access and utilize science, mathematics, and technology instructional products aligned with national standards and appropriate state frameworks and based on NASA's unique mission and results, has been accomplished. This ERC had 15,200 contacts and disseminated over 190,000 instructional items during the period of performance. In addition the manager attended 35 conferences, workshops, and educational meetings as an GR, presenter, or participant. The objective to demonstrate and facilitate the use of educational technologies has been accomplished through the following: The ERC's web page has been developed as a cyber-gateway to a multitude of NASA and other educational resources as well as to Our own database of current resource materials. NASA CORE CD-ROM technology is regularly demonstrated and promoted using the center's computers. NASA TV is available, demonstrated to educators, and used to facilitate the downlinking of NASA educational programming.
Assessing the Effectiveness of Multimedia in Language Learning Software.
ERIC Educational Resources Information Center
Chun, Dorothy M.; Plass, Jan L.
In this paper, the effectiveness of a "CyberBuch," a multimedia program for reading authentic German texts, is assessed in three areas. First, based on user evaluation of the visual interface design, the usability of the program is assessed with particular regard to user reaction to the multimedia components of the program. Second,…
Social and Psychological Effects of the Internet Use
Diomidous, Marianna; Chardalias, Kostis; Magita, Adrianna; Koutonias, Panagiotis; Panagiotopoulou, Paraskevi; Mantas, John
2016-01-01
Background and Aims: Over the past two decades there was an upsurge of the use of Internet in human life. With this continuous development, Internet users are able to communicate with any part of the globe, to shop online, to use it as a mean of education, to work remotely and to conduct financial transactions. Unfortunately, this rapid development of the Internet has a detrimental impact in our life, which leads to various phenomena such as cyber bullying, cyber porn, cyber suicide, Internet addiction, social isolation, cyber racism etc. The main purpose of this paper is to record and analyze all these social and psychological effects that appears to users due to the extensive use of the Internet. Materials and Methods: This review study was a thorough search of bibliography data conducted through Internet and library research studies. Key words were extracted from search engines and data bases including Google, Yahoo, Scholar Google, PubMed. Findings: The findings of this study showed that the Internet offers a quick access to information and facilitates communication however; it is quite dangerous, especially for young users. For this reason, users should be aware of it and face critically any information that is handed from the website PMID:27041814
Social and Psychological Effects of the Internet Use.
Diomidous, Marianna; Chardalias, Kostis; Magita, Adrianna; Koutonias, Panagiotis; Panagiotopoulou, Paraskevi; Mantas, John
2016-02-01
Over the past two decades there was an upsurge of the use of Internet in human life. With this continuous development, Internet users are able to communicate with any part of the globe, to shop online, to use it as a mean of education, to work remotely and to conduct financial transactions. Unfortunately, this rapid development of the Internet has a detrimental impact in our life, which leads to various phenomena such as cyber bullying, cyber porn, cyber suicide, Internet addiction, social isolation, cyber racism etc. The main purpose of this paper is to record and analyze all these social and psychological effects that appears to users due to the extensive use of the Internet. This review study was a thorough search of bibliography data conducted through Internet and library research studies. Key words were extracted from search engines and data bases including Google, Yahoo, Scholar Google, PubMed. The findings of this study showed that the Internet offers a quick access to information and facilitates communication however; it is quite dangerous, especially for young users. For this reason, users should be aware of it and face critically any information that is handed from the website.
Social media, cyber-aggression and student mental health on a university campus.
Mishna, Faye; Regehr, Cheryl; Lacombe-Duncan, Ashley; Daciuk, Joanne; Fearing, Gwendolyn; Van Wert, Melissa
2018-06-01
Information and communication technologies (ICTs) offer immense benefits for university students including enhancing engagement and connections with others and promoting self-directed and interactive learning. Perceived anonymity and the absence of social cues, however, may contribute to risk of interpersonal aggression. While extensive research examines bullying in child and adolescent educational settings, this study addresses a gap regarding post-secondary environments. An internet-based survey was provided to 5004 university students to examine the nature, extent and consequences of cyber-aggression. The survey received a response from 1350 students, a response rate of 28.5%. To enable further exploration, nine focus groups and eight individual interviews were conducted. This exploratory study found one quarter of respondents had a private video or photo shared without their permission and 28% were sent angry, vulgar, threatening or intimating messages. Perpetrators were most likely to be a friend (50%), another student (20%) or an intimate partner (18%). Focus group data revealed risks of ICTs and the need for resources and support to address students' wellbeing in the context of cyber-aggression. Cyber-aggression is experienced by a significant minority of university students, impacting their sense of wellbeing and mental health.
A Kosloff/Basal method, 3D migration program implemented on the CYBER 205 supercomputer
NASA Technical Reports Server (NTRS)
Pyle, L. D.; Wheat, S. R.
1984-01-01
Conventional finite difference migration has relied on approximations to the acoustic wave equation which allow energy to propagate only downwards. Although generally reliable, such approaches usually do not yield an accurate migration for geological structures with strong lateral velocity variations or with steeply dipping reflectors. An earlier study by D. Kosloff and E. Baysal (Migration with the Full Acoustic Wave Equation) examined an alternative approach based on the full acoustic wave equation. The 2D, Fourier type algorithm which was developed was tested by Kosloff and Baysal against synthetic data and against physical model data. The results indicated that such a scheme gives accurate migration for complicated structures. This paper describes the development and testing of a vectorized, 3D migration program for the CYBER 205 using the Kosloff/Baysal method. The program can accept as many as 65,536 zero offset (stacked) traces.
2016-07-01
Common Risk Model for Dams ( CRM -D) Methodology,” for the Director, Cost Assessment and Program Evaluation, Office of Secretary of Defense and the...for Dams ( CRM -D), developed by the U.S. Army Corps of Engineers (USACE) in collaboration with the Institute for Defense Analyses (IDA) and the U.S...and cyber security risks across a portfolio of dams, and informing decisions on how to mitigate those risks. The CRM -D can effectively quantify the
2015-08-01
a definition of the building footprints with an associated height attribute. This would be enough information to construct an extruded building ...contract was undertaken with CyberCity 3D (2012), a commercial company located in El Segundo, CA, to construct the buildings . The company specializes in...visualization of planning functions. CyberCity 3D used 6 in. stereoscopic aerial photography to construct 3-D models of the buildings . These models were quite
Exploring TechQuests Through Open Source and Tools That Inspire Digital Natives
NASA Astrophysics Data System (ADS)
Hayden, K.; Ouyang, Y.; Kilb, D.; Taylor, N.; Krey, B.
2008-12-01
"There is little doubt that K-12 students need to understand and appreciate the Earth on which they live. They can achieve this understanding only if their teachers are well prepared". Dan Barstow, Director of Center for Earth and Space Science Education at TERC. The approach of San Diego County's Cyberinfrastructure Training, Education, Advancement, and Mentoring (SD Cyber-TEAM) project is to build understandings of Earth systems for middle school teachers and students through a collaborative that has engaged the scientific community in the use of cyber-based tools and environments for learning. The SD Cyber-TEAM has used Moodle, an open source management system with social networking tools, that engage digital native students and their teachers in collaboration and sharing of ideas and research related to Earth science. Teachers participate in on-line professional dialog through chat, wikis, blogs, forums, journals and other tools and choose the tools that will best fit their classroom. The use of Moodle during the Summer Cyber Academy developed a cyber-collaboratory environment where teaching strategies were discussed, supported and actualized by participants. These experiences supported digital immigrants (teachers) in adapting teaching strategies using technologies that are most attractive and familiar to students (digital natives). A new study by the National School Boards Association and Grunwald Associates LLC indicated that "the online behaviors of U.S. teens and 'tweens shows that 96 percent of students with online access use social networking technologies, such as chatting, text messaging, blogging, and visiting online communities such as Facebook, MySpace, and Webkinz". While SD Cyber-TEAM teachers are implementing TechQuests in classrooms they use these social networking elements to capture student interest and address the needs of digital natives. Through the Moodle environment, teachers have explored a variety of learning objects called TechQuests, to support classroom instruction previously outlined through a textbook. Project classrooms have participated in videoconferences over high-speed networks and through satellite connections with experts in the field investigating scientific data found in the CA State Park of Anza Borrego. Other engaging tools include: An Interactive Epicenter Locator Tool developed through the project in collaboration with the Scripps Institution of Oceanography to engage students in the use of data to determine earthquake epicenters during hands on investigations, and a TechQuest activity where GoogleEarth allows students to explore geographic locations and scientific data.
Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Oehmen, Christopher S.
This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF canmore » be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less
The Development of CyberLearning in Dual-Mode: Higher Education Institutions in Taiwan.
ERIC Educational Resources Information Center
Chen, Yau Jane
2002-01-01
Open and distance education in Taiwan has evolved into cyberlearning. Over half (56 percent) of the conventional universities and colleges have been upgraded to dual-mode institutions offering real-time multicast instructional systems using videoconferencing, cable television, virtual classrooms, and curriculum-on-demand systems. The Ministry of…
Adoption of the Mobile Campus in a Cyber University
ERIC Educational Resources Information Center
Han, Insook; Han, Seungyeon
2014-01-01
The advantages of mobile technologies have not been lost on higher education institutions, and they have tried to provide educational services through the use of mobile learning management system (LMS). However, offering such services does not necessarily mean that the students will adopt the new technology. Thus, the purpose of this study was to…
Design and Emergence of a Pedagogical Online Infosec Laboratory as an Ensemble Artefact
ERIC Educational Resources Information Center
Iqbal, Sarfraz
2016-01-01
Information security (InfoSec) education becomes increasingly important. Building hands-on capabilities to tackle challenges is a precondition to mitigate and eliminate cyber threats. Existing studies, however, show that the field lacks pedagogically founded information security laboratories that can be used flexibly to educate both on-campus and…
Critical Thinking for 21st-Century Education: A Cyber-Tooth Curriculum?
ERIC Educational Resources Information Center
Higgins, Steve
2014-01-01
It is often assumed that the advent of digital technologies requires fundamental change to the curriculum and to the teaching and learning approaches used in schools around the world to educate this generation of "digital natives" or the "net generation". This article analyses the concepts of 21st-century skills and critical…
Van Ouytsel, Joris; Ponnet, Koen; Walrave, Michel
2016-02-12
Controlling one's romantic partner through digital media is a form of cyber dating abuse. To design effective educational campaigns, a deeper understanding of how some young people become victim of this type of abuse within their romantic relationships is warranted. This study is the first to adopt a lifestyle-routine activities theory perspective toward online romantic partner monitoring, by looking at whether secondary school students' risky digital lifestyle and their digital media use are linked to a higher chance of being controlled by a romantic partner, taking into account gender, age, and the length of the romantic relationship. The data of 466 secondary school students (71.0% girls, n = 331) between 16 and 22 years old (M = 17.99 years; SD = 0.92) who were in a romantic relationship are analyzed. Linear regression analysis suggests that engagement in online risk behavior, the length of the romantic relationship, engagement in sexting with the romantic partner, and the amount of social networking site use were significantly linked to victimization of digital controlling behavior. The results are important to practitioners, as they indicate that messages about safe Internet use should be incorporated in prevention and educational campaigns with regard to cyber dating abuse. Suggestions for future research are discussed. © The Author(s) 2016.
Expanding CyberShake Physics-Based Seismic Hazard Calculations to Central California
NASA Astrophysics Data System (ADS)
Silva, F.; Callaghan, S.; Maechling, P. J.; Goulet, C. A.; Milner, K. R.; Graves, R. W.; Olsen, K. B.; Jordan, T. H.
2016-12-01
As part of its program of earthquake system science, the Southern California Earthquake Center (SCEC) has developed a simulation platform, CyberShake, to perform physics-based probabilistic seismic hazard analysis (PSHA) using 3D deterministic wave propagation simulations. CyberShake performs PSHA by first simulating a tensor-valued wavefield of Strain Green Tensors. CyberShake then takes an earthquake rupture forecast and extends it by varying the hypocenter location and slip distribution, resulting in about 500,000 rupture variations. Seismic reciprocity is used to calculate synthetic seismograms for each rupture variation at each computation site. These seismograms are processed to obtain intensity measures, such as spectral acceleration, which are then combined with probabilities from the earthquake rupture forecast to produce a hazard curve. Hazard curves are calculated at seismic frequencies up to 1 Hz for hundreds of sites in a region and the results interpolated to obtain a hazard map. In developing and verifying CyberShake, we have focused our modeling in the greater Los Angeles region. We are now expanding the hazard calculations into Central California. Using workflow tools running jobs across two large-scale open-science supercomputers, NCSA Blue Waters and OLCF Titan, we calculated 1-Hz PSHA results for over 400 locations in Central California. For each location, we produced hazard curves using both a 3D central California velocity model created via tomographic inversion, and a regionally averaged 1D model. These new results provide low-frequency exceedance probabilities for the rapidly expanding metropolitan areas of Santa Barbara, Bakersfield, and San Luis Obispo, and lend new insights into the effects of directivity-basin coupling associated with basins juxtaposed to major faults such as the San Andreas. Particularly interesting are the basin effects associated with the deep sediments of the southern San Joaquin Valley. We will compare hazard estimates from the 1D and 3D models, summarize the challenges of expanding CyberShake to a new geographic region, and describe our future CyberShake plans.
NASA Technical Reports Server (NTRS)
Ortega, J. M.
1984-01-01
The research efforts of University of Virginia students under a NASA sponsored program are summarized and the status of the program is reported. The research includes: testing method evaluations for N version programming; a representation scheme for modeling three dimensional objects; fault tolerant protocols for real time local area networks; performance investigation of Cyber network; XFEM implementation; and vectorizing incomplete Cholesky conjugate gradients.
NASA Technical Reports Server (NTRS)
Knauber, R. N.
1982-01-01
This report describes a FORTRAN IV coded computer program for post-flight evaluation of a launch vehicle upper stage on-off reaction control system. Aerodynamic and thrust misalignment disturbances are computed as well as the total disturbing moments in pitch, yaw, and roll. Effective thrust misalignment angle time histories of the rocket booster motor are calculated. Disturbing moments are integrated and used to estimate the required control system total inpulse. Effective control system specific inpulse is computed for the boost and coast phases using measured control fuel useage. This method has been used for more than fifteen years for analyzing the NASA Scout launch vehicle second and third-stage reaction control system performance. The computer program is set up in FORTRAN IV for a CDC CYBER 175 system. With slight modification it can be used on other machines having a FORTRAN compiler. The program has optional CALCOMP plotting output. With this option the program requires 19K words of memory and has 786 cards. Running time on a CDC CYBER 175 system is less than three (3) seconds for a typical problem.
Wright, Michelle F; Li, Yan
2013-01-01
This longitudinal study examined normative beliefs about aggression (e.g., face-to-face, cyber) in relation to the engagement in cyber aggression 6 months later among 126 (69 women) young adults. Participants completed electronically administered measures assessing their normative beliefs, face-to-face and cyber aggression at Time 1, and cyber aggression 6 months later (Time 2). We found that men reported more cyber relational and verbal aggression when compared to women. After controlling for each other, Time 1 face-to-face relational aggression was positively related to Time 2 cyber relational aggression, whereas Time 1 face-to-face verbal aggression was positively related to Time 2 cyber verbal aggression. Normative beliefs regarding cyber aggression was positively related to both forms of cyber aggression 6 months later, after controlling for normative beliefs about face-to-face aggression. Furthermore, a significant two-way interaction between Time 1 cyber relational aggression and normative beliefs about cyber relational aggression was found. Follow-up analysis showed that Time 1 cyber relational aggression was more strongly related to Time 2 cyber relational aggression when young adults held higher normative beliefs about cyber relational aggression. A similar two-way interaction was found for cyber verbal aggression such that the association between Time 1 and Time 2 cyber verbal aggression was stronger at higher levels of normative beliefs about cyber verbal aggression. Results are discussed in terms of the social cognitive and behavioral mechanisms associated with the engagement of cyber aggression. © 2013 Wiley Periodicals, Inc.
78 FR 53736 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-30
...: Title, Associated Form and OMB Number: Defense Industrial Base Cyber Security/Information Assurance (DIB... program administration and management purposes. Affected Public: Business or other for-Profit; Not-for...
User's guide to STIPPAN: A panel method program for slotted tunnel interference prediction
NASA Technical Reports Server (NTRS)
Kemp, W. B., Jr.
1985-01-01
Guidelines are presented for use of the computer program STIPPAN to simulate the subsonic flow in a slotted wind tunnel test section with a known model disturbance. Input data requirements are defined in detail and other aspects of the program usage are discussed in more general terms. The program is written for use in a CDC CYBER 200 class vector processing system.
Cyber-Evaluation: Evaluating a Distance Learning Program.
ERIC Educational Resources Information Center
Henderson, Denise L.
This paper examines how the process of soliciting evaluation feedback from nonresident students in the Army Management Staff College (Virginia) program on leadership and management for civilian employees of the Army has evolved since 1995. Course design is briefly described, including the use of video-teleconferences, chat rooms, an electronic…
The Shift of the University Paradigm and Reform of the Korean University Systems
ERIC Educational Resources Information Center
Lee, Hyun-Chong
2005-01-01
The 21st century society is characterised as a knowledge-based society, education mobility society, and cyber schooling society. This new paradigm of university enables us to restructure the university system in Korea. To establish an efficient and competitive education system, it is essential to change the current university system. Restructuring…
Cultivating Cyber-Phronesis: A New Educational Approach to Tackle Cyberbullying
ERIC Educational Resources Information Center
Harrison, Tom
2016-01-01
Cyberbullying is a pervasive and troubling moral concern for teachers, schools, parents and pupils. As children and young people in England are now more likely to be bullied online than face-to-face, this article explores if there is a need to rethink traditional educational approaches to dealing with the issue. The article starts with a critique…
Sext Education: Pedagogies of Sex, Gender and Shame in the Schoolyards of "Tagged" and "Exposed"
ERIC Educational Resources Information Center
Dobson, Amy Shields; Ringrose, Jessica
2016-01-01
In this paper, we explore how what we term "sext education" pedagogies intersect with young people's understandings of, and talk about, sexting through a feminist analysis of two cyber-safety campaign films: "Tagged" from Australia and "Exposed" from the UK. The films tell alarming stories about the ways in which…
Mobilizing Curriculum Studies in a (Virtual) World: Open Access, Edupunks, and the Public Good
ERIC Educational Resources Information Center
Corrigan, Julie Ann; Ng-A-Fook, Nicholas
2012-01-01
Despite societal imperatives for equity--whether espoused by nation states or transnational agencies like UNESCO--current models of higher education are unequivocally failing to provide universal access. This paper seeks to explore the (cyber)spaces (un)occupied by higher education, specifically in the area of curriculum studies, arguing that the…
ERIC Educational Resources Information Center
Liu, An; Bu, Yuhua
2016-01-01
Colleges and universities in China have been bent on remolding the existing unitary teacher-centered education mode and enhancing students' individualized and autonomous learning with the help of multimedia and cyber technology in order to meet the College English Curriculum Requirements instituted by the Ministry of Education in 2004. Admittedly…
Responding to Cyber Attacks and the Applicability of Existing International Law
2013-03-01
Hilfiker United States Army United States Army War College Class of 2013 DISTRIBUTION STATEMENT: A Approved for Public...Education is an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education Accreditation...Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39.18 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for
Wright, Michelle F; Li, Yan
2012-09-01
Using the general strain theory as a theoretical framework, the present longitudinal study investigated both face-to-face and cyber victimization in relation to cyber-displaced aggression. Longitudinal data were collected from 130 (70 women) young adults who completed measures assessing their victimization (face-to-face and cyber), cyber aggression, and both face-to-face and cyber-displaced aggression. Findings indicated that victimization in both social contexts (face-to-face and cyber) contributed to cyber-displaced aggression 6 months later (Time 2), after controlling for gender, cyber aggression, face-to-face displaced aggression, and cyber-displaced aggression at Time 1. A significant two-way interaction revealed that Time 1 cyber victimization was more strongly related to Time 2 cyber-displaced aggression when young adults had higher levels of face-to-face victimization at Time 1. Implications of these findings are discussed as well as a call for more research investigating displaced aggression in the cyber context.
