Sample records for cyber-exercise laboratory rcel

  1. Enhanced Training for Cyber Situational Awareness in Red versus Blue Team Exercises

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carbajal, Armida J.; Stevens-Adams, Susan Marie; Silva, Austin Ray

    This report summarizes research conducted through the Sandia National Laboratories Enhanced Training for Cyber Situational Awareness in Red Versus Blue Team Exercises Laboratory Directed Research and Development project. The objective of this project was to advance scientific understanding concerning how to best structure training for cyber defenders. Two modes of training were considered. The baseline training condition (Tool-Based training) was based on current practices where classroom instruction focuses on the functions of a software tool with various exercises in which students apply those functions. In the second training condition (Narrative-Based training), classroom instruction addressed software functions, but in the contextmore » of adversary tactics and techniques. It was hypothesized that students receiving narrative-based training would gain a deeper conceptual understanding of the software tools and this would be reflected in better performance within a red versus blue team exercise.« less

  2. U.S. Command Relationships in the Conduct of Cyber Warfare: Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority

    DTIC Science & Technology

    2010-05-03

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment...U.S. Command Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority...Relationships in the Conduct of Cyber Warfare : Establishment, Exercise, and Institutionalization of Cyber Coordinating Authority The character of

  3. Designing Cyber Exercises

    DTIC Science & Technology

    2014-10-01

    maneuver • Traditional “ Brick and Mortar ” training models – Difficult to train regularly due to logistics/budget restrictions – Doesn’t scale...complexity, scenario, location , and resources available • Scalable 4-cell planning construct – Exercise Control (White Cell) – Threat Emulation (Red...business impact) • Collaborative effort  Trusted Agents ( SMEs ) – Threats – Cyber defense capabilities – Policies and procedures – Project and/or

  4. DRDC Support to Exercise Cyber Storm III

    DTIC Science & Technology

    2011-10-01

    d’intervention fédéraux portant sur les incidents cybernétiques sont encore relativement peu élaborés et insuffisamment développés et un examen des plans examinés...9 2.7 CSIII Ethics Protocol...30 Annex C .. Exercise Cyber Storm III Ethics

  5. R-EACTR: A Framework for Designing Realistic Cyber Warfare Exercises

    DTIC Science & Technology

    2017-09-11

    2.1 Environment 3 2.2 Adversary 4 2.3 Communications 4 2.4 Tactics 5 2.5 Roles 5 3 Case Study – Cyber Forge 11 7 3.1 Environment 7 3.2...realism into each aspect of the exercise, and a case study of one exercise where the framework was successfully employed. CMU/SEI-2017-TR-005...network, emulation, logging, reporting Supporting: computer network defense service provider (CNDSP), intelligence, reach-back, higher

  6. GeoBrain Computational Cyber-laboratory for Earth Science Studies

    NASA Astrophysics Data System (ADS)

    Deng, M.; di, L.

    2009-12-01

    Computational approaches (e.g., computer-based data visualization, analysis and modeling) are critical for conducting increasingly data-intensive Earth science (ES) studies to understand functions and changes of the Earth system. However, currently Earth scientists, educators, and students have met two major barriers that prevent them from being effectively using computational approaches in their learning, research and application activities. The two barriers are: 1) difficulties in finding, obtaining, and using multi-source ES data; and 2) lack of analytic functions and computing resources (e.g., analysis software, computing models, and high performance computing systems) to analyze the data. Taking advantages of recent advances in cyberinfrastructure, Web service, and geospatial interoperability technologies, GeoBrain, a project funded by NASA, has developed a prototype computational cyber-laboratory to effectively remove the two barriers. The cyber-laboratory makes ES data and computational resources at large organizations in distributed locations available to and easily usable by the Earth science community through 1) enabling seamless discovery, access and retrieval of distributed data, 2) federating and enhancing data discovery with a catalogue federation service and a semantically-augmented catalogue service, 3) customizing data access and retrieval at user request with interoperable, personalized, and on-demand data access and services, 4) automating or semi-automating multi-source geospatial data integration, 5) developing a large number of analytic functions as value-added, interoperable, and dynamically chainable geospatial Web services and deploying them in high-performance computing facilities, 6) enabling the online geospatial process modeling and execution, and 7) building a user-friendly extensible web portal for users to access the cyber-laboratory resources. Users can interactively discover the needed data and perform on-demand data analysis and

  7. Simulating cyber warfare and cyber defenses: information value considerations

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  8. Design and Analysis of a Model Reconfigurable Cyber-Exercise Laboratory (RCEL) for Information Assurance Education

    DTIC Science & Technology

    2004-03-01

    with MySQL . This choice was made because MySQL is open source. Any significant database engine such as Oracle or MS- SQL or even MS Access can be used...10 Figure 6. The DoD vs . Commercial Life Cycle...necessarily be interested in SCADA network security 13. MySQL (Database server) – This station represents a typical data server for a web page

  9. Anonymous As a Cyber Tribe: A New Model for Complex, Non-State Cyber Actors

    DTIC Science & Technology

    2015-05-01

    personas. Only then can cyber strategists exercise the required amount of cultural relativism needed to influence complex, and sometimes disturbing...that runs counter to their professional ethic ? When cyber tribes employ atrocity to create cultural barriers, how will planners remain focused on...as a cyber actor’s motivation? Meeting these challenges requires new levels of cultural relativism —the understanding of a “culture or a cultural

  10. Cyber Exercise Playbook

    DTIC Science & Technology

    2014-11-01

    unclassified tools and techniques that can be shared with PNs, to include social engineering, spear phishing , fake web sites, physical access attempts, and...and instead rely on commercial services such as Yahoo or Google . Some nations have quite advanced cyber security practices, but may take vastly...unauthorized access to data/systems Inject external network scanning, email phishing , malicious website access, social engineering Sample

  11. Gamification for Measuring Cyber Security Situational Awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporatesmore » augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.« less

  12. Procedures of Exercise Physiology Laboratories

    NASA Technical Reports Server (NTRS)

    Bishop, Phillip A.; Fortney, Suzanne; Greenisen, Michael; Siconolfi, Steven F.; Bamman, Marcas M.; Moore, Alan D., Jr.; Squires, William

    1998-01-01

    This manual describes the laboratory methods used to collect flight crew physiological performance data at the Johnson Space Center. The Exercise Countermeasures Project Laboratory is a standard physiology laboratory; only the application to the study of human physiological adaptations to spaceflight is unique. In the absence of any other recently published laboratory manual, this manual should be a useful document staffs and students of other laboratories.

  13. Simulation of General Physics laboratory exercise

    NASA Astrophysics Data System (ADS)

    Aceituno, P.; Hernández-Aceituno, J.; Hernández-Cabrera, A.

    2015-01-01

    Laboratory exercises are an important part of general Physics teaching, both during the last years of high school and the first year of college education. Due to the need to acquire enough laboratory equipment for all the students, and the widespread access to computers rooms in teaching, we propose the development of computer simulated laboratory exercises. A representative exercise in general Physics is the calculation of the gravity acceleration value, through the free fall motion of a metal ball. Using a model of the real exercise, we have developed an interactive system which allows students to alter the starting height of the ball to obtain different fall times. The simulation was programmed in ActionScript 3, so that it can be freely executed in any operative system; to ensure the accuracy of the calculations, all the input parameters of the simulations were modelled using digital measurement units, and to allow a statistical management of the resulting data, measurement errors are simulated through limited randomization.

  14. CyberPetri at CDX 2016: Real-time Network Situation Awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arendt, Dustin L.; Best, Daniel M.; Burtner, Edwin R.

    CyberPetri is a novel visualization technique that provides a flexible map of the network based on available characteristics, such as IP address, operating system, or service. Previous work introduced CyberPetri as a visualization feature in Ocelot, a network defense tool that helped security analysts understand and respond to an active defense scenario. In this paper we present a case study in which we use the CyberPetri visualization technique to support real-time situation awareness during the 2016 Cyber Defense Exercise.