SAGA: A project to automate the management of software production systems
NASA Technical Reports Server (NTRS)
Campbell, R. H.
1983-01-01
The current work in progress for the SAGA project are described. The highlights of this research are: a parser independent SAGA editor, design for the screen editing facilities of the editor, delivery to NASA of release 1 of Olorin, the SAGA parser generator, personal workstation environment research, release 1 of the SAGA symbol table manager, delta generation in SAGA, requirements for a proof management system, documentation for and testing of the cyber pascal make prototype, a prototype cyber-based slicing facility, a June 1984 demonstration plan, SAGA utility programs, summary of UNIX software engineering support, and theorem prover review.
Kubiszewski, V; Fontaine, R; Huré, K; Rusch, E
2013-04-01
The aim of this study was to determine the prevalence of adolescents engaged in cyber-bullying and then to identify whether students involved in cyber- and school bullying present the same characteristics of internalizing problems (insomnia, perceived social disintegration, psychological distress) and externalizing problems (general aggressiveness, antisocial behavior). Semi-structured interviews were conducted with 738 adolescents from a high-school and a middle-school (mean age=14.8 ± 2.7). The Electronic Bullying Questionnaire and the Olweus Bully/Victim Questionnaire were used to identify profiles of cyber-bullying (cyber-victim, cyber-bully, cyber-bully/victim and cyber-neutral) and school bullying (victim, bully, bully/victim and neutral). Internalizing problems were investigated using the Athens Insomnia Scale, a Perceived Social Disintegration Scale and a Psychological Distress Scale. Externalizing problems were assessed using a General Aggressiveness Scale and an Antisocial Behavior Scale. Almost one student in four was involved in cyber-bullying (16.4% as cyber-victim, 4.9% as cyber-bully and 5.6% as cyber-bully/victim); 14% of our sample was engaged in school bullying as a victim, 7.2% as a bully and 2.8% as a bully/victim. The majority of adolescents involved in cyber-bullying were not involved in school bullying. With regard to the problems associated with school bullying, internalizing problems were more prevalent in victims and bully/victims, whereas externalizing problems were more common in bullies and bully/victims. A similar pattern was found in cyber-bullying where internalizing problems were characteristic of cyber-victims and cyber-bully/victims. Insomnia was elevated in the cyber-bully group which is specific to cyberbullying. General aggressiveness and antisocial behavior were more prevalent in cyber-bullies and cyber-bully/victims. Looking at the differences between types of bullying, victims of "school only" and "school and cyber" bullying had higher scores for insomnia and perceived social disintegration than victims of "cyber only" bullying or students "non-involved". Higher general aggressiveness scores were observed for "school only" bullies and "school and cyber" bullies than for bullies in "cyber only" bullying or students "non-involved". Regarding antisocial behavior, "school only" bullies, "cyber only" bullies, "school and cyber" bullies had higher scores than students "non-involved". This study highlights the importance of investigating both school and cyber-bullying as many psychosocial problems are linked to these two specific and highly prevalent forms of bullying. Copyright © 2012 L’Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.
Predictors of willingness to use cyber counseling for college students with disabilities.
Lan, Chu-Mei
2016-04-01
Cyber counseling is a new method for assisting people in coping with distress. People in Taiwan are more familiar with face-to-face counseling than with cyber counseling. Using computers is the most popular activity among college students with disabilities. Cyber counseling is effective for lessening client disturbance. Therefore, cyber counseling is an alternative to face-to-face counseling. This study measured the willingness of college students with disabilities to use cyber counseling to meet their mental health needs. In addition, the predictors of the willingness to use cyber counseling were explored. The subjects were college students with disabilities who were recruited from universities in Southern Taiwan through the Internet and in college counseling centers. A total of 214 structured questionnaires were collected and subsequently analyzed using SPSS Version 18.0 through stepwise regression for discovering the crucial predictors of the willingness of college students to use cyber counseling. The crucial predictors of the willingness of college students to use cyber counseling were cyber-counseling needs, the need for cyber-counseling methods (the need to use various cyber-counseling methods), a help-seeking attitude in cyber counseling, a hearing disorder, cyber counseling need for academic achievement, and grade level. The explained proportion of variance was 65.4%. The willingness of college students with disabilities to use cyber counseling was explained according to cyber-counseling needs, cyber-counseling attitudes, disease type, and grades. Based on the results, this study offers specific suggestions and future directions for research on cyber counseling for college students with disabilities. Copyright © 2016 Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL ismore » tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.« less
2015-06-12
the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon
NASA Technical Reports Server (NTRS)
Kemp, William B., Jr.
1990-01-01
Guidelines are presented for use of the computer program PANCOR to assess the interference due to tunnel walls and model support in a slotted wind tunnel test section at subsonic speeds. Input data requirements are described in detail and program output and general program usage are described. The program is written for effective automatic vectorization on a CDC CYBER 200 class vector processing system.
Center for Computing Research Summer Research Proceedings 2015.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bradley, Andrew Michael; Parks, Michael L.
2015-12-18
The Center for Computing Research (CCR) at Sandia National Laboratories organizes a summer student program each summer, in coordination with the Computer Science Research Institute (CSRI) and Cyber Engineering Research Institute (CERI).
Cyber Incidents Involving Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert J. Turk
2005-10-01
The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Managementmore » Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).« less
Cyber Warfare: China’s Strategy to Dominate in Cyber Space
2011-06-10
CYBER WARFARE : CHINA‘S STRATEGY TO DOMINATE IN CYBER SPACE A thesis presented to the Faculty of the U.S. Army Command and...warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with...China, Strategy, Cyber Warfare , Cyber Space, Information Warfare, Electronic Warfare 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18
2010-05-03
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment...U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority...Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority The character of
NASA Technical Reports Server (NTRS)
Knauber, R. N.
1982-01-01
A FORTRAN coded computer program which computes the capture transient of a launch vehicle upper stage at the ignition and/or separation event is presented. It is for a single degree-of-freedom on-off reaction jet attitude control system. The Monte Carlo method is used to determine the statistical value of key parameters at the outcome of the event. Aerodynamic and booster induced disturbances, vehicle and control system characteristics, and initial conditions are treated as random variables. By appropriate selection of input data pitch, yaw and roll axes can be analyzed. Transient response of a single deterministic case can be computed. The program is currently set up on a CDC CYBER 175 computer system but is compatible with ANSI FORTRAN computer language. This routine has been used over the past fifteen (15) years for the SCOUT Launch Vehicle and has been run on RECOMP III, IBM 7090, IBM 360/370, CDC6600 and CDC CYBER 175 computers with little modification.
Cyber Forensics and Security as an ABET-CAC Accreditable Program
ERIC Educational Resources Information Center
Wood, David F.; Kohun, Frederick G.; Ali, Azad; Paullet, Karen; Davis, Gary A.
2010-01-01
This paper frames the recent ABET accreditation model with respect to the balance between IS programs and innovation. With the current relaxation of the content of the information systems requirement by ABET, it is possible to include innovation into the accreditation umbrella. To this extent this paper provides a curricular model that provides…
2016-09-15
pretest - posttest educational experiment with a control group and an original measurement instrument. Details of the treatment, which consisted of...promise of such an approach, a pretest - posttest educational experiment with a control group and an original measurement instrument was conducted...research question, a pretest - posttest experiment with a control group was designed. The research subjects were a representative sample of the
Cyber-Terrorism and Cyber-Crime: There Is a Difference
The terms cyber -terrorism and cyber -crime have many varying definitions depending on who is defining them. For example, individuals with expertise in...considerations and, when investigating a cyber -attack, procedural considerations. By examining the strengths and weaknesses of several definitions offered by...national security, law enforcement, industry, law, and scholars, this research constructs a list of parameters to consider when formulating definitions for cyber -terrorism and cyber -crime.
Body as Echoes: Cyber Archiving of Dazu Rock Carvings
NASA Astrophysics Data System (ADS)
Chen, W.-W.
2017-08-01
"Body As Echoes: Cyber Archiving of Dazu Rock Carvings (BAE project in short)" strives to explore the tangible/intangible aspects of digital heritage conservation. Aiming at Dazu Rock Carvings - World Heritage Site of Sichuan Province, BAE project utilizes photogrammetry and digital sculpting technique to investigate digital narrative of cultural heritage conservation. It further provides collaborative opportunities to conduct the high-resolution site survey for scholars and institutions at local authorities. For preserving and making sustainable of the tangible cultural heritage at Dazu Rock Carvings, BAE project cyber-archives the selected niches and the caves at Dazu, and transform them into high-resolution, three-dimensional models. For extending the established results and making the digital resources available to broader audiences, BAE project will further develop interactive info-motion interface and apply the knowledge of digital heritage from BAE project to STEM education. BAE project expects to bridge the platform for archeology, computer graphics, and interactive info-motion design. Digital sculpting, projection mapping, interactive info-motion and VR will be the core techniques to explore the narrative of digital heritage conservation. For further protecting, educating and consolidating "building dwelling thinking" through digital heritage preservation, BAE project helps to preserve the digital humanity, and reach out to museum staffs and academia. By the joint effort of global institutions and local authorities, BAE project will also help to foster and enhance the mutual understanding through intercultural collaborations.
Cybercounseling & Cyberlearning: An Encore.
ERIC Educational Resources Information Center
Bloom, John W., Ed.; Walz, Garry R., Ed.
As a follow-up to "Cybercounseling and Cyberlearning: Strategies and Resources for the Millennium," this book offers information beneficial to the counseling practice and counselor education classrooms. Part 1, "CyberLearning," contains the following chapters: (1) "Designing Web Pages Accessible to All" (J. E. Wheaton…
Impact of Alleged Russian Cyber Attacks
2009-05-01
security. 15. SUBJECT TERMS Cyber Security, Cyber Warfare , Estonia, Georgia, Russian Federation Cyber Strategy, Convention on Cybercrime, NATO Center...Federation ......................................................................................... 33 X. The Future of Russian Cyber Warfare ................................................................... 39...Issue 15.09); Binoy Kampmark, Cyber Warfare Between Estonia And Russia, (Contemporary Review: Autumn, 2003), p 288-293; Jaak Aaviksoo, Address by the
CyberShake: Running Seismic Hazard Workflows on Distributed HPC Resources
NASA Astrophysics Data System (ADS)
Callaghan, S.; Maechling, P. J.; Graves, R. W.; Gill, D.; Olsen, K. B.; Milner, K. R.; Yu, J.; Jordan, T. H.
2013-12-01
As part of its program of earthquake system science research, the Southern California Earthquake Center (SCEC) has developed a simulation platform, CyberShake, to perform physics-based probabilistic seismic hazard analysis (PSHA) using 3D deterministic wave propagation simulations. CyberShake performs PSHA by simulating a tensor-valued wavefield of Strain Green Tensors, and then using seismic reciprocity to calculate synthetic seismograms for about 415,000 events per site of interest. These seismograms are processed to compute ground motion intensity measures, which are then combined with probabilities from an earthquake rupture forecast to produce a site-specific hazard curve. Seismic hazard curves for hundreds of sites in a region can be used to calculate a seismic hazard map, representing the seismic hazard for a region. We present a recently completed PHSA study in which we calculated four CyberShake seismic hazard maps for the Southern California area to compare how CyberShake hazard results are affected by different SGT computational codes (AWP-ODC and AWP-RWG) and different community velocity models (Community Velocity Model - SCEC (CVM-S4) v11.11 and Community Velocity Model - Harvard (CVM-H) v11.9). We present our approach to running workflow applications on distributed HPC resources, including systems without support for remote job submission. We show how our approach extends the benefits of scientific workflows, such as job and data management, to large-scale applications on Track 1 and Leadership class open-science HPC resources. We used our distributed workflow approach to perform CyberShake Study 13.4 on two new NSF open-science HPC computing resources, Blue Waters and Stampede, executing over 470 million tasks to calculate physics-based hazard curves for 286 locations in the Southern California region. For each location, we calculated seismic hazard curves with two different community velocity models and two different SGT codes, resulting in over 1100 hazard curves. We will report on the performance of this CyberShake study, four times larger than previous studies. Additionally, we will examine the challenges we face applying these workflow techniques to additional open-science HPC systems and discuss whether our workflow solutions continue to provide value to our large-scale PSHA calculations.
Security Informatics Research Challenges for Mitigating Cyber Friendly Fire
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.
This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closelymore » related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.« less
NASA Technical Reports Server (NTRS)
Kumar, A.; Rudy, D. H.; Drummond, J. P.; Harris, J. E.
1982-01-01
Several two- and three-dimensional external and internal flow problems solved on the STAR-100 and CYBER-203 vector processing computers are described. The flow field was described by the full Navier-Stokes equations which were then solved by explicit finite-difference algorithms. Problem results and computer system requirements are presented. Program organization and data base structure for three-dimensional computer codes which will eliminate or improve on page faulting, are discussed. Storage requirements for three-dimensional codes are reduced by calculating transformation metric data in each step. As a result, in-core grid points were increased in number by 50% to 150,000, with a 10% execution time increase. An assessment of current and future machine requirements shows that even on the CYBER-205 computer only a few problems can be solved realistically. Estimates reveal that the present situation is more storage limited than compute rate limited, but advancements in both storage and speed are essential to realistically calculate three-dimensional flow.
Vieno, Alessio; Gini, Gianluca; Santinello, Massimo
2011-07-01
Using data from the 2006 Health Behavior in School-aged Children (HBSC) survey, the prevalence of 6 forms of bullying (physical, verbal, relational, sexual, cyber, and racist), and the role of smoking and drinking in bullying was examined among Italian adolescents for this study. The sample was composed of 2667 Italian middle and secondary school students (49.9% girls) randomly selected. The revised Olweus Bully/Victim Questionnaire was used to measure physical, verbal, relational, sexual, cyber, and racist forms of bullying. For each form, 3 categories were created and compared with students "not involved in bullying": bully, victim, and bully-victim. Logistic regressions were applied to test the connections among the 3 forms of involvement in different types of bullying and smoking and drinking. Prevalence of having been bullied or having bullied others at school at least once in the last 2 months was 11.6% for physical, 52% for verbal, 47.9% for relational, 18.5% for sexual, 19.4% for cyber, and 9.4% for racist bullying. Compared to girls, boys were more likely to be involved in physical bullying; moreover, boys were more involved as bullies in verbal, sexual, cyber, and racist bullying. In contrast, girls were more likely to be victims of verbal, relational, sexual, and cyber bullying than were boys. Logistic regressions showed the connection between the different forms of involvement in bullying and smoking and drinking. Our results indicate that all forms of bullying behavior are associated with legal substance use. Implication for prevention program was discussed. © 2011, American School Health Association.
2014-01-01
Background Obese youth are at increased risk for peer victimization, which may heighten their risk of psychosocial problems and physical activity avoidance, and lower the effectiveness of professional and lifestyle weight-loss initiatives. Little is known about obese adolescents’ risk for victimization from cyber-bullying and how this relates to psychosocial functioning and healthy lifestyle barriers. The purpose of the study was to assess traditional and cyber-victimization among adolescents with severe obesity and its relation to psychosocial distress and barriers to healthy lifestyles. Methods A sample of 102 obese adolescents (mean age = 15.32 ±1.71) in residential treatment was matched with 102 normal-weight youngsters from the Health Behavior in School-aged Children (HBSC) study (mean age = 15.30 ±1.73). Results Adolescents with obesity were significantly more often cyber-victimized than normal-weight peers. Obese youth victimized by traditional bullying experienced lower quality of life, lower motivation for physical activity and higher avoidance and emotional coping towards healthy lifestyles than those non-victimized. Obese cyber-victims experienced significantly higher suicidal ideation. Conclusions Traditional and cyber-victimization may hinder treatment effectiveness and healthy lifestyle change in adolescents with obesity. Health professionals should pro-actively address peer victimization and psychosocial functioning during multidisciplinary obesity treatment. Schools could contribute to a better physical and psychosocial health of obese youth by implementing multi-behavioral health-promotion programs. PMID:24593118
Cyber-Physical Attacks With Control Objectives
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
2017-08-18
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less
Cyber-Physical Attacks With Control Objectives
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Yuan; Kar, Soummya; Moura, Jose M. F.
This study studies attackers with control objectives against cyber-physical systems (CPSs). The goal of the attacker is to counteract the CPS's controller and move the system to a target state while evading detection. We formulate a cost function that reflects the attacker's goals, and, using dynamic programming, we show that the optimal attack strategy reduces to a linear feedback of the attacker's state estimate. By changing the parameters of the cost function, we show how an attacker can design optimal attacks to balance the control objective and the detection avoidance objective. In conclusion, we provide a numerical illustration based onmore » a remotely controlled helicopter under attack.« less
Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.
Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-12
...) Not to exceed 3000 positions that require unique cyber security skills and knowledge to perform cyber..., distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture...
Cyber Operations and the Warfighting Functions
2013-03-01
United States Army War College Class of 2013 DISTRIBUTION STATEMENT: A Approved for Public Release Distribution is Unlimited...agency recognized by the U.S. Secretary of Education and the Council for Higher Education Accreditation. Standard Form 298 (Rev. 8/98) Prescribed by...ANSI Std. Z39.18 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is
ERIC Educational Resources Information Center
Hur, Mann Hyung; Im, Yeonwook
2013-01-01
Our study explores the influence of e-learning on individual and collective empowerment by using data collected from e-learning class participants of Korea's Cyber-Education Center. For the survey, a questionnaire was sent to each of the 41 central ministries' education and training officers (ETO) via email. The ETOs distributed the questionnaire…
ERIC Educational Resources Information Center
Gradinger, Petra; Yanagida, Takuya; Strohmeier, Dagmar; Spiel, Christiane
2015-01-01
It is well-documented that cyberbullying and victimization co-occur with traditional forms indicating that they share similar mechanisms. Therefore, it was hypothesized that the general antibullying program ViSC might also be effective in tackling these new forms of bullying. A longitudinal randomized control group design has been applied to…
Cyber Power in the 21st Century
2008-12-01
Cyber Warfare .................................................................86 V. Conclusions and Recommendations...40 2 – Asymmetric Effects of Cyber Warfare ........................................................................41 1 CYBER POWER... cyber warfare capabilities with other elements of national power, as evidenced by the concept of “informationization” (xinxihua) put forward in
Psychological Needs as a Predictor of Cyber Bullying: A Preliminary Report on College Students
ERIC Educational Resources Information Center
Dilmac, Bulent
2009-01-01
Recent surveys show that cyber bullying is a pervasive problem in North America. Many news stories have reported cyber bullying incidents around the world. Reports on the prevalence of cyber bullying and victimization as a result of cyber bullying increase yearly. Although we know what cyber bullying is it is important that we learn more about the…
Problematic alcohol use as a risk factor for cyber aggression within romantic relationships.
Crane, Cory A; Umehira, Nicole; Berbary, Cassandra; Easton, Caroline J
2018-06-06
Cyber aggression has emerged as a modern form of intimate partner violence which has yet to undergo sufficient research necessary to identify risk factors that may increase the likelihood or severity of cyber aggressive behavior toward a relationship partner. Prior research offers contradictory findings pertaining to the relationship between problematic alcohol use and cyber aggression. We recruited 100 (40 female) adult participants through online crowdsourcing to complete a series of questionnaires assessing traditional partner violence, cyber aggression, and problematic alcohol use. Forty-two percent of the sample reported perpetrating cyber relational aggression and 35% reported perpetrating cyber privacy invasion during the year prior to study participation. Traditional partner violence was associated with both forms of cyber aggression. Problematic alcohol use was only associated with privacy invasion after accounting for demographic factors and traditional partner violence. Cyber aggression was prevalent among the current adult sample. Results suggest that problematic alcohol use is a risk factor for cyber privacy invasion but not cyber relational aggression. Findings add to and clarify the nascent, conflicting results that have emerged from prior research on alcohol-related cyber aggression. (Am J Addict 2018;XX:1-7). © 2018 American Academy of Addiction Psychiatry.
The cyber threat, trophy information and the fortress mentality.
Scully, Tim
2011-10-01
'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.
Wright, Michelle F; Li, Yan
2013-05-01
Adolescents experience various forms of strain in their lives that may contribute jointly to their engagement in cyber aggression. However, little attention has been given to this idea. To address this gap in the literature, the present longitudinal study examined the moderating influence of peer rejection on the relationship between cyber victimization at Time 1 (T1) and subsequent cyber aggression at Time 2 (T2; 6 months later) among 261 (150 girls) 6th, 7th, and 8th graders. Our findings indicated that both peer rejection and cyber victimization were related to T2 peer-nominated and self-reported cyber aggression, both relational and verbal, after controlling for gender and T1 cyber aggression. Furthermore, T1 cyber victimization was related more strongly to T2 peer-nominated and self-reported cyber aggression at higher levels of T1 peer rejection. These results extend previous findings regarding the relationship between peer rejection and face-to-face aggressive behaviors to the cyber context. In addition, our findings underscore the importance of utilizing multiple methods, such as peer-nomination and self-report, to assess cyber aggression in a school setting.
Process Security in Chemical Engineering Education
ERIC Educational Resources Information Center
Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.
2005-01-01
The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…
77 FR 14525 - Statement of Organization, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-12
... maintains the CDC Computer Security Incident Response Team; (4) performs cyber security incident reporting... systems planning and support; internal security and emergency preparedness; and management analysis and... security; education, training, and workforce development in information and IT disciplines; development and...
The Temporal Association Between Traditional and Cyber Dating Abuse Among Adolescents.
Temple, Jeff R; Choi, Hye Jeong; Brem, Meagan; Wolford-Clevenger, Caitlin; Stuart, Gregory L; Peskin, Melissa Fleschler; Elmquist, JoAnna
2016-02-01
While research has explored adolescents' use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58 % female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration 1 year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts.
The Temporal Association between Traditional and Cyber Dating Abuse among Adolescents
Temple, Jeff R.; Choi, Hye Jeong; Brem, Meagan; Wolford-Clevenger, Caitlin; Stuart, Gregory L.; Peskin, Melissa Fleschler; Elmquist, JoAnna
2015-01-01
While research has explored adolescents’ use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58% female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration one year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts. PMID:26525389
TH-AB-201-01: A Feasibility Study of Independent Dose Verification for CyberKnife
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sato, A; Noda, T; Keduka, Y
2016-06-15
Purpose: CyberKnife irradiation is composed of tiny-size, multiple and intensity-modulated beams compared to conventional linacs. Few of the publications for Independent dose calculation verification for CyberKnife have been reported. In this study, we evaluated the feasibility of independent dose verification for CyberKnife treatment as Secondary check. Methods: The followings were measured: test plans using some static and single beams, clinical plans in a phantom and using patient’s CT. 75 patient plans were collected from several treatment sites of brain, lung, liver and bone. In the test plans and the phantom plans, a pinpoint ion-chamber measurement was performed to assess dosemore » deviation for a treatment planning system (TPS) and an independent verification program of Simple MU Analysis (SMU). In the clinical plans, dose deviation between the SMU and the TPS was performed. Results: In test plan, the dose deviations were 3.3±4.5%, and 4.1±4.4% for the TPS and the SMU, respectively. In the phantom measurements for the clinical plans, the dose deviations were −0.2±3.6% for the TPS and −2.3±4.8% for the SMU. In the clinical plans using the patient’s CT, the dose deviations were −3.0±2.1% (Mean±1SD). The systematic difference was partially derived from inverse square law and penumbra calculation. Conclusion: The independent dose calculation for CyberKnife shows −3.0±4.2% (Mean±2SD) and our study, the confidence limit was achieved within 5% of the tolerance level from AAPM task group 114 for non-IMRT treatment. Thus, it may be feasible to use independent dose calculation verification for CyberKnife treatment as the secondary check. This research is partially supported by Japan Agency for Medical Research and Development (AMED)« less
Human Capital Development - Resilient Cyber Physical Systems
2017-09-29
Human Capital Development – Resilient Cyber Physical Systems Technical Report SERC-2017-TR-113 September 29, 2017 Principal Investigator...4.2.2 Cyber Attack Taxonomy for Cyber Physical Systems .............................................................................. 43 4.2.3...Cyber- physical System Attack Taxonomy ................................................................................................ 44 4.2.4
Offensive Cyber Capability: Can it Reduce Cyberterrorism
2010-12-02
33 Lech J. Janczewski, and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (New York: Information Science Reference, 2008...Science and Business Media, 2008. Janczewski, Lech , J. and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism. New York: Information Science
Traditional and cyber aggressors and victims: a comparison of psychosocial characteristics.
Sontag, Lisa M; Clemans, Katherine H; Graber, Julia A; Lyndon, Sarah T
2011-04-01
To date, relatively little is known about differences between perpetrators and victims of cyber and traditional forms of aggression. Hence, this study investigated differences among traditional and cyber aggressors and victims on psychosocial characteristics typically examined in research on traditional aggression and victimization, specifically effortful control, manipulativeness, remorselessness, proactive and reactive aggression, and anxious/depressive symptoms. Participants (N = 300; 63.2% female; M age = 12.89, SD = .95; 52% Caucasian, 27% African American, 11% Latino, and 10% other) were categorized based on aggressor type (non/low aggressor, traditional-only, cyber-only, and combined traditional and cyber) and victim type (non-victim, traditional-only, cyber-only, and combined traditional and cyber). Cyber aggressors reported lower levels of reactive aggression compared to traditional-only and combined aggressors. Combined aggressors demonstrated the poorest psychosocial profile compared to all other aggressor groups. For victimization, cyber-only and combined victims reported higher levels of reactive aggression and were more likely to be cyber aggressors themselves compared to traditional-only victims and non-victims. Findings suggest that there may be unique aspects about cyber aggression and victimization that warrant further investigation.
Construction of a General Purpose Command Language for Use in Computer Dialog.
1980-09-01
Page 1 Skeletal Command Action File...............35 2 Sample from Cyber Action File.................36 3 Program MONITOR Structure Chart...return indicates subroutine call and no return Fig 3. Program MONITOR Structure Chart 48 IV. Validation The general purpose command language was...executive control of these functions, in C addition to its role as interpreter. C C The structure , concept, design, and implementation of program C
Cyber Warfare: An Evolution in Warfare not Just War Theory
2013-04-05
cyber warfare is greatly debated. While some argue that Just War Theory is irrelevant to cyber warfare , a careful analysis demonstrates that it is a...useful tool for considering the morality of cyber warfare . This paper examines the application of Just War Theory to cyber warfare and contends that...Just War Theory is a useful tool for considering the morality of cyber warfare .
Moving Target Techniques: Cyber Resilience throught Randomization, Diversity, and Dynamism
2017-03-03
Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism Hamed Okhravi and Howard Shrobe Overview: The static...nature of computer systems makes them vulnerable to cyber attacks. Consider a situation where an attacker wants to compromise a remote system running... cyber resilience that attempts to rebalance the cyber landscape is known as cyber moving target (MT) (or just moving target) techniques. Moving target
Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy
NASA Astrophysics Data System (ADS)
Kwon, Cheolhyeon
Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.
Simulating cyber warfare and cyber defenses: information value considerations
NASA Astrophysics Data System (ADS)
Stytz, Martin R.; Banks, Sheila B.
2011-06-01
Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber resources to information protection tasks. The first section of the paper introduces the cyber warfare simulation challenge and the reasons for its importance. The second section contains background information related to our research. The third section contains a discussion of the information ring technique and its use for simulating cyber attacks. The fourth section contains a summary and suggestions for research.
75 FR 1830 - Final Regulatory Guide: Issuance, Availability
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-13
... review of applications for permits and licenses. RG 5.71, ``Cyber Security Programs for Nuclear... NUCLEAR REGULATORY COMMISSION [NRC-2010-0009] Final Regulatory Guide: Issuance, Availability AGENCY: Nuclear Regulatory Commission. ACTION: Notice of Issuance and Availability of Regulatory Guide...
2004-03-19
Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the...alternative form of conflict, reviews the traditional principles of warfare and why they may or may not apply to cyber warfare , and proposes new principles of...warfare that may be needed to conduct cyber warfare . Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2
Refocusing Cyber Warfare Thought
2013-02-01
January–February 2013 Air & Space Power Journal | 44 FeatureCyber Focus Refocusing Cyber Warfare Thought Maj Sean C. Butler, USAF In September 2007...1. REPORT DATE FEB 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Refocusing Cyber Warfare Thought 5a...2013 Air & Space Power Journal | 45 Butler Refocusing Cyber Warfare Thought FeatureCyber Focus characterized by the use of electronics and the
Nodes and Codes: The Reality of Cyber Warfare
2012-05-17
Nodes and Codes explores the reality of cyber warfare through the story of Stuxnet, a string of weaponized code that reached through a domain...nodes. Stuxnet served as a proof-of-concept for cyber weapons and provided a comparative laboratory to study the reality of cyber warfare from the...military powers most often associated with advanced, offensive cyber attack capabilities. The reality of cyber warfare holds significant operational
Integrating Data Distribution and Data Assimilation Between the OOI CI and the NOAA DIF
NASA Astrophysics Data System (ADS)
Meisinger, M.; Arrott, M.; Clemesha, A.; Farcas, C.; Farcas, E.; Im, T.; Schofield, O.; Krueger, I.; Klacansky, I.; Orcutt, J.; Peach, C.; Chave, A.; Raymer, D.; Vernon, F.
2008-12-01
The Ocean Observatories Initiative (OOI) is an NSF funded program to establish the ocean observing infrastructure of the 21st century benefiting research and education. It is currently approaching final design and promises to deliver cyber and physical observatory infrastructure components as well as substantial core instrumentation to study environmental processes of the ocean at various scales, from coastal shelf-slope exchange processes to the deep ocean. The OOI's data distribution network lies at the heart of its cyber- infrastructure, which enables a multitude of science and education applications, ranging from data analysis, to processing, visualization and ontology supported query and mediation. In addition, it fundamentally supports a class of applications exploiting the knowledge gained from analyzing observational data for objective-driven ocean observing applications, such as automatically triggered response to episodic environmental events and interactive instrument tasking and control. The U.S. Department of Commerce through NOAA operates the Integrated Ocean Observing System (IOOS) providing continuous data in various formats, rates and scales on open oceans and coastal waters to scientists, managers, businesses, governments, and the public to support research and inform decision-making. The NOAA IOOS program initiated development of the Data Integration Framework (DIF) to improve management and delivery of an initial subset of ocean observations with the expectation of achieving improvements in a select set of NOAA's decision-support tools. Both OOI and NOAA through DIF collaborate on an effort to integrate the data distribution, access and analysis needs of both programs. We present details and early findings from this collaboration; one part of it is the development of a demonstrator combining web-based user access to oceanographic data through ERDDAP, efficient science data distribution, and scalable, self-healing deployment in a cloud computing environment. ERDDAP is a web-based front-end application integrating oceanographic data sources of various formats, for instance CDF data files as aggregated through NcML or presented using a THREDDS server. The OOI-designed data distribution network provides global traffic management and computational load balancing for observatory resources; it makes use of the OpenDAP Data Access Protocol (DAP) for efficient canonical science data distribution over the network. A cloud computing strategy is the basis for scalable, self-healing organization of an observatory's computing and storage resources, independent of the physical location and technical implementation of these resources.
Why the offline are offline: a survey of internet use by educated Pakistani adults.
Shafique, Farzana; Mahmood, Khalid
2009-06-01
The study reported here explored the reasons for the relatively limited use of the Internet among educated Pakistani adults. A fairly large sample of Internet nonusers from different cities of the Punjab Province with at least secondary school education participated in a survey. Some graduate students and cyber café owners were also interviewed. The results of this study are reported in the main body of this paper, indicating that a variety of cultural, educational, and economic factors are responsible for this state of affairs.
Cyber Victimization and Depressive Symptoms in Sexual Minority College Students
ERIC Educational Resources Information Center
Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.
2016-01-01
This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…
Quantifying and measuring cyber resiliency
NASA Astrophysics Data System (ADS)
Cybenko, George
2016-05-01
Cyber resliency has become an increasingly attractive research and operational concept in cyber security. While several metrics have been proposed for quantifying cyber resiliency, a considerable gap remains between those metrics and operationally measurable and meaningful concepts that can be empirically determined in a scientific manner. This paper describes a concrete notion of cyber resiliency that can be tailored to meet specific needs of organizations that seek to introduce resiliency into their assessment of their cyber security posture.
The Cyber Defense Review. Volume 1, Number 1, Spring 2016
2016-04-20
in the Land and Cyber Domains Lieutenant General Edward C. Cardon The U.S. Navy’s Evolving Cyber/ Cybersecurity Story Rear Admiral Nancy Norton...Olav Lysne Cyber Situational Awareness Maj. Gen. Earl D. Matthews, USAF, Ret Dr. Harold J. Arata III Mr. Brian L. Hale Is There a Cybersecurity ...Kallberg The Decision to Attack: Military and Intelligence Cyber Decision-Making by Dr. Aaron F. Brantly The Cyber Defense Review
Strategic Impact of Cyber Warfare Rules for the United States
2010-03-01
Despite the growing complexities of cyberspace and the significant strategic challenge cyber warfare poses on the United States’ vital interests few...specific rules for cyber warfare exist. The United States should seek to develop and maintain cyber warfare rules in order to establish...exemplify the need for multilaterally prepared cyber warfare rules that will reduce the negative influence cyber warfare presently has on the United States’ national interests.
On Cyber Warfare Command and Control Systems
2004-06-01
longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare , and... warfare . This causes security devices to be used ineffectively and responses to be untimely. Cyber warfare then becomes a one-sided battle where the... cyber warfare strategy and tactics requires a cyber warfare command and control system. Responses to cyber attacks do not require offensive measures
Harrop, Wayne; Matteson, Ashley
This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.
Ferdinand, Jason
The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.
CyberArc: a non-coplanar-arc optimization algorithm for CyberKnife
NASA Astrophysics Data System (ADS)
Kearney, Vasant; Cheung, Joey P.; McGuinness, Christopher; Solberg, Timothy D.
2017-07-01
The goal of this study is to demonstrate the feasibility of a novel non-coplanar-arc optimization algorithm (CyberArc). This method aims to reduce the delivery time of conventional CyberKnife treatments by allowing for continuous beam delivery. CyberArc uses a 4 step optimization strategy, in which nodes, beams, and collimator sizes are determined, source trajectories are calculated, intermediate radiation models are generated, and final monitor units are calculated, for the continuous radiation source model. The dosimetric results as well as the time reduction factors for CyberArc are presented for 7 prostate and 2 brain cases. The dosimetric quality of the CyberArc plans are evaluated using conformity index, heterogeneity index, local confined normalized-mutual-information, and various clinically relevant dosimetric parameters. The results indicate that the CyberArc algorithm dramatically reduces the treatment time of CyberKnife plans while simultaneously preserving the dosimetric quality of the original plans.
CyberArc: a non-coplanar-arc optimization algorithm for CyberKnife.
Kearney, Vasant; Cheung, Joey P; McGuinness, Christopher; Solberg, Timothy D
2017-06-26
The goal of this study is to demonstrate the feasibility of a novel non-coplanar-arc optimization algorithm (CyberArc). This method aims to reduce the delivery time of conventional CyberKnife treatments by allowing for continuous beam delivery. CyberArc uses a 4 step optimization strategy, in which nodes, beams, and collimator sizes are determined, source trajectories are calculated, intermediate radiation models are generated, and final monitor units are calculated, for the continuous radiation source model. The dosimetric results as well as the time reduction factors for CyberArc are presented for 7 prostate and 2 brain cases. The dosimetric quality of the CyberArc plans are evaluated using conformity index, heterogeneity index, local confined normalized-mutual-information, and various clinically relevant dosimetric parameters. The results indicate that the CyberArc algorithm dramatically reduces the treatment time of CyberKnife plans while simultaneously preserving the dosimetric quality of the original plans.
Cyber Friendly Fire: Research Challenges for Security Informatics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.
This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a system’s topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components thatmore » comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF— including both training concepts and suggestions for decision aids and visualization approaches—are discussed.« less
Cyber-Based Turbulent Combustion Simulation
2012-02-28
flame thickness by comparing with benchmark of AFRL/RZ ( UNICORN ) suppressing the oscillatory numerical behavior. These improvements in numerical...fraction with the benchmark results of AFRL/RZ. This validating base is generated by the UNICORN program on the finest mesh available and the local...shared kinematic and thermodynamic data from the UNICORN program. The most important and meaningful conclusion can be drawn from this comparison is
The Cyber War: Maintaining and Controlling the Key Cyber Terrain of the Cyberspace Domain
2016-06-26
solution strategy to assess options that will enable the commander to realize the Air Force’s cyber mission. Recommendations will be made that will...will present a solution to assist the JFC in achieving cyberspace dominance. Background In the modern world of advanced technology, control of...the solutions are: 1) timely identification of key cyber terrain, 2) accurate mapping of the cyber terrain, 3) defense of key cyber terrain, and 4
2013-01-01
distress within the cyber warfare community. This study involved cyber warfare operators including active duty (n = 376) and civilian contractor and...revealed that when compared to civilian cyber warfare operators, active duty cyber warfare operators are more likely to suffer from the facets of...8217 write-in responses revealed cyber warfare operators attributed shift work, shift changes, and hours worked as the primary sources of high occupational
International Cyber Incident Repository System: Information Sharing on a Global Scale
DOE Office of Scientific and Technical Information (OSTI.GOV)
Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.
According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelatedmore » Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.« less
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
76 FR 22925 - Assumption Buster Workshop: Abnormal Behavior Detection Finds Malicious Actors
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-25
... Technology Research and Development (NITRD) Program, National Science Foundation. ACTION: Call for... NATIONAL SCIENCE FOUNDATION Assumption Buster Workshop: Abnormal Behavior Detection Finds...: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an...
Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work
DOE Office of Scientific and Technical Information (OSTI.GOV)
Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.
Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus onmore » our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.« less
Expectations of Internet Education: Casper College's Experience.
ERIC Educational Resources Information Center
Nelson, Gerald E.
The Internet Based Distance Learning (IBDL) classes provided in Wyoming's Casper College have the potential to benefit all involved. The "Cyber Semester," which began in the spring of 1997, consisted of four typical freshman classes (Physical Geography, Precalculus Algebra, English Composition I, and Political Science) that were offered…
78 FR 68040 - President's Council of Advisors on Science and Technology Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-13
... provide updates on its studies of education information technology and cyber- security. Additional... DEPARTMENT OF ENERGY President's Council of Advisors on Science and Technology Meeting AGENCY... Science and Technology (PCAST), and describes the functions of the Council. Notice of this meeting is...
Teaching RFID Information Systems Security
ERIC Educational Resources Information Center
Thompson, Dale R.; Di, Jia; Daugherty, Michael K.
2014-01-01
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law Enforcement’s Role?
2001-04-01
defined as cyber crime or —hacker“. Although this category of hacker includes many kinds of cyber criminals , from a DOD perspective, the motivation of a...perpetrator. 6 In his book, —Fighting Computer Crime“, Wiley identifies several types of cyber criminals . They range from pranksters who perpetrate...usually financial11 This first group of cyber criminals or —hackers“ can be categorized as Unintentional Cyber actors. Although they have a variety of
Hsu, Shih-Ming; Hung, Chao-Hsiung; Liao, Yi-Jen; Fu, Hsiao-Mei; Tsai, Jo-Ting
2017-01-01
CyberKnife is one of multiple modalities for stereotactic radiosurgery (SRS). Due to the nature of CyberKnife and the characteristics of SRS, dose evaluation of the CyberKnife procedure is critical. A radiophotoluminescent glass dosimeter was used to verify the dose accuracy for the CyberKnife procedure and validate a viable dose verification system for CyberKnife treatment. A radiophotoluminescent glass dosimeter, thermoluminescent dosimeter, and Kodak EDR2 film were used to measure the lateral dose profile and percent depth dose of CyberKnife. A Monte Carlo simulation for dose verification was performed using BEAMnrc to verify the measured results. This study also used a radiophotoluminescent glass dosimeter coupled with an anthropomorphic phantom to evaluate the accuracy of the dose given by CyberKnife. Measurements from the radiophotoluminescent glass dosimeter were compared with the results of a thermoluminescent dosimeter and EDR2 film, and the differences found were less than 5%. The radiophotoluminescent glass dosimeter has some advantages in terms of dose measurements over CyberKnife, such as repeatability, stability, and small effective size. These advantages make radiophotoluminescent glass dosimeters a potential candidate dosimeter for the CyberKnife procedure. This study concludes that radiophotoluminescent glass dosimeters are a promising and reliable dosimeter for CyberKnife dose verification with clinically acceptable accuracy within 5%. PMID:28046056
Protecting Networks Via Automated Defense of Cyber Systems
2016-09-01
autonomics, and artificial intelligence . Our conclusion is that automation is the future of cyber defense, and that advances are being made in each of...SUBJECT TERMS Internet of Things, autonomics, sensors, artificial intelligence , cyber defense, active cyber defense, automated indicator sharing...called Automated Defense of Cyber Systems, built upon three core technological components: sensors, autonomics, and artificial intelligence . Our
Cyberbully and Victim Experiences of Pre-Service Teachers
ERIC Educational Resources Information Center
Tosun, Nilgün
2016-01-01
The aim of this study was to determine the prevalence of different types of cyber bullying, the ways in which cyber bullying occurred, whether the identity of cyber bullies were known, and reaction to being cyber bullied among pre-service teachers. Relationships between gender and likelihood of being a cyber bully/victim were also investigated.…
A meta-analysis of sex differences in cyber-bullying behavior: the moderating role of age.
Barlett, Christopher; Coyne, Sarah M
2014-01-01
The current research used meta-analysis to determine whether (a) sex differences emerged in cyber-bullying frequency, (b) if age moderated any sex effect, and (c) if any additional moderators (e.g., publication year and status, country and continent of data collection) influenced the sex effect. Theoretically, if cyber-bullying is considered a form of traditional bullying and aggression, males are likely to cyber-bully more than females. Conversely, if cyber-bullying is considered relational/indirect aggression, females will be slightly more likely to cyber-bully than males. Results from 122 effect size estimates showed that males were slightly more likely to cyber-bully than females; however, age moderated the overall effect. Specifically, females were more likely to report cyber-bullying during early to mid-adolescence than males, while males showed higher levels of cyber-bullying during later adolescence than females. Publication status and year and continent and country of data collection also moderated the overall effect. © 2014 Wiley Periodicals, Inc.
78 FR 22846 - Smart Grid Advisory Committee Meeting Cancellation
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-17
... DEPARTMENT OF COMMERCE National Institute of Standards and Technology Smart Grid Advisory... Commerce. ACTION: Notice of meeting cancellation. SUMMARY: The meeting of the Smart Grid Advisory Committee... INFORMATION CONTACT: Mr. Cuong Nguyen, Smart Grid and Cyber-Physical Systems Program Office, National...
A Green Touch for the Future of Distance Education
ERIC Educational Resources Information Center
Gundogan, M. Banu; Eby, Gulsun
2012-01-01
This paper aims to draw attention to the sustainability of distance learning in terms of the design process based on learner characteristics and technology usage. Distance learning has become a cyberized system owing its presence to developments in digital technologies. Technological developments solve some immediate problems but also have the…
Bringing the Tools of Big Science to Bear on Local Environmental Challenges
ERIC Educational Resources Information Center
Bronson, Scott; Jones, Keith W.; Brown, Maria
2013-01-01
We describe an interactive collaborative environmental education project that makes advanced laboratory facilities at Brookhaven National Laboratory accessible for one-year or multi-year science projects for the high school level. Cyber-enabled Environmental Science (CEES) utilizes web conferencing software to bring multi-disciplinary,…
Ubiquitous Learning Ecologies for a Critical Cyber-Citizenship
ERIC Educational Resources Information Center
Díez-Gutiérrez, Enrique; Díaz-Nafría, José-María
2018-01-01
The aim of this research is to identify and analyse the ubiquitous learning acquired through blending education settings devoted to the "lifelong training of trainers" and how these contribute to the development of a conscious, critic and engaged citizenship. Through active exploration of the learning process, the study analyses the…
Media Culture and Media Education in Modern School
ERIC Educational Resources Information Center
Tolic, Mirela
2011-01-01
Culture is no longer conceivable without the media and/or new phenomena called. "Cyber" culture. The article discusses issues in what respect the different media, like TV, film and Internet are with different cultures, how it changes everyday life under influence of various forms of sophisticated communications media and what…
Cyber-Community for Housing, Consumer Economics Created
ERIC Educational Resources Information Center
Manley, Kelly Shannon; Sweaney, Anne L.
2007-01-01
This article discusses a curriculum resource database project for housing and consumer economics educators. This database, along with message boards, an event calendar, and discipline-related articles, is available at www.GetYourFACtS.com (Sweaney, Manley, Valente, & Black, 2002). Given the overwhelming volume of information available on the…
Board Member Testifies at Cyber Safety Hearing
ERIC Educational Resources Information Center
Kingston, Mary
2011-01-01
House Education and Labor Subcommittee on Healthy Families and Communities unanimously expressed concern for the growing trend in cyberbullying during a hearing last June 24. The event, which featured National Association of Secondary School Principals (NASSP) board member Barbara-Jane Paris and other witnesses, including TV personality Dr. Phil…
Conscientization and Third Space: A Case Study of Tunisian Activism
ERIC Educational Resources Information Center
Boumlik, Habiba; Schwartz, Joni
2016-01-01
This case study examines, "Al Bawsala," a nongovernmental organization and a female cyber social activist, Amira Yahyaoui, in the aftermath of Tunisia's Jasmine Revolution through the lens of adult education. The theoretical frameworks of conscientization and third space are employed to describe Yahyaoui's development of the watchdog…
Teacher Perceptions of Learner-Learner Engagement at a Cyber High School
ERIC Educational Resources Information Center
Borup, Jered
2016-01-01
Distance education has historically contained little or no learner-learner interactions. Currently the Internet allows for unprecedented levels of learner-learner interaction and has the potential to transform how students learn online. However, many courses offered online focus more on flexibility and independence than on interaction and…
Moving Secure Software Assurance into Higher Education: A Roadmap for Change
2011-06-02
Summarized: The Issue: 6/2/20118 Software defects are currently a fact of life Software defects are avenues of security vulnerabilities that cyber ... criminals , terrorists, or hostile nations can exploit. We (THE ENTIRE INDUSTY) need to change the way we build systems Decrease the number of defects
Urban Principals' Understanding of Cyber Bullying: New Role in School Leadership
ERIC Educational Resources Information Center
Jean-Paul, Max R.
2013-01-01
Technological advances have made cyberbullying a major problem in urban schools. In this study, I sought to explore the relationship between urban school administrators' leadership styles (team vs. transformational) and their handling of cyberbullying. I developed a survey CARES (Cyberbullying Administrative Review in Education for Schools) to…
Educators' Perspectives on Having Been Cyber Harassed: A Phenomenological Study
ERIC Educational Resources Information Center
Davenport, Paula M.
2014-01-01
The abuse of individuals through electronic means, typically of students by other students, has been researched extensively. The electronic abuse of other individuals through electronic means has received a dearth of research attention. The purpose of this qualitative transcendental phenomenological study was to explore, describe, and expand the…
Exploring Factors That Affect Adoption of Computer Security Practices among College Students
ERIC Educational Resources Information Center
Alqarni, Amani
2017-01-01
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy
2011-05-15
attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks
ERIC Educational Resources Information Center
Bhat, Christine Suniti
2008-01-01
Cyber bullying or bullying via information and communications technology tools such as the internet and mobile phones is a problem of growing concern with school-aged students. Cyber bullying actions may not take place on school premises, but detrimental effects are experienced by victims of cyber bullying in schools. Tools used by cyber bullies…
Rumination mediates the association between cyber-victimization and depressive symptoms.
Feinstein, Brian A; Bhatia, Vickie; Davila, Joanne
2014-06-01
The current study examined the 3-week prospective associations between cyber-victimization and both depressive symptoms and rumination. In addition, a mediation model was tested, wherein rumination mediated the association between cyber-victimization and depressive symptoms. Participants (N = 565 college-age young adults) completed online surveys at two time points 3 weeks apart. Results indicated that cyber-victimization was associated with increases in both depressive symptoms and rumination over time. Furthermore, results of the path analysis indicated that cyber-victimization was associated with increases in rumination over time, which were then associated with greater depressive symptoms, providing support for the proposed mediation effect for women, but not men. Findings extend previous correlational findings by demonstrating that cyber-victimization is associated with increases in symptomatology over time. Findings also suggest that the negative consequences of cyber-victimization extend beyond mental health problems to maladaptive emotion regulation. In fact, rumination may be a mechanism through which cyber-victimization influences mental health problems, at least for women. Mental health professionals are encouraged to assess cyber-victimization as part of standard victimization assessments and to consider targeting maladaptive emotion regulation in addition to mental health problems in clients who have experienced cyber-victimization.
Wright, Michelle F
2017-03-01
The present study focused on the impact of gender and gender stereotype traits (i.e., masculinity, femininity) on cyber aggression perpetration utilizing different technologies (i.e., social-networking sites, gaming consoles, mobile phones) and behaviors (i.e., cyber relational aggression, cyber verbal aggression, hacking). Participants included 233 eighth graders (108 female; M age = 13.26, SD = 0.36) from two middle schools in the Midwestern United States. Adolescents completed questionnaires on their endorsement of masculinity and femininity traits as well as how often they engaged in cyber aggression perpetration (i.e., cyber relational aggression, cyber verbal aggression, hacking) through mobile phones, social-networking sites, and gaming consoles. Findings indicated that boys and girls with more feminine traits engaged in more cyber relational aggression through social-networking sites and mobile phones, while boys and girls who endorsed more masculine traits perpetrated this behavior and cyber verbal aggression more often through online gaming. In addition, these boys and girls engaged in more hacking through all technologies when compared with girls and boys who reported more feminine traits. Results of this study indicate the importance of delineating gender stereotype traits, behaviors, and technologies when examining cyber aggression perpetration.
PAN AIR summary document (version 1.0)
NASA Technical Reports Server (NTRS)
Derbyshire, T.; Sidwell, K. W.
1982-01-01
The capabilities and limitations of the panel aerodynamics (PAN AIR) computer program system are summarized. This program uses a higher order panel method to solve boundary value problems involving the Prandtl-Glauert equation for subsonic and supersonic potential flows. Both aerodynamic and hydrodynamic problems can be solved using this modular software which is written for the CDC 6600 and 7600, and the CYBER 170 series computers.
NASA Technical Reports Server (NTRS)
1980-01-01
The requirements implementation strategy for first level development of the Integrated Programs for Aerospace Vehicle Design (IPAD) computing system is presented. The capabilities of first level IPAD are sufficient to demonstrated management of engineering data on two computers (CDC CYBER 170/720 and DEC VAX 11/780 computers) using the IPAD system in a distributed network environment.
NASA Astrophysics Data System (ADS)
Mendiola, M. A.; Aguado, P. L.; Espejo, R.
2012-04-01
The main objective of the CyberAula 2.0 project is to support, record and validate videoconferencing and lecture recording services by means the integration of the Polytechnic University of Madrid (UPM) Moodle Platform with both the Global Plaza platform and Isabel videoconference tool. Each class session is broadcast on the Internet and then recorded, enabling geographically distant students to participate in on-campus classes. All the software used in the project is open source. The videoconferencing tool that we have used is called Isabel and the web platform to schedule, perform, stream, record and publish the videoconferences automatically is called GlobalPlaza. Both of them have been developed at UPM (Universidad Politécnica de Madrid) and are specifically designed for educational purposes. Each class session is broadcasted on the Internet and recorded, enabling geographically distant students to participate live in on-campus classes with questions through a chat tool or through the same videoconference. In order to provide educational support to GlobalPlaza, the CyberAula 2.0 project has been proposed. GlobalPlaza (Barra et al., 2011) is the web platform to schedule, perform, stream, record and publish videoconferences automatically. It is integrated with the videoconferencing tool called Isabel (Quemada et al, 2005), which is a real-time collaboration tool for the Internet, which supports advanced collaborative web/videoconferencing with application sharing and TV like media integration. Both of them are open source solutions which have been developed at our university. GlobalPlaza is a web application developed in the context of the GLOBAL project, a research project supported by the European Commission's seventh framework program. Students can review the recording lectures when needed through Moodle. In this paper we present the project developed at the Escuela Técnica Superior de Ingenieros Agrónomos (ETSIA), Secondary Cycle free-elective-subject, which is currently in process of expiration with the introduction of new curricula within the framework of the European Higher Education Space. Students participate in this subject with outstanding interest, thus achieving transversal competences as they must prepare and present a report in the last week of the Semester. The Project development background was the inclusion of the subject Plants of agro-alimentary interest. It has a quite remarkable, attractive practical deal within the Subjects Offer by this Center and it is one of the most demanded subjects of the free elective ones by students, whose active participation can be highlighted, either in practical workshops or in their individual presentation of reports. In the workshops they must identify, describe, classify and even taste several species of agro-alimentary interest (fruits of tempered or tropical regions, aromatic plants and spices, edible mushrooms and cereals and pseudocereals), many of them formerly unknown for the majority. They are asked to fill some questionnaires in order to consolidate concepts and to evaluate their personal participation in the subject development.
Development of JSDF Cyber Warfare Defense Critical Capability
2010-03-01
attack identification capability is essential for a nation to defend her vital infrastructures against offensive cyber warfare . Although the necessity of...cyber-attack identification capability is quite clear, the Japans preparation against cyber warfare is quite limited.
Some of Indonesian Cyber Law Problems
NASA Astrophysics Data System (ADS)
Machmuddin, D. D.; Pratama, B.
2017-01-01
Cyber regulation is very important to control human interaction within the Internet network in cyber space. On the surface, innovation development in science and technology facilitates human activity. But on the inside, innovation was controlled by new business model. In cyber business activities mingle with individual protection. By this condition, the law should keep the balance of the activities. Cyber law problems, were not particular country concern, but its global concern. This is a good opportunity for developing country to catch up with developed country. Beside this opportunity for talented people in law and technology is become necessity. This paper tries to describe cyber law in Indonesia. As a product of a developing country there are some of weakness that can be explained. Terminology and territory of cyber space is become interesting to discuss, because this two problems can give a broad view on cyber law in Indonesia.
Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.
Albahar, Marwan
2017-01-05
In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.
Department of Defenses Enhanced Requirement for Offensive Cyber Warfare Operations
2010-04-01
The Department of Defense (DoD) needs to further develop its offensive cyber warfare capabilities at all levels. In an asymmetric environment...battlefields. If the DoD does not prosecute offensive cyber warfare tactics then the DoD has effectively allowed a significant advantage to be given...offensive cyber warfare operations, These states utilize their cyber warfare capabilities to support their national, operational and strategic
2016-09-01
manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am
Reconstruction of Cyber and Physical Software Using Novel Spread Method
NASA Astrophysics Data System (ADS)
Ma, Wubin; Deng, Su; Huang, Hongbin
2018-03-01
Cyber and Physical software has been concerned for many years since 2010. Actually, many researchers would disagree with the deployment of traditional Spread Method for reconstruction of Cyber and physical software, which embodies the key principles reconstruction of cyber physical system. NSM(novel spread method), our new methodology for reconstruction of cyber and physical software, is the solution to all of these challenges.
A Responsive Cyber Risk Ecosystem
2017-01-19
UNCLASSIFIED - Distribution A: Approved for public release; distribution unlimited AIR FORCE CYBERWORX REPORT 16-003: A RESPONSIVE CYBER RISK...right problem to solve and find meaningful solutions by exploring a wide range of possible answers to the design problem. For the Responsive Cyber ...Risk Dashboard Design Project, CyberWorx brought together a design team of 25 participants from UASFA and Industry to explore how cyber risk to AF
Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glenn, Colleen; Sterbentz, Dane; Wright, Aaron
With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices for prevention and response to cyber threats, and utility suggestions about how the federal government can aid utilities in combating and mitigating risks.« less
Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meyers, C A; Powers, S S; Faissol, D M
In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform futuremore » studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.« less
Using agility to combat cyber attacks.
Anderson, Kerry
2017-06-01
Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.