  15. Nodes and Codes: The Reality of Cyber Warfare

    DTIC Science & Technology

    2012-05-17

    Nodes and Codes explores the reality of cyber warfare through the story of Stuxnet, a string of weaponized code that reached through a domain...nodes. Stuxnet served as a proof-of-concept for cyber weapons and provided a comparative laboratory to study the reality of cyber warfare from the...military powers most often associated with advanced, offensive cyber attack capabilities. The reality of cyber warfare holds significant operational

  16. Laboratory Exercise on Active Transport.

    ERIC Educational Resources Information Center

    Stalheim-Smith, Ann; Fitch, Greg K.

    1985-01-01

    Describes a laboratory exercise which demonstrates qualitatively the specificity of the transport mechanism, including a consideration of the competitive inhibition, and the role of adenosine triphosphate (ATP) in active transport. The exercise, which can be completed in two to three hours by groups of four students, consistently produces reliable…

  17. Metaphors for cyber security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less

  18. Cyber Security Testing and Training Programs for Industrial Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less

  19. A laboratory exercise in experimental bioimmuration

    USGS Publications Warehouse

    Mankiewicz, C.

    1998-01-01

    A paleobiologic laboratory exercise using lunch meat, cheeses, and condiments provides a means for studying a method of fossil preservation called "bioimmuration." The exercise also has students deal with problems associated with other aspects of taphonomy, taxonomy, and paleoecology.

  20. Cyber Friendly Fire

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamentalmore » need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general

  1. Laboratory Exercises to Teach Clinically Relevant Chemistry of Antibiotics

    PubMed Central

    Chelette, Candace T.

    2014-01-01

    Objectives. To design, implement, and evaluate student performance on clinically relevant chemical and spectral laboratory exercises on antibiotics. Design. In the first of 2 exercises, second-year pharmacy students enrolled in an integrated laboratory sequence course studied the aqueous stability of ß-lactam antibiotics using a spectral visual approach. In a second exercise, students studied the tendency of tetracycline, rifamycins, and fluoroquinolones to form insoluble chelate complexes (turbidity) with polyvalent metals. Assessment. On a survey to assess achievement of class learning objectives, students agreed the laboratory activities helped them better retain important information concerning antibiotic stability and interactions. A significant improvement was observed in performance on examination questions related to the laboratory topics for 2012 and 2013 students compared to 2011 students who did not complete the laboratory. A 1-year follow-up examination question administered in a separate course showed >75% of the students were able to identify rifamycins-food interactions compared with <25% of students who had not completed the laboratory exercises. Conclusion. The use of spectral visual approaches allowed students to investigate antibiotic stability and interactions, thus reinforcing the clinical relevance of medicinal chemistry. Students’ performance on questions at the 1-year follow-up suggested increased retention of the concepts learned as a result of completing the exercises. PMID:24672070

  2. Laboratory exercises to teach clinically relevant chemistry of antibiotics.

    PubMed

    El Sayed, Khalid A; Chelette, Candace T

    2014-03-12

    To design, implement, and evaluate student performance on clinically relevant chemical and spectral laboratory exercises on antibiotics. In the first of 2 exercises, second-year pharmacy students enrolled in an integrated laboratory sequence course studied the aqueous stability of ß-lactam antibiotics using a spectral visual approach. In a second exercise, students studied the tendency of tetracycline, rifamycins, and fluoroquinolones to form insoluble chelate complexes (turbidity) with polyvalent metals. On a survey to assess achievement of class learning objectives, students agreed the laboratory activities helped them better retain important information concerning antibiotic stability and interactions. A significant improvement was observed in performance on examination questions related to the laboratory topics for 2012 and 2013 students compared to 2011 students who did not complete the laboratory. A 1-year follow-up examination question administered in a separate course showed >75% of the students were able to identify rifamycins-food interactions compared with <25% of students who had not completed the laboratory exercises. The use of spectral visual approaches allowed students to investigate antibiotic stability and interactions, thus reinforcing the clinical relevance of medicinal chemistry. Students' performance on questions at the 1-year follow-up suggested increased retention of the concepts learned as a result of completing the exercises.

  3. Cyber Forensics Ontology for Cyber Criminal Investigation

    NASA Astrophysics Data System (ADS)

    Park, Heum; Cho, Sunho; Kwon, Hyuk-Chul

    We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber space. Accordingly, it is difficult to determine relational crime types and collect evidence. Therefore, we considered the classifications of cyber crime, the collection of evidence in cyber space and the application of laws to cyber crime. In order to efficiently investigate cyber crime, it is necessary to integrate those concepts for each cyber crime-case. Thus, we constructed a cyber forensics domain ontology for criminal investigation in cyber space, according to the categories of cyber crime, laws, evidence and information of criminals. This ontology can be used in the process of investigating of cyber crime-cases, and for data mining of cyber crime; classification, clustering, association and detection of crime types, crime cases, evidences and criminals.

  4. Evaluation of the Virtual Physiology of Exercise Laboratory Program

    ERIC Educational Resources Information Center

    Dobson, John L.

    2009-01-01

    The Virtual Physiology of Exercise Laboratory (VPEL) program was created to simulate the test design, data collection, and analysis phases of selected exercise physiology laboratories. The VPEL program consists of four modules: (1) cardiovascular, (2) maximal O[subscript 2] consumption [Vo[subscript 2max], (3) lactate and ventilatory thresholds,…

  5. Cyber Warfare/Cyber Terrorism

    DTIC Science & Technology

    2004-03-19

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the...alternative form of conflict, reviews the traditional principles of warfare and why they may or may not apply to cyber warfare , and proposes new principles of...warfare that may be needed to conduct cyber warfare . Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2

  6. Cyber Security and Resilient Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and

  7. Laboratory Exercises in Online Information Assurance Courses

    ERIC Educational Resources Information Center

    Bhagyavati

    2006-01-01

    Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three…

  8. Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus onmore » our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.« less

  9. INL@Work Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chaffin, May

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks.Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  10. R&D100 Finalist: Neuromorphic Cyber Microscope

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Follett, David; Naegle, John; Suppona, Roger

    The Neuromorphic Cyber Microscope provides security analysts with unprecedented visibility of their network, computer and storage assets. This processor is the world's first practical implementation of neuromorphic technology to a major computer science mission. Working with Lewis Rhodes Labs, engineers at Sandia National Laboratories have created a device that is orders of magnitude faster at analyzing data to identify cyber-attacks.

  11. Forming of science teacher thinking through integrated laboratory exercises

    NASA Astrophysics Data System (ADS)

    Horváthová, Daniela; Rakovská, Mária; Zelenický, Ľubomír

    2017-01-01

    Within the three-semester optional course Science we have also included into curricula the subject entitled Science Practicum consisting of laboratory exercises of complementary natural scientific disciplines whose content exceeds the boundaries of relevant a scientific discipline (physics, biology, …). The paper presents the structure and selected samples of laboratory exercises of physical part of Science Practicum in which we have processed in an integrated way the knowledge of physics and biology at secondary grammar school. When planning the exercises we have proceeded from those areas of mentioned disciplines in which we can appropriately apply integration of knowledge and where the measurement methods are used. We have focused on the integration of knowledge in the field of human sensory organs (eye, ear), dolphins, bats (spatial orientation) and bees (ommatidium of faceted eye) and their modelling. Laboratory exercises are designed in such a way that they would motivate future teachers of natural scientific subjects to work independently with specialized literature of the mentioned natural sciences and ICT.