Ybarra, Michele L.; Korchmaros, Josephine D.; Prescott, Tonya L.; Birungi, Ruth
2015-01-01
Background One in twenty-five Ugandan adolescents is HIV positive. Purpose Examine the impact of an Internet-based HIV prevention program on Information-Motivation-Behavior Skills Model-related constructs. Methods Three hundred and sixty-six sexually experienced and inexperienced students 12-18+ years-old in Mbarara, Uganda were randomly assigned to: the five-lesson CyberSenga program or treatment-as-usual. Half of the intervention participants were further randomized to a booster session. Assessments were collected at three and six months post-baseline. Results Participants’ HIV-related information improved over time at a greater rate for the intervention groups compared to the control group. Motivation for condom use changed to a greater degree over time for the intervention group – especially those in the intervention+booster group - compared to the control group. Behavioral skills for condom use, and motivation and behavioral skills for abstinence were statistically similar over time for both groups. Conclusions CyberSenga improves HIV preventive information and motivation to use condoms. PMID:25633626
NASA Astrophysics Data System (ADS)
Glenn, S. M.; Companion, C.; Crowley, M.; deCharon, A.; Fundis, A. T.; Kilb, D. L.; Levenson, S.; Lichtenwalner, C. S.; McCurdy, A.; McDonnell, J. D.; Overoye, D.; Risien, C. M.; Rude, A.; Wieclawek, J., III
2011-12-01
The National Science Foundation's Ocean Observatories Initiative (OOI) is constructing observational and computer infrastructure that will provide sustained ocean measurements to study climate variability, ocean circulation, ecosystem dynamics, air-sea exchange, seafloor processes, and plate-scale geodynamics over the next ~25-30 years. To accomplish this, the Consortium for Ocean Leadership established four Implementing Organizations: (1) Regional Scale Nodes; (2) Coastal and Global Scale Nodes; (3) Cyberinfrastructure (CI); and (4) Education and Public Engagement (EPE). The EPE, which we represent, was just recently established to provide a new layer of cyber-interactivity for educators to bring near real-time data, images and videos of our Earth's oceans into their learning environments. Our focus over the next four years is engaging educators of undergraduates and free-choice learners. Demonstration projects of the OOI capabilities will use an Integrated Education Toolkit to access OOI data through the Cyberinfrastructure's On Demand Measurement Processing capability. We will present our plans to develop six education infrastructure software modules: Education Web Services (middleware), Visualization Tools, Concept Map and Lab/Lesson Builders, Collaboration Tools, and an Education Resources Database. The software release of these tools is staggered to coincide with other major OOI releases. The first release will include stand-alone versions of the first four EPE modules (Fall 2012). Next, all six EPE modules will be integrated within the OOI cyber-framework (Fall 2013). The last release will include advanced capabilities for all six modules within a collaborative network that leverages the CI's Integrated Observatory Network (Fall 2014). We are looking for undergraduate and informal science educators to provide feedback and guidance on the project, please contact us if you are interested in partnering with us.
Cyber warfare: Armageddon in a Teacup?
2009-12-11
Security concerns over the growing capability of Cyber Warfare are in the forefront of national policy and security discussions. In order to enable a...realistic discussion of the topic this thesis seeks to analyze demonstrated Cyber Warfare capability and its ability to achieve strategic political...objectives. This study examines Cyber Warfare conducted against Estonia in 2007, Georgia in 2008, and Israel in 2008. In all three cases Cyber Warfare did
The Characterization and Measurement of Cyber Warfare, Spring 2008 - Project 08-01
2008-05-01
Global Innovation and Strategy Center The Characterization and Measurement of Cyber Warfare Spring 2008 – Project 08-01 May 2008...and Measurement of Cyber Warfare N/A N/A N/A 08-01Dobitz, Kyle Haas, Brad Holtje, Michael Jokerst, Amanda Ochsner, Geoff Silva, Stephanie...research team as critical for purposes of cyber act characterization: Motivation, Intent, Target, Effects, and Actors. cyberspace, cyber warfare , targets
At the Crossroads of Cyber Warfare: Signposts for the Royal Australian Air Force
2011-06-01
At the Crossroads of Cyber Warfare : Signposts for the Royal Australian Air Force by Craig Stallard, Squadron leader, Royal...in the conduct of cyber warfare . The 2009 Defence White Paper provided some clarity by indentifying cyber warfare as critical to the maintenance...of national security, but left open the most important issue: should cyber warfare be a joint engagement or a service oriented fight? The RAAF
Cyber Warfare: New Character with Strategic Results
2013-03-01
The advent of cyber warfare has sparked a debate amongst theorists as to whether timeless Clausewitzian principles remain true in the 21st century...Violence, uncertainty, and rationality still accurately depict the nature of cyber warfare , however, its many defining attributes and means by which...this style of warfare is conducted has definitively changed the character of war. Although cyber warfare is contested in the cyber domain, it often
ERIC Educational Resources Information Center
Conley-Ware, Lakita D.
2010-01-01
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Defense Science Board Task Force Report on Cyber Defense Management
2016-09-01
manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am
Literature Review on Modeling Cyber Networks and Evaluating Cyber Risks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kelic, Andjelka; Campbell, Philip L
The National Infrastructure Simulations and Analysis Center (NISAC) conducted a literature review on modeling cyber networks and evaluating cyber risks. The literature review explores where modeling is used in the cyber regime and ways that consequence and risk are evaluated. The relevant literature clusters in three different spaces: network security, cyber-physical, and mission assurance. In all approaches, some form of modeling is utilized at varying levels of detail, while the ability to understand consequence varies, as do interpretations of risk. This document summarizes the different literature viewpoints and explores their applicability to securing enterprise networks.
Cyber Shovels in High School: An Online Soil Science Resource for Educators
NASA Astrophysics Data System (ADS)
Krzic, M.; Basiliko, N.; Bedard-Haughn, A.; Humphreys, E.; Price, G.; Dampier, L.; Grand, S.; Dynatkar, S.; Crowley, C.
2012-04-01
Declining enrolment in soil science courses at post-secondary institutions in Canada and around the world tells us that fewer high school students are considering a career in this discipline than ever before. This may be due to soil science programs losing visibility as they are incorporated into other, larger programs; a lack of awareness of what opportunities exist for soil science professionals; or a disinclination of high school educators to use soil science scenarios as examples in their science curriculum. In 2010, we initiated a three-year, multi-institutional project aimed at introducing soil science concepts into high school curricula across Canada. The goals of this project are to promote learning about the importance of soil as a natural resource, provide useful tools that high school educators can incorporate into their lesson plans, and encourage students to pursue soil science in their higher education. The tool (http://soilweb.landfood.ubc.ca/youth/) features five main themes: (1) descriptions of soil research projects currently undertaken by faculty at five universities across Canada; (2) links to age-appropriate soil related resources that provide exercises and examples teachers can easily use; (3) profiles of soil scientists "at work" in a diverse range of careers to motivate future soil scientists; (4) examples of recent news stories about soil to highlight its relevance in our day to day lives; and (5) a soil forum for students and teachers to ask questions. This tool will be further refined by incorporating feedback obtained from high school teachers and students.
Space and Cyber: Shared Challenges, Shared Opportunities
2011-11-15
adversaries to have effective capabilities against networks and computer systems, unlike those anywhere else—here, cyber criminals , proxies for hire, and...or unintentional, conditions can impact our ability to use space and cyber capabilities. As the tools and techniques developed by cyber criminals continue
Examining Cyber Command Structures
2015-03-01
domains, cyber, command and control, USCYBERCOM, combatant command, cyber force PAGES 65 16. PRICE CODE 17. SECURITY 18. SECURITY 19. SECURITY 20...USCYBERCOM, argue for the creation of a stand-alone cyber force.11 They claim that the military’s tradition-oriented and inelastic nature make the
NASA Astrophysics Data System (ADS)
Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting
2016-10-01
Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.
A continuous arc delivery optimization algorithm for CyberKnife m6.
Kearney, Vasant; Descovich, Martina; Sudhyadhom, Atchar; Cheung, Joey P; McGuinness, Christopher; Solberg, Timothy D
2018-06-01
This study aims to reduce the delivery time of CyberKnife m6 treatments by allowing for noncoplanar continuous arc delivery. To achieve this, a novel noncoplanar continuous arc delivery optimization algorithm was developed for the CyberKnife m6 treatment system (CyberArc-m6). CyberArc-m6 uses a five-step overarching strategy, in which an initial set of beam geometries is determined, the robotic delivery path is calculated, direct aperture optimization is conducted, intermediate MLC configurations are extracted, and the final beam weights are computed for the continuous arc radiation source model. This algorithm was implemented on five prostate and three brain patients, previously planned using a conventional step-and-shoot CyberKnife m6 delivery technique. The dosimetric quality of the CyberArc-m6 plans was assessed using locally confined mutual information (LCMI), conformity index (CI), heterogeneity index (HI), and a variety of common clinical dosimetric objectives. Using conservative optimization tuning parameters, CyberArc-m6 plans were able to achieve an average CI difference of 0.036 ± 0.025, an average HI difference of 0.046 ± 0.038, and an average LCMI of 0.920 ± 0.030 compared with the original CyberKnife m6 plans. Including a 5 s per minute image alignment time and a 5-min setup time, conservative CyberArc-m6 plans achieved an average treatment delivery speed up of 1.545x ± 0.305x compared with step-and-shoot plans. The CyberArc-m6 algorithm was able to achieve dosimetrically similar plans compared to their step-and-shoot CyberKnife m6 counterparts, while simultaneously reducing treatment delivery times. © 2018 American Association of Physicists in Medicine.
Recommendations for Model Driven Paradigms for Integrated Approaches to Cyber Defense
2017-03-06
analogy (e.g., Susceptible, Infected, Recovered [SIR]) • Abstract wargaming: game -theoretic model of cyber conflict without modeling the underlying...malware. 3.7 Abstract Wargaming Here, a game -theoretic process is modeled with moves and effects inspired by cyber conflict but without modeling the...underlying processes of cyber attack and defense. Examples in literature include the following: • Cho J-H, Gao J. Cyber war game in temporal networks
2015-10-01
AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE...order to prevent catastrophic second and third order effects. Rule 43 “prohibits means or methods of cyber warfare that indiscriminate by nature...Means and methods of cyber warfare are indiscriminate by nature if they cannot be: directed at a specific military objective, or limited in their
Initial Report of the Deans Cyber Warfare Ad Hoc Committee
2011-12-22
in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that
Anonymous As a Cyber Tribe: A New Model for Complex, Non-State Cyber Actors
2015-05-01
personas. Only then can cyber strategists exercise the required amount of cultural relativism needed to influence complex, and sometimes disturbing...that runs counter to their professional ethic ? When cyber tribes employ atrocity to create cultural barriers, how will planners remain focused on...as a cyber actor’s motivation? Meeting these challenges requires new levels of cultural relativism —the understanding of a “culture or a cultural
Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below
Future U.S. Army cyber operations will need to be conducted jointly and at all echelons and must include both defensive and offensive components.1...The Army is now developing doctrine, concepts, and capabilities to conduct and support tactical cyber operations. We propose the following vision...statement: The Army will be able to employ organic cyber capabilities at the tactical echelon with dedicated personnel in support of tactical units while
CYBER: CHANGING THE LANDSCAPE OF FOREIGN INTERVENTION IN DEMOCRATIC ELECTIONS
than the costs); and 3) the methods and tools for intervening are readily available. Cyber has had a significant impact on all three of the components...significant domestic actor and can act unilaterally to influence public opinion. Second, cyber lowers both the actual and perceived costs of...intervention. Finally, cyber methods and tools are available to almost anyone at any level. Cyber has lowered the barrier to electoral intervention. As a
Structural Causes and Cyber Effects: A Response to Our Critics
2015-01-01
the incident, saying “North Korea’s attack on [Sony] reaf- firms that cyber threats pose one of the gravest national security dangers to the United...around the world to strengthen cyber - security , promote norms of acceptable state behavior, uphold freedom of expression, and ensure that the Internet... cyber working group that made progress toward “interna- tional cyberspace rules, and measures to boost dialogue and cooperation on cyber security .”15
Establishing a Cyber Warrior Force
2004-09-01
Cyber Warfare is widely touted to be the next generation of warfare. As America’s reliance on automated systems and information technology increases...so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare . Historically
Watkins, Laura E; Maldonado, Rosalita C; DiLillo, David
2018-07-01
The purpose of this study was to develop and provide initial validation for a measure of adult cyber intimate partner aggression (IPA): the Cyber Aggression in Relationships Scale (CARS). Drawing on recent conceptual models of cyber IPA, items from previous research exploring general cyber aggression and cyber IPA were modified and new items were generated for inclusion in the CARS. Two samples of adults 18 years or older were recruited online. We used item factor analysis to test the factor structure, model fit, and invariance of the measure structure across women and men. Results confirmed that three-factor models for both perpetration and victimization demonstrated good model fit, and that, in general, the CARS measures partner cyber aggression similarly for women and men. The CARS also demonstrated validity through significant associations with in-person IPA, trait anger, and jealousy. Findings suggest the CARS is a useful tool for assessing cyber IPA in both research and clinical settings.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-05
... (DHS), Science and Technology, Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT) Program AGENCY: Science and Technology Directorate, DHS. ACTION: 30-Day notice and request for comment. SUMMARY: The Department of Homeland Security (DHS), Science & Technology (S&T...
Sandia National Laboratories: Directed-energy tech receives funding to
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research
Developing a Tactical Environment Cyber Operations Training Program
2015-01-31
coagulation, flocculation, sedimentation, filtration, and disinfection is used for treatment of the water. The treated water is pumped under pres- sure into...Radio Frequency 0 Simplex and duplex 0 Tum-on time 0 Frequencies 0 Path studies and seasonal variations 0 Solar variations 0 Reliability and
2014-06-01
SCADA / ICS Cyber Test Lab initiated in 2013 Psychosocial – academic research exists,; opportunity for sharing and developing impact assessment...ecosystems and species at risk), accidents / system failure (rail; pipelines ; ferries CSSP strategy for the North Focus on regional l(and local) problem...Guidance; business planning; environmental scan; proposal evaluation; and performance measurement Program Risk Management – Guidelines for project
Lifelong Learning for Sustainable Community Development in a Japanese Case
ERIC Educational Resources Information Center
Maruyama, Hideki
2009-01-01
The scope of lifelong learning in Japan covers school education and informal learning. Japan faces large social changes: severe child population decline could ease competition for entrance examination but students are pushed to win in the society; cyber communication changes the human relationships more invisible and atomized; the gap between…
From Bricks to Clicks: Blurring Classroom/Cyber Lines
ERIC Educational Resources Information Center
Pape, Liz
2006-01-01
In recent years, thanks to the evolution of the Internet, wide availability of classroom computers and increased broadband access, blended learning is emerging as a new tool in the K-12 educational toolkit. Defined as learning that combines online and face-to-face approaches, blended learning is accomplished through the combined use of virtual and…
Cyber Bullying and Our Middle School Girls
ERIC Educational Resources Information Center
Stomfay-Stitz, Aline; Wheeler, Edyth
2007-01-01
This column of Childhood Education focuses on middle school girls. Cyberbullying has emerged as a new, insidious, and harmful way of getting back at an individual girl who may be "different" or disliked for a physical or social trait. Cyberbullying has been described as "willful and repeated harm inflicted through the medium of electronic text"…
ERIC Educational Resources Information Center
Kafafian, Haig
The volume contains experimental instructional materials designed for teacher and handicapped student use with two man-machine communications systems, Cybertype and Cyber-Go-Round, developed as educational aids for the severely handicapped. Cybertype is a writing machine with various possible configurations of portable keyboards with a reduced…
Cyber Peer-Led Team Learning (cPLTL): Development and Implementation
ERIC Educational Resources Information Center
Mauser, Kevin; Sours, John; Banks, Julianna; Newbrough, Randy; Janke, Tom; Shuck, Lorie; Zhu, Lin; Ammerman, Gina; Varma-Nelson, Pratibha
2011-01-01
The type and amount of student interaction with major socializing agents on campus--faculty and their peers--determine the impact of college on students. Much of the research on postsecondary education links the quality of peer interactions directly to student learning outcomes and satisfaction with the college experience, and Alexander Astin went…
Impact of Collaborative Work on Technology Acceptance: A Case Study from Virtual Computing
ERIC Educational Resources Information Center
Konak, Abdullah; Kulturel-Konak, Sadan; Nasereddin, Mahdi; Bartolacci, Michael R.
2017-01-01
Aim/Purpose: This paper utilizes the Technology Acceptance Model (TAM) to examine the extent to which acceptance of Remote Virtual Computer Laboratories (RVCLs) is affected by students' technological backgrounds and the role of collaborative work. Background: RVCLs are widely used in information technology and cyber security education to provide…
Cultivating a Cyber-Safety Culture among School Learners in South Africa
ERIC Educational Resources Information Center
Kritzinger, Elmarie
2017-01-01
Technology is playing an increasingly significant role in people's lives. They use it for work, education, business and social activities; however, their use of different kinds of information communication technologies (ICTs) puts their personal information at risk. It is essential for everyone using ICTs to be aware of the potential information…
ERIC Educational Resources Information Center
Pellas, Nikolaos
2014-01-01
Nowadays, the dissemination and exploitation of three-dimensional (3D) multi-user virtual worlds in higher education have been disclosed from their widespread acceptance as candidate learning platforms. However, it is still lacking a theoretical cybernetic macro-script to elaborate the coordination of multiple complex interactions among…
ERIC Educational Resources Information Center
Villano, Matt
2006-01-01
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Cyber Warfare as an Operational Fire
2010-04-03
This paper explores cyber warfare as an option for creating operational fires effects. Initially, cyberspace is defined and explained from the...fires are defined and the advantages of their use are explained. From there, discussion focuses on how cyber warfare fulfills the purposes of...operational fires. Finally, the paper draws conclusions about the viability of cyber warfare as an operational fire and makes recommendations about how to prioritize the activities of the newly approved U.S. Cyber Command.
WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT
2017-04-06
use these increased cyber capabilities in attempts to wield greater influence in statecraft, cyber tools have not lived up to the hype of the great... influenced by, the cyber domain. A 2017 U.S. Defense Science Board report recognizes the significant economic, social, and military advantages the U.S. gains...reliant upon or connected to the internet, look to cyber to provide them a disproportionate level of influence in international affairs. The lack of
Lugo, Ricardo G; Helkala, Kirsi; Knox, Benjamin J; Jøsok, Øyvind; Lande, Natalie M; Sütterlin, Stefan
2018-01-01
Background Technical advancement in military cyber defense poses increased cognitive demands on cyber officers. In the cyber domain, the influence of emotion on decision-making is rarely investigated. The purpose of this study was to assess psychophysiological correlation with perseverative cognitions during emotionally intensive/stressful situations in cyber military personnel. In line with parallel research on clinical samples high on perseverative cognition, we expected a decreased interoceptive sensitivity in officers with high levels of perseverative cognition. Method We investigated this association in a sample of 27 cyber officer cadets. Results Contrary to our hypothesis, there was no relationship between the factors. Discussion Cyber officers might display characteristics not otherwise found in general populations. The cyber domain may lead to a selection process that attracts different profiles of cognitive and emotional processing. PMID:29296103
2015-06-12
Unconventional Warfare, Cyberspace Operations, Cyber Warfare , Hacktivism, China, Russia, Georgia, Estonia, Umbrella Revolution, UW, Cyber, Guerilla, Hacktivist...6 Cyber Warfare ............................................................................................................. 7...Internet, and cyber warfare , the nature of the human element in cyberspace exhibits only a scientific advancement in the evolution of warfare, not a
LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE
2015-12-01
Lessons From The Front: A Case Study Of Russian Cyber Warfare looks to capitalize on the lessons learned from the alleged Russian cyber-offensive on...through the careful analysis and comparison of two disparate conflicts related by their collision with Russian cyber - warfare . Following case study
78 FR 79411 - Announcement of Competition Under the America COMPETES Act
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... announces the Cyber Grand Challenge (CGC), a prize competition under 15 U.S.C. 3719, the America COMPETES... cyber defense systems. The CGC seeks to engender a new generation of autonomous cyber defense... experts. FOR FURTHER INFORMATION CONTACT: All questions regarding the competition may be sent to Cyber...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-31
... Cyber Security Trade Mission to Saudi Arabia and Kuwait, September 28-October 1, 2013 AGENCY... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry...
Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach
NASA Technical Reports Server (NTRS)
Roy, Sandip; Sridhar, Banavar
2016-01-01
Air transportation networks are being disrupted with increasing frequency by failures in their cyber- (computing, communication, control) systems. Whether these cyber- failures arise due to deliberate attacks or incidental errors, they can have far-reaching impact on the performance of the air traffic control and management systems. For instance, a computer failure in the Washington DC Air Route Traffic Control Center (ZDC) on August 15, 2015, caused nearly complete closure of the Centers airspace for several hours. This closure had a propagative impact across the United States National Airspace System, causing changed congestion patterns and requiring placement of a suite of traffic management initiatives to address the capacity reduction and congestion. A snapshot of traffic on that day clearly shows the closure of the ZDC airspace and the resulting congestion at its boundary, which required augmented traffic management at multiple locations. Cyber- events also have important ramifications for private stakeholders, particularly the airlines. During the last few months, computer-system issues have caused several airlines fleets to be grounded for significant periods of time: these include United Airlines (twice), LOT Polish Airlines, and American Airlines. Delays and regional stoppages due to cyber- events are even more common, and may have myriad causes (e.g., failure of the Department of Homeland Security systems needed for security check of passengers, see [3]). The growing frequency of cyber- disruptions in the air transportation system reflects a much broader trend in the modern society: cyber- failures and threats are becoming increasingly pervasive, varied, and impactful. In consequence, an intense effort is underway to develop secure and resilient cyber- systems that can protect against, detect, and remove threats, see e.g. and its many citations. The outcomes of this wide effort on cyber- security are applicable to the air transportation infrastructure, and indeed security solutions are being implemented in the current system. While these security solutions are important, they only provide a piecemeal solution. Particular computers or communication channels are protected from particular attacks, without a holistic view of the air transportation infrastructure. On the other hand, the above-listed incidents highlight that a holistic approach is needed, for several reasons. First, the air transportation infrastructure is a large scale cyber-physical system with multiple stakeholders and diverse legacy assets. It is impractical to protect every cyber- asset from known and unknown disruptions, and instead a strategic view of security is needed. Second, disruptions to the cyber- system can incur complex propagative impacts across the air transportation network, including its physical and human assets. Also, these implications of cyber- events are exacerbated or modulated by other disruptions and operational specifics, e.g. severe weather, operator fatigue or error, etc. These characteristics motivate a holistic and strategic perspective on protecting the air transportation infrastructure from cyber- events. The analysis of cyber- threats to the air traffic system is also inextricably tied to the integration of new autonomy into the airspace. The replacement of human operators with cyber functions leaves the network open to new cyber threats, which must be modeled and managed. Paradoxically, the mitigation of cyber events in the airspace will also likely require additional autonomy, given the fast time scale and myriad pathways of cyber-attacks which must be managed. The assessment of new vulnerabilities upon integration of new autonomy is also a key motivation for a holistic perspective on cyber threats.
Ybarra, Michele L.; Bull, Sheana S.; Prescott, Tonya L.; Korchmaros, Josephine D.; Bangsberg, David R.; Kiwanuka, Julius P.
2013-01-01
Context Cost-effective, scalable programs are urgently needed in countries deeply affected by HIV. Methods This parallel-group RCT was conducted in four secondary schools in Mbarara, Uganda. Participants were 12 years and older, reported past-year computer or Internet use, and provided informed caregiver permission and youth assent. The intervention, CyberSenga, was a five-hour online healthy sexuality program. Half of the intervention group was further randomized to receive a booster at four-months post-intervention. The control arm received ‘treatment as usual’ (i.e., school-delivered sexuality programming). The main outcome measures were: 1) condom use and 2) abstinence in the past three months at six-months' post-intervention. Secondary outcomes were: 1) condom use and 2) abstinence at three-month's post-intervention; and 6-month outcomes by booster exposure. Analyses were intention to treat. Results All 416 eligible youth were invited to participate, 88% (n = 366) of whom enrolled. Participants were randomized to the intervention (n = 183) or control (n = 183) arm; 91 intervention participants were further randomized to the booster. No statistically significant results were noted among the main outcomes. Among the secondary outcomes: At three-month follow-up, trends suggested that intervention participants (81%) were more likely to be abstinent than control participants (74%; p = 0.08), and this was particularly true among youth who were abstinent at baseline (88% vs. 77%; p = 0.02). At six-month follow-up, those in the booster group (80%) reported higher rates of abstinence than youth in the intervention, no booster (57%) and control (55%) groups (p = 0.15); they also reported lower rates of unprotected sex (5%) compared to youth in the intervention, no booster (24%) and control (21%) groups (p = 0.21) among youth sexually active at baseline. Conclusions The CyberSenga program may affect HIV preventive behavior among abstinent youth in the short term and, with the booster, may also promote HIV preventive behavior among sexually active youth in the longer term. Trial Registration NCT00906178. PMID:23967069
Leadership of Cyber Warriors: Enduring Principles and New Directions
2011-07-11
cyber warfare threat against the United States, the creation of United States Cyber Command and the designation of cyberspace as a warfighting domain now necessitate study of the attributes of successful cyber warfare leaders and the leadership techniques required to successfully lead cyber warriors. In particular, we must develop an understanding of where traditional kinetic leadership paradigms succeed, where they fail, and where new techniques must be adopted. Leadership is not a one size fits all endeavor. The capabilities and characteristics of
CyberPetri at CDX 2016: Real-time Network Situation Awareness
DOE Office of Scientific and Technical Information (OSTI.GOV)
Arendt, Dustin L.; Best, Daniel M.; Burtner, Edwin R.
CyberPetri is a novel visualization technique that provides a flexible map of the network based on available characteristics, such as IP address, operating system, or service. Previous work introduced CyberPetri as a visualization feature in Ocelot, a network defense tool that helped security analysts understand and respond to an active defense scenario. In this paper we present a case study in which we use the CyberPetri visualization technique to support real-time situation awareness during the 2016 Cyber Defense Exercise.
2017-09-01
For the first time since the creation of the Special Forces branch in 1987, the Army authorized the creation of a new branch, the Cyber branch. With...management model. The purpose of our research is to evaluate the effectiveness of that model to recruit Cyber Operations Officers and to examine the...performance (MOPs) and measures of effectiveness (MOEs) based on data collected from: Army institutions; a survey of the Cyber Branch population; and the
Defense Acquisition Research Journal. Volume 21, Number 4, Issue 71, October 2014
2014-10-01
Military Sales and Direct Contractor Sales Strategies into Programs • Controlling Costs Throughout the Product Life Cycle • System Cyber Hardness GROUND...Power • Life Cycle Chart • iTunes • Defense Acquisition Guide Book iCatalog • Course Schedule • Equivalency Fulfillment • Predecessors/Prerequisites
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-11
... biogeochemical studies; (3) cyber-water research program; and (4) integration modeling for national weather... agencies began formal cooperation under a Memorandum of Understanding (MOU) on the research and development of multimedia (i.e. air, soil, water) environmental models. This MOU established the Federal...
CyberConnect: Use the Internet with Big6[R] Skills To Achieve Standards.
ERIC Educational Resources Information Center
Murray, Janet
2003-01-01
Describes the use of Big6 strategies in guiding student research projects as part of a cooperative program between teachers and the school librarian. Topics include information seeking strategies; evaluating information sources; locating information using search engines; analyzing information sources; and achieving information literacy and…
75 FR 10328 - Wolf Creek Nuclear Operating Corporation, Wolf Creek Generating Station; Exemption
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-05
... Plan, Safeguards Contingency Plan, and Cyber Security Plan referred to collectively hereafter as... its security plans. Pursuant to 10 CFR 51.32, ``Finding of no significant impact,'' the Commission has... by designing and implementing comprehensive site security programs. The amendments to 10 CFR 73.55...
78 FR 72755 - Version 5 Critical Infrastructure Protection Reliability Standards
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-03
... (e.g., thumb drives and laptop computers) that fall outside of the BES Cyber Asset definition.\\5... implementation study is part of a larger program that includes the development of guidance, outreach to industry... the goals of the implementation study include: (1) Improving industry's understanding of the technical...
Cyber security issues in online games
NASA Astrophysics Data System (ADS)
Zhao, Chen
2018-04-01
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
The relationship between young adults' beliefs about anonymity and subsequent cyber aggression.
Wright, Michelle F
2013-12-01
Anonymity is considered a key motivator for cyber aggression, but few investigations have focused on the connection between anonymity and the subsequent engagement in aggression through the cyber context. The present longitudinal study utilized structural equation modeling to reveal indirect associations between two types of anonymity (i.e., punishment by authority figures and retaliation from the target) and later cyber aggression among 130 young adults. These relationships were examined through the influence of beliefs about not getting caught and not believing in the permanency of online content. Findings indicated that both forms of anonymity were related to cyber aggression 6 months later through two explanatory mechanisms (i.e., confidence with not getting caught and believing online content is not permanent), after controlling for gender and cyber aggression at Time 1. The implications of these findings are discussed, and an appeal for additional research investigating cyber aggression among young adults is given.
Joint Command and Control of Cyber Operations: The Joint Force Cyber Component Command (JFCCC)
2012-05-04
relies so heavily on complex command and control systems and interconnectivity in general, cyber warfare has become a serious topic of interest at the...defensive cyber warfare into current and future operations and plans. In particular, Joint Task Force (JTF) Commanders must develop an optimum method to
ERIC Educational Resources Information Center
Craver, Kathleen W.
This book provides school library media specialists (SLMSs) with practical guidelines and suggested Internet sites for designing cyber libraries that are reflective of their school's research, curriculum, and recreational reading needs. An introduction provides SLMSs with a rationale for designing cyber libraries. Chapter 1, Cyber Library…
Cyberprints: Identifying Cyber Attackers by Feature Analysis
ERIC Educational Resources Information Center
Blakely, Benjamin A.
2012-01-01
The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…
Command and Control of the Department of Defense in Cyberspace
2011-03-24
superiority are also unclassified and constantly probed by intruders and cyber criminals .5 To secure and defend our nation from cyber attacks and conduct...USCYBERCOM to use both offensive and defensive cyber weapons and the tools necessary to hunt down cyber criminals based on rule of law and the legal
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
...-0143-01] Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and... (NIST) seeks comments on the second draft of NISTIR 7628, Smart Grid Cyber Security Strategy and..., vulnerability categories, bottom-up analysis, individual logical interface diagrams, and the cyber security...
Cyber Children: What Parents Need to Know
ERIC Educational Resources Information Center
Roberts, Kevin J.
2010-01-01
Parents need to be aware of the dangers and the opportunities the cyber world offers. Video games are being used in the classroom. Commerce is increasingly taking place online and computers are indispensable in the workplace. A cyber-oriented child possesses some great advantages. The author urges parents to become experts in the cyber world so…
An Analysis of Pennsylvania's Cyber Charter Schools. Issue Brief
ERIC Educational Resources Information Center
Jack, James; Sludden, John; Schott, Adam
2013-01-01
Pennsylvania's first cyber charter school opened in 1998, enrolling 44 full-time students. From this modest beginning, Pennsylvania's cyber charter sector has grown to 16 schools enrolling 35,000 students from all but one school district in the Commonwealth. Pennsylvania has one of the nation's most extensive cyber charter sectors, and six…
Uncovering the Structure of and Gender and Developmental Differences in Cyber Bullying
ERIC Educational Resources Information Center
Griezel, Lucy; Finger, Linda R.; Bodkin-Andrews, Gawaian H.; Craven, Rhonda G.; Yeung, Alexander Seeshing
2012-01-01
Although literature on traditional bullying is abundant, a limited body of sound empirical research exists regarding its newest form: cyber bullying. The sample comprised Australian secondary students (N = 803) and aimed to identify the underlying structure of cyber bullying, and differences in traditional and cyber bullying behaviors across…
Cyber-Physical System Security of a Power Grid: State-of-the-Art
Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing
2016-07-14
Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less
Towards a Research Agenda for Cyber Friendly Fire
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.
Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is tomore » examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.« less
Cyber-Physical System Security of a Power Grid: State-of-the-Art
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing
Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less
Yang, Su-Jin; Stewart, Robert; Kim, Jae-Min; Kim, Sung-Wan; Shin, Il-Seon; Dewey, Michael E; Maskey, Sean; Yoon, Jin-Sang
2013-05-01
Traditional bullying has received considerable research but the emerging phenomenon of cyber-bullying much less so. Our study aims to investigate environmental and psychological factors associated with traditional and cyber-bullying. In a school-based 2-year prospective survey, information was collected on 1,344 children aged 10 including bullying behavior/experience, depression, anxiety, coping strategies, self-esteem, and psychopathology. Parents reported demographic data, general health, and attention-deficit hyperactivity disorder (ADHD) symptoms. These were investigated in relation to traditional and cyber-bullying perpetration and victimization at age 12. Male gender and depressive symptoms were associated with all types of bullying behavior and experience. Living with a single parent was associated with perpetration of traditional bullying while higher ADHD symptoms were associated with victimization from this. Lower academic achievement and lower self esteem were associated with cyber-bullying perpetration and victimization, and anxiety symptoms with cyber-bullying perpetration. After adjustment, previous bullying perpetration was associated with victimization from cyber-bullying but not other outcomes. Cyber-bullying has differences in predictors from traditional bullying and intervention programmes need to take these into consideration.
Zweig, Janine M; Dank, Meredith; Yahner, Jennifer; Lachman, Pamela
2013-07-01
To date, little research has documented how teens might misuse technology to harass, control, and abuse their dating partners. This study examined the extent of cyber dating abuse-abuse via technology and new media-in youth relationships and how it relates to other forms of teen dating violence. A total of 5,647 youth from ten schools in three northeastern states participated in the survey, of which 3,745 reported currently being in a dating relationship or having been in one during the prior year (52 % were female; 74 % White). Just over a quarter of youth in a current or recent relationship said that they experienced some form of cyber dating abuse victimization in the prior year, with females reporting more cyber dating abuse victimization than males (particularly sexual cyber dating abuse). One out of ten youth said that they had perpetrated cyber dating abuse, with females reporting greater levels of non-sexual cyber dating abuse perpetration than males; by contrast, male youth were significantly more likely to report perpetrating sexual cyber dating abuse. Victims of sexual cyber dating abuse were seven times more likely to have also experienced sexual coercion (55 vs. 8 %) than were non-victims, and perpetrators of sexual cyber dating abuse were 17 times more likely to have also perpetrated sexual coercion (34 vs. 2 %) than were non-perpetrators. Implications for practice and future research are discussed.
A cyber-event correlation framework and metrics
NASA Astrophysics Data System (ADS)
Kang, Myong H.; Mayfield, Terry
2003-08-01
In this paper, we propose a cyber-event fusion, correlation, and situation assessment framework that, when instantiated, will allow cyber defenders to better understand the local, regional, and global cyber-situation. This framework, with associated metrics, can be used to guide assessment of our existing cyber-defense capabilities, and to help evaluate the state of cyber-event correlation research and where we must focus our future cyber-event correlation research. The framework, based on the cyber-event gathering activities and analysis functions, consists of five operational steps, each of which provides a richer set of contextual information to support greater situational understanding. The first three steps are categorically depicted as increasingly richer and broader-scoped contexts achieved through correlation activity, while in the final two steps, these richer contexts are achieved through analytical activities (situation assessment, and threat analysis & prediction). Category 1 Correlation focuses on the detection of suspicious activities and the correlation of events from a single cyber-event source. Category 2 Correlation clusters the same or similar events from multiple detectors that are located at close proximity and prioritizes them. Finally, the events from different time periods and event sources at different location/regions are correlated at Category 3 to recognize the relationship among different events. This is the category that focuses on the detection of large-scale and coordinated attacks. The situation assessment step (Category 4) focuses on the assessment of cyber asset damage and the analysis of the impact on missions. The threat analysis and prediction step (Category 5) analyzes attacks based on attack traces and predicts the next steps. Metrics that can distinguish correlation and cyber-situation assessment tools for each category are also proposed.
North Korea’s Provocation and Escalation Calculus: Dealing with the Kim Jong-un Regime
2015-08-01
regime. “The Interview” In the early 2000s, Seth Rogan and Evan Goldberg conceived of a plot for a comic take on the assassination of a world...responsible for the education and training of the regime’s cyber warriors.55 The State Security Department’s (secret police) communications monitoring and...is young and lacks the expansive and deep education his father had before taking the reins of power. This has created a certain narrative in the
Cyber / Physical Security Vulnerability Assessment Integration
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Simpkins, Bret E.
Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness, before penetrating further into the defenses. The proper identification and assessment of the overlapping areas (and interaction between these areas) in the VA process is necessary to accurately assess the true risk.« less
Fridh, Maria; Lindström, Martin; Rosvall, Maria
2015-09-23
Victimization in cyberspace has emerged as a new public health issue among the young. The main purpose of this study was to analyze associations between cyber victimization defined as cyber harassment (CH) (a somewhat broader concept than cyberbullying) and subjective health complaints (SHC), to study whether these associations were modified by parental/friend support (measured as communication), and to explore the influence of traditional bullying victimization (TBV) on the association between CH and SHC. The study population consisted of 8544 students in 9th grade (around 15 years old) who participated in the 2012 Scania public health survey of children and adolescents. The survey was a cross-sectional total-population study conducted in school, with a response rate of 83 %. Main and interaction (stress-buffering) effects of social support on the relationship between CH and SCH were investigated by hierarchical multiple linear regression analyses, adjusted for potential confounders, including TBV. The past-year prevalence of CH (once or several times) was 14 % among boys and 20 % among girls. Having been cyber harassed once or several times during the past year was associated with higher levels of SHC, controlling for age, parental occupation, parental origin, daily smoking, intense alcohol consumption, and disability. Among both boys and girls, the associations were stronger for CH occurring several times than for CH occurring only once. Main effects of parental/friend support were seen for both boys and girls, while stress-buffering effects were indicated for boys only. Additional analysis further adjusting for TBV did not change the associations substantially, indicating that CH has an effect of its own on SHC. Intervention programs aimed at improving the quality of peer and family relationships among children and adolescents might reduce the incidence of both cyber harassment and traditional bullying and lower the prevalence of psychosomatic complaints.
QuEST for malware type-classification
NASA Astrophysics Data System (ADS)
Vaughan, Sandra L.; Mills, Robert F.; Grimaila, Michael R.; Peterson, Gilbert L.; Oxley, Mark E.; Dube, Thomas E.; Rogers, Steven K.