  12. TCIA Secure Cyber Critical Infrastructure Modernization.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  13. Stuxnet, Schmitt Analysis, and the Cyber Use-of-Force Debate

    DTIC Science & Technology

    2012-01-01

    demonstration during exercise Bold Alligator 2012 U . S . N av y (J os hu a J. W ah l) 46 JFQ / issue 67, 4 th quarter 2012 ndupress .ndu.edu...language; and Article 51’ s “armed attack ” threshold for self-defense actions. 18 Schmitt, “Computer Network Attack and the Use of Force,” 920. 19...sponsored cyber coercion. More importantly, the prospect of cyber attacks causing physical damage was largely theoretical.4 Beginning Stuxnet, Schmitt

  14. Laboratory Exercise to Evaluate Hay Preservatives.

    ERIC Educational Resources Information Center

    McGraw, R. L.; And Others

    1990-01-01

    Presented is a laboratory exercise designed to demonstrate the effects of moisture on hay preservation products in a manner that does not require large amounts of equipment or instructor time. Materials, procedures, and probable results are discussed. (CW)

  15. Inter-laboratory exercise on antibiotic drugs analysis in aqueous samples.

    PubMed

    Roig, B; Brogat, M; Mompelat, S; Leveque, J; Cadiere, A; Thomas, O

    2012-08-30

    An inter-laboratory exercise was organized under the PHARMAS EU project, by the Advanced School of Public Health (EHESP), in order to evaluate the performances of analytical methods for the measurement of antibiotics in waters (surface and tap). This is the first time such an exercise on antibiotics has been organized in Europe, using different kinds of analytical methods and devices. In this exercise thirteen laboratories from five countries (Canada, France, Italy, the Netherlands and Portugal) participated, and a total number of 78 samples were distributed. During the exercise, 2 testing samples (3 bottles of each) prepared from tap water and river water, respectively, spiked with antibiotics, were sent to participants and analyzed over a period of one month. A final number of 77 (98.7%) testing samples were considered. Depending on substances studied by each participant, 305 values in duplicate were collected, with the results for each sample being expressed as the target concentration. A statistical study was initiated using 611 results. The mean value, standard deviation, coefficient of variation, standard uncertainty of the mean, median, the minimum and maximum values of each series as well as the 95% confidence interval were obtained from each participant laboratory. In this exercise, 36 results (6% of accounted values) were outliers according to the distribution over the median (box plot). The outlier results were excluded. In order to establish the stability of testing samples in the course of the exercise, differences between variances obtained for every type of sample at different intervals were evaluated. The results showed no representative variations and it can be considered that all samples were stable during the exercise. The goals of this inter-laboratory study were to assess results variability when analysis is conducted by different laboratories, to evaluate the influence of different matrix samples, and to determine the rate at which

  16. Two Crystallographic Laboratory and Computational Exercises for Undergraduates.

    ERIC Educational Resources Information Center

    Lessinger, Leslie

    1988-01-01

    Describes two introductory exercises designed to teach the fundamental ideas and methods of crystallography, and to convey some important features of inorganic and organic crystal structures to students in an advanced laboratory course. Exercises include "The Crystal Structure of NiO" and "The Crystal Structure of Beta-Fumaric Acid." (CW)

  17. A pharmacy practice laboratory exercise to apply biochemistry concepts.

    PubMed

    Harrold, Marc W; McFalls, Marsha A

    2010-10-11

    To develop exercises that allow pharmacy students to apply foundational knowledge discussed in a first-professional year (P1) biochemistry course to specific disease states and patient scenarios. A pharmacy practice laboratory exercise was developed to accompany a lecture sequence pertaining to purine biosynthesis and degradation. The assignment required students to fill a prescription, provide patient counseling tips, and answer questions pertaining to the disease state, the underlying biochemical problem, and the prescribed medication. Students were graded on the accuracy with which they filled the prescription, provided patient counseling, and answered the questions provided. Overall, students displayed mastery in all of these areas. Additionally, students completed a course survey on which they rated this exercise favorably, noting that it helped them to integrate basic science concepts and pharmacy practice. A laboratory exercise provided an opportunity for P1 students to apply foundational pharmacy knowledge to a patient case and can serve as a template for the design of additional exercises.

  18. Model Based Verification of Cyber Range Event Environments

    DTIC Science & Technology

    2015-12-10

    Model Based Verification of Cyber Range Event Environments Suresh K. Damodaran MIT Lincoln Laboratory 244 Wood St., Lexington, MA, USA...apply model based verification to cyber range event environment configurations, allowing for the early detection of errors in event environment...Environment Representation (CCER) ontology. We also provide an overview of a methodology to specify verification rules and the corresponding error

  19. An Undergraduate Laboratory Exercise for Studying Kinetics of Batch Crystallization

    ERIC Educational Resources Information Center

    Louhi­-Kultanen, Marjatta; Han, Bing; Nurkka, Annikka; Hatakka, Henry

    2015-01-01

    The present work describes an undergraduate laboratory exercise for improving understanding of fundamental phenomena in cooling crystallization. The exercise of nucleation and crystal growth kinetics supports learning of theories and models presented in lectures and calculation exercises. The teaching methodology incorporates precepts the…

  20. Research Directions for Cyber Experimentation: Workshop Discussion Analysis.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DeWaard, Elizabeth; Deccio, Casey; Fritz, David Jakob

    Sandia National Laboratories hosted a workshop on August 11, 2017 entitled "Research Directions for Cyber Experimentation," which focused on identifying and addressing research gaps within the field of cyber experimentation , particularly emulation testbeds . This report mainly documents the discussion toward the end of the workshop, which included research gaps such as developing a sustainable research infrastructure, exp anding cyber experimentation, and making the field more accessible to subject matter experts who may not have a background in computer science . Other gaps include methodologies for rigorous experimentation, validation, and uncertainty quantification, which , if addressed, also have themore » potential to bridge the gap between cyber experimentation and cyber engineering. Workshop attendees presented various ways to overcome these research gaps, however the main conclusion for overcoming these gaps is better commun ication through increased workshops, conferences, email lists, and slack chann els, among other opportunities.« less

  1. Cyber Incidents Involving Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Managementmore » Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information

  2. Using Mobile Devices for Motor-Learning Laboratory Exercises

    ERIC Educational Resources Information Center

    Hill, Kory

    2014-01-01

    When teaching motor-learning concepts, laboratory experiments can be valuable tools for promoting learning. In certain circumstances, traditional laboratory exercises are often impractical due to facilities, time, or cost. Inexpensive or free applications (apps) that run on mobile devices can serve as useful alternatives. This article details…

  3. The Exercise Physiology Laboratory--A Source of Health Promotion.

    ERIC Educational Resources Information Center

    Norris, William; Norred, Robert

    1988-01-01

    A visit to the Exercise Physiology Laboratory at the University of Tennessee is part of a physical education class required of all undergraduate students. The laboratory demonstration stimulates student interest and enrollment in physical education. Benefits to students, the laboratory, and the school are described. (MT)

  4. A Laboratory Exercise to Assess Transpiration.

    ERIC Educational Resources Information Center

    Schrock, Gould F.

    1982-01-01

    Procedures are outlined for a laboratory exercise in which students use a gravimetric method to determine the rate of transpiration in sunflower seedlings. Discusses the data in terms of the effectiveness of stomatal openings, mechanisms for water movement in plants, and the role of transpiration in the environment. (DC)

  5. Assessment of an ELISA Laboratory Exercise

    ERIC Educational Resources Information Center

    Robinson, David L.; Lau, Joann M.

    2012-01-01

    The enzyme-linked immunosorbent assay (ELISA) is a powerful immunological technique for quantifying small amounts of compounds and has been used in research and clinical settings for years. Although there are laboratory exercises developed to introduce the ELISA technique to students, their ability to promote student learning has not been…

  6. A qualitative case study of instructional support for web-based simulated laboratory exercises in online college chemistry laboratory courses

    NASA Astrophysics Data System (ADS)

    Schulman, Kathleen M.

    This study fills a gap in the research literature regarding the types of instructional support provided by instructors in online introductory chemistry laboratory courses that employ chemistry simulations as laboratory exercises. It also provides information regarding students' perceptions of the effectiveness of that instructional support. A multiple case study methodology was used to carry out the research. Two online introductory chemistry courses were studied at two community colleges. Data for this study was collected using phone interviews with faculty and student participants, surveys completed by students, and direct observation of the instructional designs of instructional support in the online Blackboard web sites and the chemistry simulations used by the participating institutions. The results indicated that the instructors provided multiple types of instructional support that correlated with forms of effective instructional support identified in the research literature, such as timely detailed feedback, detailed instructions for the laboratory experiments, and consistency in the instructional design of lecture and laboratory course materials, including the chemistry lab simulation environment. The students in one of these courses identified the following as the most effective types of instructional support provided: the instructor's feedback, opportunities to apply chemistry knowledge in the chemistry lab exercises, detailed procedures for the simulated laboratory exercises, the organization of the course Blackboard sites and the chemistry lab simulation web sites, and the textbook homework web sites. Students also identified components of instructional support they felt were missing. These included a desire for more interaction with the instructor, more support for the simulated laboratory exercises from the instructor and the developer of the chemistry simulations, and faster help with questions about the laboratory exercises or experimental

  7. Cyber-Terrorism and Cyber-Crime: There Is a Difference

    DTIC Science & Technology

    The terms cyber -terrorism and cyber -crime have many varying definitions depending on who is defining them. For example, individuals with expertise in...considerations and, when investigating a cyber -attack, procedural considerations. By examining the strengths and weaknesses of several definitions offered by...national security, law enforcement, industry, law, and scholars, this research constructs a list of parameters to consider when formulating definitions for cyber -terrorism and cyber -crime.

  8. PACIFIC NORTHWEST CYBER SUMMIT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lesperance, Ann M.; Matlock, Gordon W.; Becker-Dippmann, Angela S.

    2013-08-07

    On March 26, 2013, the Snohomish County Public Utility District (PUD) and the U.S. Department of Energy’s (DOE’s) Pacific Northwest National Laboratory (PNNL) jointly hosted the Pacific Northwest Cyber Summit with the DOE’s Office of Electricity Delivery and Energy Reliability, the White House, Washington State congressional delegation, Washington State National Guard, and regional energy companies.

  9. Preparation of Unconsolidated Sands for Microscopy Laboratory Exercises.

    ERIC Educational Resources Information Center

    Cameron, Barry; Jones, J. Richard

    1988-01-01

    Describes a technique of impregnating small amounts of sandy sediment in a quick curing resin for microscopic examination. Details the preparation of materials. Suggests laboratory exercises based on this preparation. (CW)

  10. Blended learning within an undergraduate exercise physiology laboratory.

    PubMed

    Elmer, Steven J; Carter, Kathryn R; Armga, Austin J; Carter, Jason R

    2016-03-01

    In physiological education, blended course formats (integration of face-to-face and online instruction) can facilitate increased student learning, performance, and satisfaction in classroom settings. There is limited evidence on the effectiveness of using blending course formats in laboratory settings. We evaluated the impact of blended learning on student performance and perceptions in an undergraduate exercise physiology laboratory. Using a randomized, crossover design, four laboratory topics were delivered in either a blended or traditional format. For blended laboratories, content was offloaded to self-paced video demonstrations (∼15 min). Laboratory section 1 (n = 16) completed blended laboratories for 1) neuromuscular power and 2) blood lactate, whereas section 2 (n = 17) completed blended laboratories for 1) maximal O2 consumption and 2) muscle electromyography. Both sections completed the same assignments (scored in a blinded manner using a standardized rubric) and practicum exams (evaluated by two independent investigators). Pre- and postcourse surveys were used to assess student perceptions. Most students (∼79%) watched videos for both blended laboratories. Assignment scores did not differ between blended and traditional laboratories (P = 0.62) or between sections (P = 0.91). Practicum scores did not differ between sections (both P > 0.05). At the end of the course, students' perceived value of the blended format increased (P < 0.01) and a greater percentage of students agreed that learning key foundational content through video demonstrations before class greatly enhanced their learning of course material compared with a preassigned reading (94% vs. 78%, P < 0.01). Blended exercise physiology laboratories provided an alternative method for delivering content that was favorably perceived by students and did not compromise student performance. Copyright © 2016 The American Physiological Society.

  11. Simulation of cyber attacks with applications in homeland defense training

    NASA Astrophysics Data System (ADS)

    Brown, Bill; Cutts, Andrew; McGrath, Dennis; Nicol, David M.; Smith, Timothy P.; Tofel, Brett

    2003-09-01

    We describe a tool to help exercise and train IT managers who make decisions about IP networks in the midst of cyber calamity. Our tool is interactive, centered around a network simulation. It includes various modes of communications one would use to make informed decisions. Our tool is capable of simulating networks with hundreds of components and dozens of players. Test indicate that it could support an exercise an order of magnitude larger and more complex.

  12. Defense Civil Support: DOD Needs to Identify National Guards Cyber Capabilities and Address Challenges in Its Exercises

    DTIC Science & Technology

    2016-09-01

    Congress. Consequently, as prepared now, this report does not help DOD leaders identify assets that could be used in a cyber crisis scenario...Guidance. GAO-13-128. Washington, D.C.: October 24, 2012. Defense Cyber Efforts: Management Improvements Needed to Enhance Programs Protecting the...DEFENSE CIVIL SUPPORT DOD Needs to Identify National Guard’s Cyber Capabilities and Address Challenges in Its

  13. Students’ Perception of Self-Efficacy Following Medicinal Chemistry Skills Laboratory Exercises

    PubMed Central

    Roche, Victoria F.; Qi, Yongyue

    2016-01-01

    Objective. To analyze student perceptions of self-efficacy in meeting medicinal chemistry course related educational outcomes and skills following a medicinal chemistry skills laboratory. Methods. Four activities were implemented in a pharmacy skills laboratory (PSL) for second-year pharmacy students. Students (n=121) worked individually on exercises for three of the four activities. Pre/post-laboratory surveys on self-efficacy were administered. The McNemar test was performed to evaluate students’ self-efficacy above 70% related to course outcomes before and after the exercises in each activity. An independent t test was conducted to compare the mean of students’ responses on meeting course outcomes based on the 70% anchor for the perspective confidence on meeting course outcomes. Results. The post-PSL scores on all self-efficacy questions improved. The majority of students reported skill development in all exercises. Students and clinical faculty qualitative responses indicated they felt exercises were effective. Conclusion. A PSL can serve as a valuable opportunity to address course related educational outcomes and specific skill development and can help students assess their self-efficacy in meeting them. PMID:27402979

  14. Students' Perception of Self-Efficacy Following Medicinal Chemistry Skills Laboratory Exercises.

    PubMed

    Alsharif, Naser Z; Roche, Victoria F; Qi, Yongyue

    2016-06-25

    Objective. To analyze student perceptions of self-efficacy in meeting medicinal chemistry course related educational outcomes and skills following a medicinal chemistry skills laboratory. Methods. Four activities were implemented in a pharmacy skills laboratory (PSL) for second-year pharmacy students. Students (n=121) worked individually on exercises for three of the four activities. Pre/post-laboratory surveys on self-efficacy were administered. The McNemar test was performed to evaluate students' self-efficacy above 70% related to course outcomes before and after the exercises in each activity. An independent t test was conducted to compare the mean of students' responses on meeting course outcomes based on the 70% anchor for the perspective confidence on meeting course outcomes. Results. The post-PSL scores on all self-efficacy questions improved. The majority of students reported skill development in all exercises. Students and clinical faculty qualitative responses indicated they felt exercises were effective. Conclusion. A PSL can serve as a valuable opportunity to address course related educational outcomes and specific skill development and can help students assess their self-efficacy in meeting them.