2015-05-01
Current cyber-related security and safety risks are unprecedented, due in no small part to information overload and skilled cyber-analyst shortages. Advances in decision support and Situation Awareness (SA) tools are required to support analysts in risk mitigation. Inspired by human intelligence, research in Artificial Intelligence (AI) and Computational Intelligence (CI) have provided successful engineering solutions in complex domains including cyber. Current AI approaches aggregate large volumes of data to infer the general from the particular, i.e. inductive reasoning (pattern-matching) and generally cannot infer answers not previously programmed. Whereas humans, rarely able to reason over large volumes of data, have successfully reached the top of the food chain by inferring situations from partial or even partially incorrect information, i.e. abductive reasoning (pattern-completion); generating a hypothetical explanation of observations. In order to achieve an engineering advantage in computational decision support and SA we leverage recent research in human consciousness, the role consciousness plays in decision making, modeling the units of subjective experience which generate consciousness, qualia. This paper introduces a novel computational implementation of a Cognitive Modeling Architecture (CMA) which incorporates concepts of consciousness. We apply our model to the malware type-classification task. The underlying methodology and theories are generalizable to many domains.
Toward Managing & Automating CyberCIEGE Scenario Definition File Creation
2004-03-01
Deitel , H & Deitel , P. (2002). Java: How to Program fourth Ed. New Jersey: Prentice Hall. [Fisher 2003] Fisher, C., Chiricosta, T. & Witherspoon, T...experience with the Java programming language. Precious time was required to learn how to implement some of the more complicated interface components...demonstrating the risks of the Internet and open networks [Irvine1 2003]. Policy is subtle, and there is no easy way to demonstrate how one small change
Necessary but not Sufficient - Closing the Gap Between Data Access and Use by a Broad User Community
NASA Astrophysics Data System (ADS)
Benedict, K. K.; Pennington, D. D.
2012-12-01
Earth science cyberinfrastructure developers like the team at the University of New Mexico Earth Data Analysis Center (EDAC) and University of Texas at El Paso Cyber-ShARE Center of Excellence work closely with researchers to document and transfer their research products (data and related materials) into systems that will allow for long-term access and reuse, both in the research domain within which they were generated but also for potential use outside that domain. While we have generally treated this problem as a technical one in which we develop robust systems that can reliably deliver interoperable data and visualization services to a wide variety of client applications and platforms we have not yet achieved the potential of ubiquitous use of our science data holdings outside of the community that developed them. A number of barriers must be overcome to realize the broader potential of these data: Discoverability - data must be discoverable through the tools and interfaces that are used by the broader community in addition to the specialized archives with which the source communities interact Understanding - data must be documented in ways that allow other potential users to understand the content, context, and potential use of data products Usability - data must be available in a variety of formats and packages that are easily integrated into the systems and processes that are already in use by the prospective end users Transferability - the rights and obligations of potential users must be clearly defined for data products (i.e. licensing terms) Planning - data management must be planned for from the beginning so that all of the above can be accomplished This paper presents some of the activities that EDAC and Cyber-ShARE have undertaken (in partnership with collaborators at KU, DataONE, New Mexico Department of Health, Pacific Northwest National Laboratory, and the New Mexico EPSCoR Program) in working to overcome these barriers to increased use of scientific data products in education and across research domains. EDAC focuses primarily on discoverability, usability, and transformability using current best practices while Cyber-ShARE's efforts are directed primarily toward emerging Semantic Web approaches for planning, discoverability, and understanding.
Software analysis in the semantic web
NASA Astrophysics Data System (ADS)
Taylor, Joshua; Hall, Robert T.
2013-05-01
Many approaches in software analysis, particularly dynamic malware analyis, benefit greatly from the use of linked data and other Semantic Web technology. In this paper, we describe AIS, Inc.'s Semantic Extractor (SemEx) component from the Malware Analysis and Attribution through Genetic Information (MAAGI) effort, funded under DARPA's Cyber Genome program. The SemEx generates OWL-based semantic models of high and low level behaviors in malware samples from system call traces generated by AIS's introspective hypervisor, IntroVirtTM. Within MAAGI, these semantic models were used by modules that cluster malware samples by functionality, and construct "genealogical" malware lineages. Herein, we describe the design, implementation, and use of the SemEx, as well as the C2DB, an OWL ontology used for representing software behavior and cyber-environments.
2014-02-28
distribution is unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This anthology of cyber analogies will resonate with readers whose duties call for them...THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT This anthology of cyber analogies will resonate with readers...fresh insights. THE CASE FOR ANALOGIES All of us on the cyber analogies team hope that this anthol- ogy will resonate with readers whose duties call
An Examination of the Relationship between Self-Control and Cyber Victimization in Adolescents
ERIC Educational Resources Information Center
Peker, Adem
2017-01-01
Purpose: Cyber bullying is a new phenomenon which adversely affects young people. Exposure to the cyber bullying can negatively affect the mental health. The aim of this study is to examine the predictive effect of self-control on cyber victimization in adolescents. Research Methods: The study group was composed of 353 Turkish secondary school…
Defining Cyber and Focusing the Military’s Role in Cyberspace
2013-03-01
Service (USSS) and the U.S. Immigration and Customs Enforcement (ICE) to investigate cyber criminals .7 DoD’s role is not only to defend its own...identify trends, tactics, techniques, and procedures that cyber criminals use so that if the same type of events meet the definition of cyber war, DoD
Interview with a Cyber-Student: A Look behind Online Cheating
ERIC Educational Resources Information Center
Davis, Julia
2014-01-01
This case study offers insights into the motivation and experiences of a cyber-student, an individual who completes all or portions of an online class for the registered student. The cyber-student shares information on the inner-workings of online companies specializing in matching cyber-students with potential clients. A portrait of both a…
Middle School Students' Perceptions of and Responses to Cyber Bullying
ERIC Educational Resources Information Center
Holfeld, Brett; Grabe, Mark
2012-01-01
This study explored the nature and extent of middle school students' (n = 665) experiences with cyber bullying. Approximately one in five students reported being cyber bullied in the past year, with 55% of those students being repeatedly victimized within the past 30 days. Female students were more likely to be involved in cyber bullying (victim,…
ERIC Educational Resources Information Center
Wright, Michelle F.
2015-01-01
The present study examined multiple sources of strain, particular cyber victimization, and perceived stress from parents, peers, and academics, in relation to late adolescents' (ages 16-18; N = 423) cyber aggression, anxiety, and depression, each assessed 1 year later (Time 2). Three-way interactions revealed that the relationship between Time 1…
Psychological Impact of Cyber-Bullying: Implications for School Counsellors
ERIC Educational Resources Information Center
Nordahl, Jennifer; Beran, Tanya; Dittrick, Crystal J.
2013-01-01
Cyber-bullying is a significant problem for children today. This study provides evidence of the psychological impact of cyber-bullying among victimized children ages 10 to 17 years (M = 12.48, SD = 1.79) from 23 urban schools in a western province of Canada (N = 239). Students who were cyber-bullied reported high levels of anxious,…
ERIC Educational Resources Information Center
Beebe, Jennifer Elizabeth
2010-01-01
The current study investigated the prevalence and frequency of cyber bullying victimization and examined the impact of cyber bullying on academic, social, and emotional college adjustment. Participants were recruited from two universities in the United States. Participants completed the Revised Cyber Bullying Survey (Kowalski & Limber, 2007)…
Knowledge Is Something We Do: Knowing and Learning in Globally Networked Communities.
ERIC Educational Resources Information Center
Farell, Lesley; Holkner, Bernard
Workspaces are sites of contention over what is knowledge and who can say so; work-related education has never been a neutral arbiter. In a context in which workspaces routinely bring together physical place and cyber place in communication networks, traditional struggles over knowledge and knowing are affected by communications technologies (CT)…
Examining Online College Cyber Cheating Methods and Prevention Measures
ERIC Educational Resources Information Center
Moten, James, Jr.; Fitterer, Alex; Brazier, Elise; Leonard, Jonathan; Brown, Avis
2013-01-01
Academic dishonesty in the online cheating environment of distance education learning has gained traction in the past decade. By a few simple keystrokes, students' can find a wide array of online services for hire to write research papers, complete homework assignments, or enroll on behalf of the student on record to take the entire online…
ERIC Educational Resources Information Center
Johnston, Pattie; Tankersley, Merrie; Joenson, Trevor; Hupp, Mikey; Buckley, Jennifer; Redmond-McGowan, Margaret; Zanzinger, Allison; Poirier, Alex; Walsh, Abigail
2014-01-01
Cyber-bullying has become increasingly problematic in academic settings including universities and colleges. The bullying literature has been expanding investigation of the bully behaviors and has identified four bully types to include pure offender, pure victim, offender and victim, neither-offender-nor-victim. The majority of research has…
The Case for Inclusion of Competitive Teams in Security Education
ERIC Educational Resources Information Center
Serapiglia, Anthony
2016-01-01
Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…
"Not Necessarily a Bad Thing ...": A Study of Online Plagiarism amongst Undergraduate Students
ERIC Educational Resources Information Center
Selwyn, Neil
2008-01-01
Whilst the copying, falsification and plagiarism of essays and assignments has long been a prevalent form of academic misconduct amongst undergraduate students, the increasing use of the internet in higher education has raised concern over enhanced levels of online plagiarism and new types of "cyber-cheating". Based on a self-report…
Enterprise Risk Management in the Great City Schools, Spring 2016
ERIC Educational Resources Information Center
Clark, Scott B.; DeCato, Kristen Devan; George, Dave; Henderson, Dana; Henry, Aston A., Jr.; Hoch, Christopher
2016-01-01
Public schools have a mandate to educate children in a way that is safe, effective, and cost efficient. The risks involved in achieving that mandate have become increasingly complex, and the need to manage those risks has never been greater. The emergence of widespread, interconnected risks, such as cyber risks and data management, infrastructure…
ERIC Educational Resources Information Center
Borja, Rhea R.
2006-01-01
While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…
Hemphill, Sheryl A; Kotevski, Aneta; Tollit, Michelle; Smith, Rachel; Herrenkohl, Todd I; Toumbourou, John W; Catalano, Richard F
2012-07-01
Cyberbullying perpetration (using communication technology to engage in bullying) is a recent phenomenon that has generated much concern. There are few prospective longitudinal studies of cyberbullying. The current article examines the individual, peer, family, and school risk factors for both cyber and traditional bullying (the latter is bullying that does not use technology) in adolescents. This article draws on a rich data set from the International Youth Development Study, a longitudinal study of students in Victoria, Australia and Washington State, United States, which began in 2002. In this article, data from almost 700 Victorian students recruited in grade 5 are analyzed to examine grade 7 (aged 12-13 years) predictors of traditional and cyberbullying perpetration in grade 9 (aged 14-15 years). Fifteen per cent of students engaged in cyberbullying, 21% in traditional bullying, and 7% in both. There are similarities and important differences in the predictors of cyber and traditional bullying. In the fully adjusted model, only prior engagement in relational aggression (a covert form of bullying, such as spreading rumors about another student) predicted cyberbullying perpetration. For traditional bullying, previous relational aggression was also predictive, as was having been a victim and perpetrator of traditional bullying, family conflict, and academic failure. The use of evidence-based bullying prevention programs is supported to reduce experiences of all forms of bullying perpetration (cyber, traditional, and relational aggression). In addition, for traditional bullying perpetration, addressing family conflict and student academic support are also important. Copyright © 2012 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
Smith, Kevin; Cénat, Jude Mary; Lapierre, Andréanne; Dion, Jacinthe; Hébert, Martine; Côté, Karine
2018-07-01
Adolescents in a dating relationship can interact anytime using information and communication technologies. Yet, despite associated potential benefits, this availability of means to reach out to their partner may also exacerbate possible conflictual exchanges, including dating violence through technology. This study aimed to document the prevalence of cyber dating violence (CDV) victimization and perpetration among teenagers. It also explored self-esteem and psychological distress in participants having been perpetrators, victims, or perpetrator-victims, compared with those not having experienced CDV. The sample comprised 190 teenagers from a small urban area who completed the K10 psychological distress scale, the Self-Description Questionnaire, which measures self-esteem, and the Cyber Dating Abuse Questionnaire, which measures the prevalence of CDV victimization and perpetration. Our results suggest no gender difference in the prevalence of CDV victimization (35.8%), perpetration (33.0%), or the high co-occurrence rate of victimization and perpetration (27.2%) in the last 12 months. When age and gender were controlled for, cyber dating violence was found to be associated with low self-esteem and psychological distress in teenagers. Cyberperpetration was also associated with higher self-esteem. The cross-sectional design precludes any conclusion about the sequencing of the variables. Reliance on a convenience sample also represents a limitation of the study. CDV is associated with low self-esteem and psychological distress in teenagers. Dating violence prevention programs should include issues related to CDV, considering its high prevalence, conceptual proximity to psychological violence, and relationship with psychological distress and low self esteem. Copyright © 2018 Elsevier B.V. All rights reserved.
Betts, Lucy R; Spenser, Karin A; Gardner, Sarah E
2017-01-01
Young people are spending increasing amounts of time using digital technology and, as such, are at great risk of being involved in cyber bullying as a victim, bully, or bully/victim. Despite cyber bullying typically occurring outside the school environment, the impact of being involved in cyber bullying is likely to spill over to school. Fully 285 11- to 15-year-olds (125 male and 160 female, M age = 12.19 years, SD = 1.03) completed measures of cyber bullying involvement, self-esteem, trust, perceived peer acceptance, and perceptions of the value of learning and the importance of school. For young women, involvement in cyber bullying as a victim, bully, or bully/victim negatively predicted perceptions of learning and school, and perceived peer acceptance mediated this relationship. The results indicated that involvement in cyber bullying negatively predicted perceived peer acceptance which, in turn, positively predicted perceptions of learning and school. For young men, fulfilling the bully/victim role negatively predicted perceptions of learning and school. Consequently, for young women in particular, involvement in cyber bullying spills over to impact perceptions of learning. The findings of the current study highlight how stressors external to the school environment can adversely impact young women's perceptions of school and also have implications for the development of interventions designed to ameliorate the effects of cyber bullying.
ERIC Educational Resources Information Center
Holfeld, Brett; Leadbeater, Bonnie J.
2015-01-01
As access to technology is increasing in children and adolescents, there are growing concerns over the dangers of cyber bullying. It remains unclear what cyber bullying looks like among young Canadian children and how common these experiences are. In this study, we examine the psychometric properties of a measure of cyber bullying behaviors and…
Cyber Operations: The New Balance
2009-01-01
compelling evidence to suggest that enlight - enment, rather than retrenchment, is the path for cyber New Balance. The economic calamity of the Great...www.guardian.co.uk/ technology /2008/ oct/02/interviews.internet>. 16 Langevin, 11. 17 James Lewis, “Cyber Security Recommen- dations for the Next...Administration,” testimony before House Subcommittee on Emerging Threats, Cyber Security, and Science and Technology , Washington, DC, September 16
Pages - U.S. Fleet Cyber Command
Links Expand Links : U.S. Fleet Cyber Command Help (new window) Site Help Page Content Website 2nd Banner.jpg Since its establishment on Jan. 29, 2010, U.S. Fleet Cyber Command (FCC)/U.S. TENTH Fleet (C10F civilians organized into 26 active commands, 40 Cyber Mission Force units, and 27 reserve commands around
Cyber Insurance - Managing Cyber Risk
2015-04-01
license under the clause at DFARS 252.227-7013 (a)(16) [Jun 2013]. Cyber Insurance – Managing Cyber Risk Data breaches involving...significant personal information losses and financial impact are becoming increasingly common. Whether the data breach has financial implications for...hundreds of millions of dollars depending on the type and size of the breach. Most states have some type of data breach law requiring notification
Co-Simulation Platform For Characterizing Cyber Attacks in Cyber Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sadi, Mohammad A. H.; Ali, Mohammad Hassan; Dasgupta, Dipankar
Smart grid is a complex cyber physical system containing a numerous and variety of sources, devices, controllers and loads. Communication/Information infrastructure is the backbone of the smart grid system where different grid components are connected with each other through this structure. Therefore, the drawbacks of the information technology related issues are also becoming a part of the smart grid. Further, smart grid is also vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and OPNET based co-simulated test bed to carry out a cyber-intrusion inmore » a cyber-network for modern power systems and smart grid. The effect of the cyber intrusion on the physical power system is also presented. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack in the cyber network. Different disturbance situations in the proposed test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less
Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.
Sargent, Kelli S; Krauss, Alison; Jouriles, Ernest N; McDonald, Renee
2016-09-01
Both cyber victimization and psychological intimate partner violence (IPV) have been associated with negative mental health outcomes among adolescents and young adults. The present study examined relations among cyber victimization, psychological IPV, and mental health outcomes (depressive symptoms, antisocial behavior) among first-year college students. Consistent with polyvictimization theory, we hypothesized that cyber victimization and psychological IPV would be related to each other. We also hypothesized that each would uniquely contribute to depressive symptoms and antisocial behavior, after accounting for the other. Participants (N = 342, M age = 18.33 years; 50% male) completed questionnaires during a single lab visit. Results indicated that cyber victimization and psychological IPV were related to each other, and both contributed uniquely to depressive symptoms, but only cyber victimization contributed uniquely to antisocial behavior. Exploratory analyses indicated that experiencing both cyber victimization and psychological IPV was necessary for increased depressive symptoms and antisocial behavior. This study is the first to establish a unique relation between cyber victimization and mental health problems, after accounting for psychological IPV. The findings also suggest a need to consider multiple forms of victimization when considering relations between specific types of victimization and mental health problems.
What good cyber resilience looks like.
Hult, Fredrik; Sivanesan, Giri
In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.
2008-08-01
This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Jim Alves-Foss
2011-08-01
Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL providesmore » a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.« less
Hult, Fredrik; Sivanesan, Giri
In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.
Fousiani, Kyriaki; Dimitropoulou, Panagiota; Michaelides, Michalis P; Van Petegem, Stijn
Due to the progress in information technology, cyber-bullying is becoming one of the most common forms of interpersonal harm, especially among teenagers. The present study ( N = 548) aimed to investigate the relation between perceived parenting style (in terms of autonomy support and psychological control) and cyber-bullying in adolescence. Thereby, the study tested for the intervening role of adolescent need satisfaction (i.e., autonomy and relatedness), empathic concern towards others, and adolescents' recognition of full humanness to cyber-bullying offenders and victims. Findings revealed both a direct and an indirect relation between parenting and cyber-bullying. More specifically, parental psychological control directly predicted cyber-bullying, whereas parental autonomy support related to less cyber-bullying indirectly, as it was associated with the satisfaction of adolescents' need for autonomy, which predicted more empathic concern towards others, which in turn differentially related to recognition of humanness to victims and bullies. The discussion focuses on the implications of the current findings.
ATLAS, an integrated structural analysis and design system. Volume 2: System design document
NASA Technical Reports Server (NTRS)
Erickson, W. J. (Editor)
1979-01-01
ATLAS is a structural analysis and design system, operational on the Control Data Corporation 6600/CYBER computers. The overall system design, the design of the individual program modules, and the routines in the ATLAS system library are described. The overall design is discussed in terms of system architecture, executive function, data base structure, user program interfaces and operational procedures. The program module sections include detailed code description, common block usage and random access file usage. The description of the ATLAS program library includes all information needed to use these general purpose routines.
Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse
DOE Office of Scientific and Technical Information (OSTI.GOV)
Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R
2012-01-01
The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describemore » the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.« less
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2013-01-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2014-07-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.
ANOPP programmer's reference manual for the executive System. [aircraft noise prediction program
NASA Technical Reports Server (NTRS)
Gillian, R. E.; Brown, C. G.; Bartlett, R. W.; Baucom, P. H.