  15. A New Resource for College Distance Education Astronomy Laboratory Exercises

    ERIC Educational Resources Information Center

    Vogt, Nicole P.; Cook, Stephen P.; Muise, Amy Smith

    2013-01-01

    This article introduces a set of distance education astronomy laboratory exercises for use by college students and instructors and discusses first usage results. This General Astronomy Education Source exercise set contains eight two-week projects designed to guide students through both core content and mathematical applications of general…

  16. Developing a cardiopulmonary exercise testing laboratory.

    PubMed

    Diamond, Edward

    2007-12-01

    Cardiopulmonary exercise testing is a noninvasive and cost-effective technique that adds significant value to the assessment and management of a variety of symptoms and diseases. The penetration of this testing in medical practice may be limited by perceived operational and financial barriers. This article reviews coding and supervision requirements related to both simple and complex pulmonary stress testing. A program evaluation and review technique diagram is used to describe the work flow process. Data from our laboratory are used to generate an income statement that separates fixed and variable costs and calculates the contribution margin. A cost-volume-profit (break-even) analysis is then performed. Using data from our laboratory including fixed and variable costs, payer mix, reimbursements by payer, and the assumption that the studies are divided evenly between simple and complex pulmonary stress tests, the break-even number is calculated to be 300 tests per year. A calculator with embedded formulas has been designed by the author and is available on request. Developing a cardiopulmonary exercise laboratory is challenging but achievable and potentially profitable. It should be considered by a practice that seeks to distinguish itself as a quality leader. Providing this clinically valuable service may yield indirect benefits such as increased patient volume and increased utilization of other services provided by the practice. The decision for a medical practice to commit resources to managerial accounting support requires a cost-benefit analysis, but may be a worthwhile investment in our challenging economic environment.

  17. LABORATORY EXERCISES IN OCEANOGRAPHY FOR HIGH SCHOOLS.

    ERIC Educational Resources Information Center

    National Science Foundation, Washington, DC.

    DESCRIBED ARE LABORATORY EXERCISES IN OCEANOGRAPHY DEVELOPED FOR USE IN HIGH SCHOOLS BY THE SECONDARY SCHOOL TEACHERS IN THE 1967 NATIONAL SCIENCE FOUNDATION (NSF) SUMMER INSTITUTE IN OCEANOGRAPHY AT FLORIDA STATE UNIVERSITY. INCLUDED ARE SUCH ACTIVITIES AS (1) THE MEASUREMENT OF TEMPERATURE, WATER VAPOR, PRESSURE, SALINITY, DENSITY, AND OTHERS,…

  18. Cyber Warfare: China’s Strategy to Dominate in Cyber Space

    DTIC Science & Technology

    2011-06-10

    CYBER WARFARE : CHINA‘S STRATEGY TO DOMINATE IN CYBER SPACE A thesis presented to the Faculty of the U.S. Army Command and...warfare supports the use of cyber warfare in future conflict. The IW militia unit organization provides each Chinese military region commander with...China, Strategy, Cyber Warfare , Cyber Space, Information Warfare, Electronic Warfare 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18

  19. Laboratory exercises on oscillation modes of pipes

    NASA Astrophysics Data System (ADS)

    Haeberli, Willy

    2009-03-01

    This paper describes an improved lab setup to study the vibrations of air columns in pipes. Features of the setup include transparent pipes which reveal the position of a movable microphone inside the pipe; excitation of pipe modes with a miniature microphone placed to allow access to the microphone stem for open, closed, or conical pipes; and sound insulation to avoid interference between different setups in a student lab. The suggested experiments on the modes of open, closed, and conical pipes, the transient response of a pipe, and the effect of pipe diameter are suitable for introductory physics laboratories, including laboratories for nonscience majors and music students, and for more advanced undergraduate laboratories. For honors students or for advanced laboratory exercises, the quantitative relation between the resonance width and damping time constant is of interest.

  20. A Guided-Inquiry pH Laboratory Exercise for Introductory Biological Science Laboratories

    ERIC Educational Resources Information Center

    Snodgrass, Meagan A.; Lux, Nicholas; Metz, Anneke M.

    2011-01-01

    There is a continuing need for engaging inquiry-based laboratory experiences for advanced high school and undergraduate biology courses. The authors describe a guided-inquiry exercise investigating the pH-dependence of lactase enzyme that uses an inexpensive, wide-range buffering system, lactase dietary supplement, over-the-counter glucose test…

  1. INDUSTRIAL RADIOGRAPHY STUDENT GUIDE AND LABORATORY EXERCISES.

    ERIC Educational Resources Information Center

    Bureau of Adult, Vocational, and Technical Education (DHEW/OE), Washington, DC. Div. of Vocational and Technical Education.

    THIS INSTRUCTOR'S GUIDE TO AN 80-HOUR COURSE IN INDUSTRIAL RADIOGRAPHY IS COORDINATED WITH LESSONS IN THE STUDENT GUIDE AND LABORATORY EXERCISES AND IS BASED ON MATERIAL IN THE COURSE MANUAL, INDUSTRIAL RADIOGRAPHY. THE COURSE IS INTENDED TO TRAIN HIGH SCHOOL GRADUATES AS BEGINNING RADIOGRAPHERS WHO ARE EXPECTED TO BE ABLE TO EXTEND THEIR…

  2. GHSI EMERGENCY RADIONUCLIDE BIOASSAY LABORATORY NETWORK: SUMMARY OF A RECENT EXERCISE.

    PubMed

    Li, Chunsheng; Ansari, Armin; Bartizel, Christine; Battisti, Paolo; Franck, Didier; Gerstmann, Udo; Giardina, Isabella; Guichet, Claude; Hammond, Derek; Hartmann, Martina; Jones, Robert L; Kim, Eunjoo; Ko, Raymond; Morhard, Ryan; Quayle, Deborah; Sadi, Baki; Saunders, David; Paquet, Francois

    2016-11-01

    The Global Health Security Initiative (GHSI) established a laboratory network within the GHSI community to develop their collective surge capacity for radionuclide bioassay in response to a radiological or nuclear emergency. A recent exercise was conducted to test the participating laboratories for their capabilities in screening and in vitro assay of biological samples, performing internal dose assessment and providing advice on medical intervention, if necessary, using a urine sample spiked with a single radionuclide, 241 Am. The laboratories were required to submit their reports according to the exercise schedule and using pre-formatted templates. Generally, the participating laboratories were found to be capable with respect to rapidly screening samples for radionuclide contamination, measuring the radionuclide in the samples, assessing the intake and radiation dose, and providing advice on medical intervention. However, gaps in bioassay measurement and dose assessment have been identified. The network may take steps to ensure that procedures and practices within this network be harmonised and a follow-up exercise be organised on a larger scale, with potential participation of laboratories from the networks coordinated by the International Atomic Energy Agency and the World Health Organization. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. Percolation Tests for Septic Systems: A Laboratory Exercise.

    ERIC Educational Resources Information Center

    Tinker, John R., Jr.

    1978-01-01

    Describes how the procedures by which a certificate soil tester evaluates a parcel of land for its suitability as a site for a private sewage system or septic tank can be used by college students as a laboratory exercise in environmental geology. (HM)

  4. Mapping Maize Genes: A Series of Research-Based Laboratory Exercises

    ERIC Educational Resources Information Center

    Makarevitch, Irina; Kralich, Elizabeth

    2011-01-01

    Open-ended, inquiry-based multiweek laboratory exercises are the key elements to increasing students' understanding and retention of the major biological concepts. Including original research into undergraduate teaching laboratories has also been shown to motivate students and improve their learning. Here, we present a series of original…

  5. Introducing cyber.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  6. Effects of exercise on craving and cigarette smoking in the human laboratory.

    PubMed

    Kurti, Allison N; Dallery, Jesse

    2014-06-01

    Exercise is increasingly being pursued as a treatment to reduce cigarette smoking. The efficacy of clinical, exercise-based cessation interventions may be enhanced by conducting laboratory studies to determine maximally effective conditions for reducing smoking, and the mechanisms through which the effects on smoking are achieved. The main purpose of this study was to assess whether the effects of exercise on two components of craving (anticipated reward from smoking, anticipated relief from withdrawal) mediated the relationship between exercise and delay (in min) to ad libitum smoking. Experiment 1 (N=21) assessed the effects of exercise intensity (inactivity, low, moderate) on craving components up to 60 min post-exercise. Because moderate-intensity exercise most effectively reduced craving on the reward component, all participants exercised at a moderate intensity in Experiment 2. Using an ABAB within-subjects design, Experiment 2 (N=20) evaluated whether the effects of moderate-intensity exercise on reward and relief components of craving mediated the relationship between exercise and participants' delays (in min) to ad libitum smoking. Delays were significantly longer after exercise (M=21 min) versus inactivity (M=4 min), and the effects of exercise on delay were mediated through the reward component of craving. Future research should continue to explore the mechanisms through which exercise influences behavioral indices of smoking in the human laboratory. Additionally, given the benefits uniquely afforded by exercise-based cessation interventions (e.g., improving mood and other health outcomes), implementing these interventions in clinical settings may contribute substantially to improving public health. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  8. Exploring Chemical Equilibrium with Poker Chips: A General Chemistry Laboratory Exercise

    ERIC Educational Resources Information Center

    Bindel, Thomas H.

    2012-01-01

    A hands-on laboratory exercise at the general chemistry level introduces students to chemical equilibrium through a simulation that uses poker chips and rate equations. More specifically, the exercise allows students to explore reaction tables, dynamic chemical equilibrium, equilibrium constant expressions, and the equilibrium constant based on…

  9. The Cyber Defense (CyDef) Model for Assessing Countermeasure Capabilities.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kimura, Margot; DeVries, Troy Robert; Gordon, Susanna P.

    Cybersecurity is essential to maintaining operations, and is now a de facto cost of business. Despite this, there is little consensus on how to systematically make decisions about cyber countermeasures investments. Identifying gaps and determining the expected return on investment (ROI) of adding a new cybersecurity countermeasure is frequently a hand-waving exercise at best. Worse, cybersecurity nomenclature is murky and frequently over-loaded, which further complicates issues by inhibiting clear communication. This paper presents a series of foundational models and nomenclature for discussing cybersecurity countermeasures, and then introduces the Cyber Defense (CyDef) model, which provides a systematic and intuitive way formore » decision-makers to effectively communicate with operations and device experts.« less

  10. Final LDRD Report: Using Linkography of Cyber Attack Patterns to Inform Honeytoken Placement.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mitchell, Robert; Jarocki, John Charles; Fisher, Andrew N

    The war to establish cyber supremacy continues, and the literature is crowded with strictly technical cyber security measures. We present the results of a three year LDRD project using Linkography, a methodology new to the field of cyber security, we establish the foundation neces- sary to track and profile the microbehavior of humans attacking cyber systems. We also propose ways to leverage this understanding to influence and deceive these attackers. We studied the sci- ence of linkography, applied it to the cyber security domain, implemented a software package to manage linkographs, generated the preprocessing blocks necessary to ingest raw data,more » produced machine learning models, created ontology refinement algorithms and prototyped a web applica- tion for researchers and practitioners to apply linkography. Machine learning produced some of our key results: We trained and validated multinomial classifiers with a real world data set and predicted the attacker's next category of action with 86 to 98% accuracy; dimension reduction techniques indicated that the linkography-based features were among the most powerful. We also discovered ontology refinement algorithms that advanced the state of the art in linkography in general and cyber security in particular. We conclude that linkography is a viable tool for cyber security; we look forward to expanding our work to other data sources and using our prediction results to enable adversary deception techniques. Acknowledgements Thanks to Phil Bennett, Michael Bernard, Jeffrey Bigg, Marshall Daniels, Tyler Dean, David Dug- gan, Carson Kent, Josh Maine, Marci McBride, Nick Peterson, Katie Rodhouse, Asael Sorenson, Roger Suppona, Scott Watson and David Zage. We acknowledge support for this work by the LDRD Program at Sandia National Laboratories. Sandia National Laboratories is a multi-mission laboratory operated by Sandia Corporation for the United States Department of Energy's National Nuclear Security

  11. Reactivity of Household Oxygen Bleaches: A Stepwise Laboratory Exercise in High School Chemistry Course

    ERIC Educational Resources Information Center

    Nakano, Masayoshi; Ogasawara, Haruka; Wada, Takeshi; Koga, Nobuyoshi

    2016-01-01

    This paper reports on a learning program designed for high school chemistry classes that involves laboratory exercises using household oxygen bleaches. In this program, students are taught the chemistry of oxygen bleaches through a stepwise inquiry using laboratory exercises organized with different pedagogical intents. Through comparative…

  12. Exercise in Inquiry: Critical Thinking in an Inquiry-Based Exercise Physiology Laboratory Course.

    ERIC Educational Resources Information Center

    DiPasquale, Dana M.; Mason, Cheryl L.; Kolkhorst, Fred W.

    2003-01-01

    Describes an inquiry-based teaching method implemented in an undergraduate exercise physiology laboratory course. Indicates students' strong, positive feelings about the inquiry-based teaching method and shows that inquiry-based learning results in a higher order of learning not typically observed in traditional style classes. This teaching method…

  13. Cyber Insurance - Managing Cyber Risk

    DTIC Science & Technology

    2015-04-01

    license under the clause at DFARS 252.227-7013 (a)(16) [Jun 2013]. Cyber Insurance – Managing Cyber Risk Data breaches involving...significant personal information losses and financial impact are becoming increasingly common. Whether the data breach has financial implications for...hundreds of millions of dollars depending on the type and size of the breach. Most states have some type of data breach law requiring notification

  14. CyberArc: a non-coplanar-arc optimization algorithm for CyberKnife

    NASA Astrophysics Data System (ADS)

    Kearney, Vasant; Cheung, Joey P.; McGuinness, Christopher; Solberg, Timothy D.

    2017-07-01

    The goal of this study is to demonstrate the feasibility of a novel non-coplanar-arc optimization algorithm (CyberArc). This method aims to reduce the delivery time of conventional CyberKnife treatments by allowing for continuous beam delivery. CyberArc uses a 4 step optimization strategy, in which nodes, beams, and collimator sizes are determined, source trajectories are calculated, intermediate radiation models are generated, and final monitor units are calculated, for the continuous radiation source model. The dosimetric results as well as the time reduction factors for CyberArc are presented for 7 prostate and 2 brain cases. The dosimetric quality of the CyberArc plans are evaluated using conformity index, heterogeneity index, local confined normalized-mutual-information, and various clinically relevant dosimetric parameters. The results indicate that the CyberArc algorithm dramatically reduces the treatment time of CyberKnife plans while simultaneously preserving the dosimetric quality of the original plans.

  15. CyberArc: a non-coplanar-arc optimization algorithm for CyberKnife.

    PubMed

    Kearney, Vasant; Cheung, Joey P; McGuinness, Christopher; Solberg, Timothy D

    2017-06-26

    The goal of this study is to demonstrate the feasibility of a novel non-coplanar-arc optimization algorithm (CyberArc). This method aims to reduce the delivery time of conventional CyberKnife treatments by allowing for continuous beam delivery. CyberArc uses a 4 step optimization strategy, in which nodes, beams, and collimator sizes are determined, source trajectories are calculated, intermediate radiation models are generated, and final monitor units are calculated, for the continuous radiation source model. The dosimetric results as well as the time reduction factors for CyberArc are presented for 7 prostate and 2 brain cases. The dosimetric quality of the CyberArc plans are evaluated using conformity index, heterogeneity index, local confined normalized-mutual-information, and various clinically relevant dosimetric parameters. The results indicate that the CyberArc algorithm dramatically reduces the treatment time of CyberKnife plans while simultaneously preserving the dosimetric quality of the original plans.