1977-01-01
Documentation for the Aircraft Noise Prediction Program as of release level 01/00/00 is presented in a manual designed for programmers having a need for understanding the internal design and logical concepts of the executive system software. Emphasis is placed on providing sufficient information to modify the system for enhancements or error correction. The ANOPP executive system includes software related to operating system interface, executive control, and data base management for the Aircraft Noise Prediction Program. It is written in Fortran IV for use on CDC Cyber series of computers.
Yang, Su-Jin; Stewart, Robert; Lee, Ju-Yeon; Kim, Jae-Min; Kim, Sung-Wan; Shin, Il-Seon; Yoon, Jin-Sang
2014-01-01
To measure the prevalence of and factors associated with online inappropriate sexual exposure, cyber-bullying victimisation, and computer-using time in early adolescence. A two-year, prospective school survey was performed with 1,173 children aged 13 at baseline. Data collected included demographic factors, bullying experience, depression, anxiety, coping strategies, self-esteem, psychopathology, attention-deficit hyperactivity disorder symptoms, and school performance. These factors were investigated in relation to problematic Internet experiences and computer-using time at age 15. The prevalence of online inappropriate sexual exposure, cyber-bullying victimisation, academic-purpose computer overuse, and game-purpose computer overuse was 31.6%, 19.2%, 8.5%, and 21.8%, respectively, at age 15. Having older siblings, more weekly pocket money, depressive symptoms, anxiety symptoms, and passive coping strategy were associated with reported online sexual harassment. Male gender, depressive symptoms, and anxiety symptoms were associated with reported cyber-bullying victimisation. Female gender was associated with academic-purpose computer overuse, while male gender, lower academic level, increased height, and having older siblings were associated with game-purpose computer-overuse. Different environmental and psychological factors predicted different aspects of problematic Internet experiences and computer-using time. This knowledge is important for framing public health interventions to educate adolescents about, and prevent, internet-derived problems.
Foshee, Vangie A; Benefield, Thad; Dixon, Kimberly S; Chang, Ling-Yin; Senkomago, Virginia; Ennett, Susan T; Moracco, Kathryn E; Michael Bowling, J
2015-05-01
Adolescents exposed to domestic violence are at high risk for dating abuse. This randomized controlled trial evaluated a dating abuse prevention program designed specifically for this risk group. Moms and Teens for Safe Dates consisted of six mailed booklets of dating abuse prevention information and interactive activities. Mothers who had been victims of domestic violence but no longer lived with the abuser delivered the program to their adolescents who had been exposed to the abuse. Mother and adolescent pairs (N = 409) were recruited through community advertising; the adolescents ranged from 12 to 16 years old and 64 % were female. Mothers and adolescents completed baseline and 6-month follow-up telephone interviews. Booklet completion in the treatment group ranged from 80 % for the first to 62 % for the last booklet. The analyses first tested whether program effects on dating abuse varied by four a priori identified moderators (mother's psychological health, the amount of adolescent exposure to domestic violence, and adolescent sex and race/ethnicity). Main effects of the program were examined when there were no differential program effects. Program effects on psychological and physical victimization and psychological and cyber perpetration were moderated by the amount of adolescent exposure to domestic violence; there were significant favorable program effects for adolescents with higher, but not lower levels of exposure to domestic violence. There were no moderated or main effects on sexual violence victimization and perpetration or cyber victimization. The findings suggest that a dating abuse prevention program designed for adolescents exposed to domestic violence can have important positive effects.
2005-12-01
courses in which students learn programming techniques using gaming software models . As part of the effort, teaching modules and entire courses will......assets. The United States Navy recently implemented new policies to restrict service personnel’s use of commercial, web- based email applications in an
Captivate MenuBuilder: Creating an Online Tutorial for Teaching Software
ERIC Educational Resources Information Center
Yelinek, Kathryn; Tarnowski, Lynn; Hannon, Patricia; Oliver, Susan
2008-01-01
In this article, the authors, students in an instructional technology graduate course, describe a process to create an online tutorial for teaching software. They created the tutorial for a cyber school's use. Five tutorial modules were linked together through one menu screen using the MenuBuilder feature in the Adobe Captivate program. The…
Vectorized multigrid Poisson solver for the CDC CYBER 205
NASA Technical Reports Server (NTRS)
Barkai, D.; Brandt, M. A.
1984-01-01
The full multigrid (FMG) method is applied to the two dimensional Poisson equation with Dirichlet boundary conditions. This has been chosen as a relatively simple test case for examining the efficiency of fully vectorizing of the multigrid method. Data structure and programming considerations and techniques are discussed, accompanied by performance details.
The "ICP OnLine": "Jeux sans frontieres" on the CyberCampus.
ERIC Educational Resources Information Center
Hutchison, Chris
1995-01-01
Focuses on an ICP (Inter-University Cooperation Programme) OnLine in the area of Informatics/Artificial Intelligence. Notes that ICP is accessed through the World Wide Web and was launched in the Summer of 1994 to provide "virtual mobility." Discusses the program's objectives, student experiences, and the risks and opportunities afforded by…
QMU as an approach to strengthening the predictive capabilities of complex models.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gray, Genetha Anne.; Boggs, Paul T.; Grace, Matthew D.
2010-09-01
Complex systems are made up of multiple interdependent parts, and the behavior of the entire system cannot always be directly inferred from the behavior of the individual parts. They are nonlinear and system responses are not necessarily additive. Examples of complex systems include energy, cyber and telecommunication infrastructures, human and animal social structures, and biological structures such as cells. To meet the goals of infrastructure development, maintenance, and protection for cyber-related complex systems, novel modeling and simulation technology is needed. Sandia has shown success using M&S in the nuclear weapons (NW) program. However, complex systems represent a significant challenge andmore » relative departure from the classical M&S exercises, and many of the scientific and mathematical M&S processes must be re-envisioned. Specifically, in the NW program, requirements and acceptable margins for performance, resilience, and security are well-defined and given quantitatively from the start. The Quantification of Margins and Uncertainties (QMU) process helps to assess whether or not these safety, reliability and performance requirements have been met after a system has been developed. In this sense, QMU is used as a sort of check that requirements have been met once the development process is completed. In contrast, performance requirements and margins may not have been defined a priori for many complex systems, (i.e. the Internet, electrical distribution grids, etc.), particularly not in quantitative terms. This project addresses this fundamental difference by investigating the use of QMU at the start of the design process for complex systems. Three major tasks were completed. First, the characteristics of the cyber infrastructure problem were collected and considered in the context of QMU-based tools. Second, UQ methodologies for the quantification of model discrepancies were considered in the context of statistical models of cyber activity. Third, Bayesian methods for optimal testing in the QMU framework were developed. This completion of this project represent an increased understanding of how to apply and use the QMU process as a means for improving model predictions of the behavior of complex systems. 4« less
2016-10-01
movement to focus on cybersecurity in the private sector. The company has shared intelligence and resources on cyber threats, even going as far as...personnel and 1NX intelligence personnel as well as 14N intelligence officers and the 17D/S cyber operations officers who lead and manage Air Force...threat of cyber incidents, the burgeon- ing cost of doing business due to cybersecurity infiltrations, and corporate America’s / senior executives
Beyond Mission Command: Maneuver Warfare for Cyber Command and Control
2015-05-18
operation in an A2AD environment. 15. SUBJECT TERMS command and control; maneuver warfare; cyberspace; cyberspace operations; cyber warfare , mission...Some Principles of Cyber Warfare (NWC 2160) (U.S. Naval War College, Joint Military Operations Department, Newport, RI: U.S. Naval War College...research/ innovationleadership.pdf. Crowell, Richard M. Some Principles of Cyber Warfare (NWC 2160). U.S. Naval War College, Joint Military Operations
Cognitive and Non-cognitive Predictors of Career Intentions within Cyber Jobs
2016-04-01
in Anaheim, California, April 14-16, 2016. 15. SUBJECT TERMS Cyber, career intentions, retention , cognitive ability, job fit, normative commitment...Predictors of Cyber Job Career Intentions 1 The views, opinions, and findings contained in this article are solely those of the authors and should...other documentation. Cognitive and Non-cognitive Predictors of Career Intentions within Cyber Jobs Kristophor Canali U. S. Army
Special Operations And Cyber Warfare
2016-12-01
with the high level of Soldier competency in the 95th for CA Soldiers to retrain and fulfill the cyber requirement. With the reorganization of the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SPECIAL OPERATIONS AND CYBER...OPERATIONS AND CYBER WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) Jason C. Tebedo 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School
Code of Federal Regulations, 2011 CFR
2011-07-01
... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Submission of reports to the âCyber... “Cyber Tipline” at the National Center for Missing and Exploited Children. (a) When a provider of... circumstances to the “Cyber Tipline” at the National Center for Missing and Exploited Children Web site (http...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Submission of reports to the âCyber... “Cyber Tipline” at the National Center for Missing and Exploited Children. (a) When a provider of... circumstances to the “Cyber Tipline” at the National Center for Missing and Exploited Children Web site (http...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Submission of reports to the âCyber... “Cyber Tipline” at the National Center for Missing and Exploited Children. (a) When a provider of... circumstances to the “Cyber Tipline” at the National Center for Missing and Exploited Children Web site (http...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Submission of reports to the âCyber... “Cyber Tipline” at the National Center for Missing and Exploited Children. (a) When a provider of... circumstances to the “Cyber Tipline” at the National Center for Missing and Exploited Children Web site (http...
A Case Study on the Development and Implementation of Cyber Capabilities in the United States
ERIC Educational Resources Information Center
Walton, Marquetta
2016-01-01
The effectiveness of U.S. cyber-capabilities can have a serious effect on the cyber-security stance of the US and significantly impact how well U.S. critical infrastructures are protected. The problem is that the state of the U.S. cyber-security could be negatively impacted by the dependency that the US displays in its use of defensive…
Code of Federal Regulations, 2014 CFR
2014-07-01
... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Submission of reports to the âCyber... “Cyber Tipline” at the National Center for Missing and Exploited Children. (a) When a provider of... circumstances to the “Cyber Tipline” at the National Center for Missing and Exploited Children Web site (http...
Optimizing CyberShake Seismic Hazard Workflows for Large HPC Resources
NASA Astrophysics Data System (ADS)
Callaghan, S.; Maechling, P. J.; Juve, G.; Vahi, K.; Deelman, E.; Jordan, T. H.
2014-12-01
The CyberShake computational platform is a well-integrated collection of scientific software and middleware that calculates 3D simulation-based probabilistic seismic hazard curves and hazard maps for the Los Angeles region. Currently each CyberShake model comprises about 235 million synthetic seismograms from about 415,000 rupture variations computed at 286 sites. CyberShake integrates large-scale parallel and high-throughput serial seismological research codes into a processing framework in which early stages produce files used as inputs by later stages. Scientific workflow tools are used to manage the jobs, data, and metadata. The Southern California Earthquake Center (SCEC) developed the CyberShake platform using USC High Performance Computing and Communications systems and open-science NSF resources.CyberShake calculations were migrated to the NSF Track 1 system NCSA Blue Waters when it became operational in 2013, via an interdisciplinary team approach including domain scientists, computer scientists, and middleware developers. Due to the excellent performance of Blue Waters and CyberShake software optimizations, we reduced the makespan (a measure of wallclock time-to-solution) of a CyberShake study from 1467 to 342 hours. We will describe the technical enhancements behind this improvement, including judicious introduction of new GPU software, improved scientific software components, increased workflow-based automation, and Blue Waters-specific workflow optimizations.Our CyberShake performance improvements highlight the benefits of scientific workflow tools. The CyberShake workflow software stack includes the Pegasus Workflow Management System (Pegasus-WMS, which includes Condor DAGMan), HTCondor, and Globus GRAM, with Pegasus-mpi-cluster managing the high-throughput tasks on the HPC resources. The workflow tools handle data management, automatically transferring about 13 TB back to SCEC storage.We will present performance metrics from the most recent CyberShake study, executed on Blue Waters. We will compare the performance of CPU and GPU versions of our large-scale parallel wave propagation code, AWP-ODC-SGT. Finally, we will discuss how these enhancements have enabled SCEC to move forward with plans to increase the CyberShake simulation frequency to 1.0 Hz.
A Recommender System in the Cyber Defense Domain
2014-03-27
monitoring software is a java based program sending updates to the database on the sensor machine. The host monitoring program gathers information about...3.2.2 Database. A MySQL database located on the sensor machine acts as the storage for the sensors on the network. Snort, Nmap, vulnerability scores, and...machine with the IDS and the recommender is labeled “sensor”. The recommender system code is written in java and compiled using java version 1.6.024
2007-05-01
partners will be encouraged to use the assessment methodologies referenced above, or ISO 27001 and ISO 17799, which are intended to be used together...the Information Systems Audit and Control Association (ISACA), the International Organization for Standardization ( ISO ), and a number of other...programs are aligned with NCSD’s goals for the IT sector and follow best practices developed by NIST and the ISO . The cyber protective programs
Alhaboby, Zhraa A; Barnes, James; Evans, Hala; Short, Emma
2017-01-01
The victimization of individuals with chronic conditions or disabilities is prevalent with severe impact at psychological and physiological levels. With the increasing use of technology these experiences were further reshaped. This systematic review aimed at scoping the experiences of cyber-victimization of people living with chronic conditions or disabilities and examine the documented impact on them. Following a four-stage search strategy in several databases including MEDLINE, Embase, PsychINFO, CINAHL, Cochrane and snowballing of references, a total of 2,922 studies were scanned and 10 studies were eventually included. Quality assessment was done in two phases using tools specific to observational studies and cyber-victimization research. A narrative synthesis of reported results covered a total of 3,070 people. Sample size ranged between 42 and 823 participants, and the age range was 6-71 years with a majority of White ethnic backgrounds. Most studies (n=9) were cross sectional. The prevalence range of cyber-victimization was 2%-41.7% based on variable definitions, duration and methods. Targeted conditions included physical impairments, intellectual disabilities and specific chronic diseases. The most common documented impact was psychological/psychiatric, mainly depression followed by anxiety and distress. Somatic health complaints and self-harm were also reported. We concluded that people with chronic conditions and disabilities were consistently at higher risk of victimization with devastating health complications. Research gaps were identified such as the need to address more conditions and acknowledge differences between heterogeneous health conditions. Other recommendations include allowing flexibility and accountability to patients/victims in research design, education on victimization and health consequences, and improving primary care.
Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era
NASA Astrophysics Data System (ADS)
Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr
2018-05-01
The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.
Modeling Cyber Conflicts Using an Extended Petri Net Formalism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zakrzewska, Anita N; Ferragut, Erik M
2011-01-01
When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way thatmore » is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.« less
Department of Homeland Security
... Release Joint Technical Alerts on Malicious North Korean Cyber Activity Today, DHS and FBI released a pair ... María Provide Feedback to DHS Protect Myself from Cyber Attacks Report Cyber Incidents Prepare My Family for ...
Longitudinal Associations in Youth Involvement as Victimized, Bullying, or Witnessing Cyberbullying.
Holfeld, Brett; Mishna, Faye
2018-04-01
Although cyberbullying has been linked to cyber victimization, it is unknown whether witnessing cyberbullying impacts and is impacted by experiences of cyberbullying and victimization. In the current study, we examine the frequency of youth involved as victimized, bullying, and witnessing cyberbullying and how these experiences are associated across three academic years. Participants comprised 670 Canadian students who began the longitudinal study in grades 4, 7, or 10 at Time 1 (T1). Cyber witnessing represented the largest role of youth involvement in cyberbullying. Cyber witnessing was positively associated with both cyberbullying and victimization. Cyber victimization at T1 was positively associated with cyber witnessing at T2, which was positively related to both cyberbullying and victimization at T3. Findings highlight the significance of addressing the role of cyber witnesses in cyberbullying prevention and intervention efforts.
Cyber-Physical System Security of Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dagle, Jeffery E.
2012-01-31
Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigationmore » strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.« less
Remodeling Air Force Cyber Command and Control
2017-10-10
AIR FORCE CYBERWORX REPORT: REMODELING AIR FORCE CYBER COMMAND & CONTROL COURSE DESIGN PROJECT CONDUCTED 5 Jan – 5 May 17 Produced...For the Air Force Cyber Command and Control (C2) Design Project, CyberWorx brought together 25 cadets from the United States Air Force Academy...warfighting based upon the findings of the design teams. Participants The design course was attended by a diverse group of civilians from industry
The U.S. Needs International Cyber Treaties
2010-03-01
formed to deal with issues surrounding cyber warfare . However, no major treaties between nations exist regarding this form of combat. Examining...the history of cyber warfare , the inadequate international response, the obstacles to international agreement, and poor U.S. readiness demonstrates...the current need for the U.S. to lead the effort to codify treaties. First, a brief history of cyber warfare helps to shed light on the international
2014-05-22
CYBERSPACE AS A COMPLEX ADAPTIVE SYSTEM AND THE POLICY AND OPERTIONAL IMPLICATIONS FOR CYBER WARFARE A Monograph by Major Albert O. Olagbemiro...serves the US, especially in regards to the protect ion o f the 1S. SUBJECT TERMS omplex Adaptive System, Cyberspace, lnfosphere, Cyber Warfare ber...System and the Policy and Operational Implications for Cyber Warfare Approved by: __________________________________, Monograph Director Jeffrey
Cyber Capabilities for Global Strike in 2035
2012-02-15
operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force that...constantly keeping cyber warfare capabilities in pace with the technologies of the environment.This paper reaches these conclusions by first providing a
Cyber Security: A Road Map for Turkey
2012-03-19
Cyber warfare is a form of information warfare, sometimes seen as analogous to conventional warfare, among a range of potential actors, including...nation states, non-state groups, and a complex hybrid of conflict involving both state and non-state actors. Cyber warfare is a tool of national power...An entire nation s ability to operate and fight in the information age is vital toward survival. Nowadays, cyber warfare is mostly focused on
Cyber Capabilities for Global Strike in 2035
2012-02-15
operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force...constantly keeping cyber warfare capabilities in pace with the technologies of the environment. This paper reaches these conclusions by first providing a
2012-12-01
and activity coordination (for example, SOC management ). 10. In Reference D the information sharing framework represents a hub & node model in... management , vulnerabilities, critical assets, threats, impacts on operations etc. UNCLASSIFIED UNCLASSIFIED 6 PART 3 - CYBER SITUATIONAL AWARENESS...limit the effect of cyber incidents. 23. Tasks of the SOC include: • System maintenance and management including applying the directed security
FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER PHYSICAL SYSTEMS
2018-02-23
FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER- PHYSICAL SYSTEMS UNIVERSITY OF TEXAS AT ARLINGTON FEBRUARY 2018 FINAL...COVERED (From - To) APR 2015 – APR 2017 4. TITLE AND SUBTITLE FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER- PHYSICAL ...dated 16 Jan 09 13. SUPPLEMENTARY NOTES 14. ABSTRACT This project studied emergent behavior in distributed cyber- physical systems (DCPS). Emergent
Defending the New Domain: Cyberspace
2011-03-21
and time consuming, the FBI has proven technology, techniques, and procedures to hunt down and capture cyber criminals , despite the anonymity of the...help stop cyber crime and make it harder for cyber criminals to commit crime on the internet. MILITARY The U.S. military relies on DoD...one country and attacking another. Cyber criminals are using servers and proxies in one country to execute their criminal activities in another