  16. Application of the JDL data fusion process model for cyber security

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2010-04-01

    A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

  17. Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  18. Cyber Analogies

    DTIC Science & Technology

    2014-02-28

    distribution is unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This anthology of cyber analogies will resonate with readers whose duties call for them...THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT This anthology of cyber analogies will resonate with readers...fresh insights. THE CASE FOR ANALOGIES All of us on the cyber analogies team hope that this anthol- ogy will resonate with readers whose duties call

  19. Undergraduate Laboratory Exercises Specific to Food Spoilage Microbiology

    ERIC Educational Resources Information Center

    Snyder, Abigail B.; Worobo, Randy W.; Orta-Ramirez, Alicia

    2016-01-01

    Food spoilage has an enormous economic impact, and microbial food spoilage plays a significant role in food waste and loss; subsequently, an equally significant portion of undergraduate food microbiology instruction should be dedicated to spoilage microbiology. Here, we describe a set of undergraduate microbiology laboratory exercises that focus…

  20. Refocusing Cyber Warfare Thought

    DTIC Science & Technology

    2013-02-01

    January–February 2013 Air & Space Power Journal | 44 FeatureCyber Focus Refocusing Cyber Warfare Thought Maj Sean C. Butler, USAF In September 2007...1. REPORT DATE FEB 2013 2. REPORT TYPE 3. DATES COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Refocusing Cyber Warfare Thought 5a...2013 Air & Space Power Journal | 45 Butler Refocusing Cyber Warfare Thought FeatureCyber Focus characterized by the use of electronics and the

  1. CYBER-205 Devectorizer

    NASA Technical Reports Server (NTRS)

    Lakeotes, Christopher D.

    1990-01-01

    DEVECT (CYBER-205 Devectorizer) is CYBER-205 FORTRAN source-language-preprocessor computer program reducing vector statements to standard FORTRAN. In addition, DEVECT has many other standard and optional features simplifying conversion of vector-processor programs for CYBER 200 to other computers. Written in FORTRAN IV.

  2. Laboratory Exercise: Study of Digestive and Regulatory Processes through the Exploration of Fasted and Postprandial Blood Glucose

    ERIC Educational Resources Information Center

    Hopper, Mari K.; Maurer, Luke W.

    2013-01-01

    Digestive physiology laboratory exercises often explore the regulation of enzyme action rather than systems physiology. This laboratory exercise provides a systems approach to digestive and regulatory processes through the exploration of postprandial blood glucose levels. In the present exercise, students enrolled in an undergraduate animal…

  3. Cyber security evaluation of II&C technologies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, Ken

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted

  4. Literature Review on Modeling Cyber Networks and Evaluating Cyber Risks.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kelic, Andjelka; Campbell, Philip L

    The National Infrastructure Simulations and Analysis Center (NISAC) conducted a literature review on modeling cyber networks and evaluating cyber risks. The literature review explores where modeling is used in the cyber regime and ways that consequence and risk are evaluated. The relevant literature clusters in three different spaces: network security, cyber-physical, and mission assurance. In all approaches, some form of modeling is utilized at varying levels of detail, while the ability to understand consequence varies, as do interpretations of risk. This document summarizes the different literature viewpoints and explores their applicability to securing enterprise networks.

  5. Cyber-Informed Engineering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, Robert S.; Benjamin, Jacob; Wright, Virginia L.

    A continuing challenge for engineers who utilize digital systems is to understand the impact of cyber-attacks across the entire product and program lifecycle. This is a challenge due to the evolving nature of cyber threats that may impact the design, development, deployment, and operational phases of all systems. Cyber Informed Engineering is the process by which engineers are made aware of both how to use their engineering knowledge to positively impact the cyber security in the processes by which they architect and design components and the services and security of the components themselves.

  6. Cyber crimes.

    PubMed

    Nuzback, Kara

    2014-07-01

    Since it began offering cyber liability coverage in December 2011, the Texas Medical Liability Trust has received more than 150 cyber liability claims, most of which involved breaches of electronic protected health information. TMLT's cyber liability insurance will protect practices financially should a breach occur. The insurance covers a breach notification to customers and business partners, expenses for legal counsel, information security and forensic data services, public relations support, call center and website support, credit monitoring, and identity theft restoration services.

  7. Burbank exercises on the CEVIS in the U.S. Laboratory

    NASA Image and Video Library

    2011-12-09

    ISS030-E-010646 (9 Dec. 2011) --- NASA astronaut Dan Burbank, Expedition 30 commander, exercises on the Cycle Ergometer with Vibration Isolation System (CEVIS) in the Destiny laboratory of the International Space Station.

  8. Burbank exercises on the CEVIS in the U.S. Laboratory

    NASA Image and Video Library

    2011-12-09

    ISS030-E-010644 (9 Dec. 2011) --- NASA astronaut Dan Burbank, Expedition 30 commander, exercises on the Cycle Ergometer with Vibration Isolation System (CEVIS) in the Destiny laboratory of the International Space Station.

  9. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    PubMed

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  10. Self-Development for Cyber Warriors

    DTIC Science & Technology

    2011-11-10

    Aggressive self-development is a critical task for the cyber warfare professional. No matter the quality, formal training and education programs age...Books and Science Fiction); Technology and Cyber-Related Magazines and Blogs; Specific Cyber Warfare Journal and Magazine Articles; Key Documents on...the strengths and weaknesses of the major donor career fields to the cyber workforce, and a Self-Assessment of Cyber Domain Expertise for readers who wish to assess their own cyber warfare expertise.

  11. Hot Salsa: A Laboratory Exercise Exploring the Scientific Method.

    ERIC Educational Resources Information Center

    Levri, Edward P.; Levri, Maureen A.

    2003-01-01

    Presents a laboratory exercise on spicy food and body temperature that introduces the scientific method to introductory biology students. Suggests that when students perform their own experiments which they have developed, it helps with their understanding of and confidence in doing science. (Author/SOE)

  12. Pettit exercises on the CEVIS in the U.S. Laboratory

    NASA Image and Video Library

    2012-01-15

    ISS030-E-032768 (15 Jan. 2012) --- NASA astronaut Don Pettit, Expedition 30 flight engineer, exercises on the Cycle Ergometer with Vibration Isolation System (CEVIS) in the Destiny laboratory of the International Space Station.

  13. Ivanishin exercises on the CEVIS in the U.S. Laboratory

    NASA Image and Video Library

    2011-12-10

    ISS030-E-012738 (10 Dec. 2011) --- Russian cosmonaut Anatoly Ivanishin, Expedition 30 flight engineer, exercises on the Cycle Ergometer with Vibration Isolation System (CEVIS) in the Destiny laboratory of the International Space Station.

  14. Writing Laboratory Exercises To Be Used with a Writing and Research Guide.

    ERIC Educational Resources Information Center

    Alicna, Elaine; And Others

    Intended to facilitate a broader emphasis on creative writing in American high school English classes, this manual offers a number of writing laboratory exercises. The exercises are divided into five categories: (1) library skills, including reference book know how, and using the parts of books; (2) critical reading skills, including…

  15. Coleman exercises on the CEVIS in the U.S. Laboratory

    NASA Image and Video Library

    2011-01-20

    ISS026-E-018823 (20 Jan. 2011) --- NASA astronaut Catherine (Cady) Coleman, Expedition 26 flight engineer, exercises on the Cycle Ergometer with Vibration Isolation System (CEVIS) in the Destiny laboratory of the International Space Station.

  16. Coleman exercises on the CEVIS in the U.S. Laboratory

    NASA Image and Video Library

    2011-01-20

    ISS026-E-018816 (20 Jan. 2011) --- NASA astronaut Catherine (Cady) Coleman, Expedition 26 flight engineer, exercises on the Cycle Ergometer with Vibration Isolation System (CEVIS) in the Destiny laboratory of the International Space Station.

  17. Coleman exercises on the CEVIS in the U.S. Laboratory

    NASA Image and Video Library

    2011-01-20

    ISS026-E-018821 (20 Jan. 2011) --- NASA astronaut Catherine (Cady) Coleman, Expedition 26 flight engineer, exercises on the Cycle Ergometer with Vibration Isolation System (CEVIS) in the Destiny laboratory of the International Space Station.

  18. The association between cyber victimization and subsequent cyber aggression: the moderating effect of peer rejection.

    PubMed

    Wright, Michelle F; Li, Yan

    2013-05-01

    Adolescents experience various forms of strain in their lives that may contribute jointly to their engagement in cyber aggression. However, little attention has been given to this idea. To address this gap in the literature, the present longitudinal study examined the moderating influence of peer rejection on the relationship between cyber victimization at Time 1 (T1) and subsequent cyber aggression at Time 2 (T2; 6 months later) among 261 (150 girls) 6th, 7th, and 8th graders. Our findings indicated that both peer rejection and cyber victimization were related to T2 peer-nominated and self-reported cyber aggression, both relational and verbal, after controlling for gender and T1 cyber aggression. Furthermore, T1 cyber victimization was related more strongly to T2 peer-nominated and self-reported cyber aggression at higher levels of T1 peer rejection. These results extend previous findings regarding the relationship between peer rejection and face-to-face aggressive behaviors to the cyber context. In addition, our findings underscore the importance of utilizing multiple methods, such as peer-nomination and self-report, to assess cyber aggression in a school setting.

  19. Co-Simulation Platform For Characterizing Cyber Attacks in Cyber Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sadi, Mohammad A. H.; Ali, Mohammad Hassan; Dasgupta, Dipankar

    Smart grid is a complex cyber physical system containing a numerous and variety of sources, devices, controllers and loads. Communication/Information infrastructure is the backbone of the smart grid system where different grid components are connected with each other through this structure. Therefore, the drawbacks of the information technology related issues are also becoming a part of the smart grid. Further, smart grid is also vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and OPNET based co-simulated test bed to carry out a cyber-intrusion inmore » a cyber-network for modern power systems and smart grid. The effect of the cyber intrusion on the physical power system is also presented. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack in the cyber network. Different disturbance situations in the proposed test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less

  20. Are Your Cells Pregnant? Relating Biology Laboratory Exercises to Everyday Life.

    ERIC Educational Resources Information Center

    Rhodes, Simon J.; Banner, Lisa R.

    2001-01-01

    Presents a laboratory exercise that allows students to investigate the principles of hormone release from endocrine cells, which is highly relevant to students' everyday lives. (Contains 17 references.) (ASK)

  1. A Pollutant Transformation Laboratory Exercise for Environmental Chemistry: The Reduction of Nitrobenzenes by Anaerobic Solutions of Humic Acid

    ERIC Educational Resources Information Center

    Dunnivant, Frank M.; Reynolds, Mark-Cody

    2007-01-01

    The laboratory experiment, which acts as a capstone, integrated lecture-laboratory exercise involving solution preparation, pH buffers, [E[subscript]H] (reduction potential) buffers, organic reaction mechanisms, reaction kinetics, and instrumental analysis is presented. The students completing the lecture and laboratory exercises could gain a…

  2. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less

  3. Quantifying and measuring cyber resiliency

    NASA Astrophysics Data System (ADS)

    Cybenko, George

    2016-05-01

    Cyber resliency has become an increasingly attractive research and operational concept in cyber security. While several metrics have been proposed for quantifying cyber resiliency, a considerable gap remains between those metrics and operationally measurable and meaningful concepts that can be empirically determined in a scientific manner. This paper describes a concrete notion of cyber resiliency that can be tailored to meet specific needs of organizations that seek to introduce resiliency into their assessment of their cyber security posture.

  4. Using "Fremyella Diplosiphon" as a Model Organism for Genetics-Based Laboratory Exercises

    ERIC Educational Resources Information Center

    Montgomery, Beronda L.

    2011-01-01

    In this pilot study, a genetics-based laboratory exercise using the cyanobacterium Fremyella diplosiphon was developed and trialled with thirteen Natural Sciences undergraduates. Despite most students only having limited prior exposure to molecular genetics laboratory methods, this cohort confirmed that they were able to follow the protocol and…

  5. CRIS Cyber Range Lexicon Version 1.0

    DTIC Science & Technology

    2015-10-30

    Zachary Weber (MIT Lincoln Laboratory) Mr. Mike Wee (Cyber Test & Evaluation (T&E) Support Cell, TRMC/ Northrop Grumman ) Dr. David “Fuzzy” Wells (USPACOM) Mr. Bennett Wilson (NAVSEA GOV – CDSA, Damneck) ...11 Figure 4: Planes and Teams...the CRIS WG include, but are not limited to, Science & Technology (S&T) experimentation , Developmental and Operational Test and Evaluation (DT&E, OT

  6. Examining Cyber Command Structures

    DTIC Science & Technology

    2015-03-01

    domains, cyber, command and control, USCYBERCOM, combatant command, cyber force PAGES 65 16. PRICE CODE 17. SECURITY 18. SECURITY 19. SECURITY 20...USCYBERCOM, argue for the creation of a stand-alone cyber force.11 They claim that the military’s tradition-oriented and inelastic nature make the

  7. Cyber Workforce Retention

    DTIC Science & Technology

    2016-10-01

    movement to focus on cybersecurity in the private sector. The company has shared intelligence and resources on cyber threats, even going as far as...personnel and 1NX intelligence personnel as well as 14N intelligence officers and the 17D/S cyber operations officers who lead and manage Air Force...threat of cyber incidents, the burgeon- ing cost of doing business due to cybersecurity infiltrations, and corporate America’s / senior executives

  8. A Laboratory Exercise on Photoperiodic Changes in the Testes of the Mongolian Gerbil.

    ERIC Educational Resources Information Center

    Treagust, David F.; And Others

    1980-01-01

    A laboratory exercise using a gerbil is described for use in the high school biology class and in accordance with the National Science Teachers Association guidelines. The authors cite references that deal with current awareness of the moral status concerning animals. The exercise includes measurement and calculations. (SA)

  9. Cyber Power

    DTIC Science & Technology

    2010-05-01

    71 As we saw above, cyber criminals are also a significant current burden on the economy. Looking further ahead, as other states develop their...signed by 27 countries. But at- titudes may change over time if costs exceed benefits. For example, “Russian cyber - criminals no longer follow hands-off

  10. Focusing on the Hard parts: A Biomechanics Laboratory Exercise

    ERIC Educational Resources Information Center

    Fingerut, Jonathan; Orbe, Kristina; Flynn, Daniel; Habdas, Piotr

    2013-01-01

    As part of a biomechanics course aimed at both upper-division Biology and Physics majors, this laboratory exercise introduces students to the ingenious ways in which organisms vary the composition and form of support and defensive structures such as bone and shell to maximize their strength while minimizing the energetic cost needed to produce…

  11. A Cyber Security Self-Assessment Method for Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.

    2004-11-01

    A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is amore » digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.« less

  12. Impact of Alleged Russian Cyber Attacks

    DTIC Science & Technology

    2009-05-01

    security. 15. SUBJECT TERMS Cyber Security, Cyber Warfare , Estonia, Georgia, Russian Federation Cyber Strategy, Convention on Cybercrime, NATO Center...Federation ......................................................................................... 33  X.  The Future of Russian Cyber Warfare ................................................................... 39...Issue 15.09); Binoy Kampmark, Cyber Warfare Between Estonia And Russia, (Contemporary Review: Autumn, 2003), p 288-293; Jaak Aaviksoo, Address by the

  13. The Cyber War: Maintaining and Controlling the Key Cyber Terrain of the Cyberspace Domain

    DTIC Science & Technology

    2016-06-26

    solution strategy to assess options that will enable the commander to realize the Air Force’s cyber mission. Recommendations will be made that will...will present a solution to assist the JFC in achieving cyberspace dominance. Background In the modern world of advanced technology, control of...the solutions are: 1) timely identification of key cyber terrain, 2) accurate mapping of the cyber terrain, 3) defense of key cyber terrain, and 4

  14. Timing of cyber conflict

    PubMed Central

    Axelrod, Robert; Iliev, Rumen

    2014-01-01

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran’s nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide. PMID:24474752

  15. Timing of cyber conflict.

    PubMed

    Axelrod, Robert; Iliev, Rumen

    2014-01-28

    Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.

  16. "Making Kind Cool": Parents' Suggestions for Preventing Cyber Bullying and Fostering Cyber Kindness

    ERIC Educational Resources Information Center

    Cassidy, Wanda; Brown, Karen; Jackson, Margaret

    2012-01-01

    Cyber bullying among youth is rapidly becoming a global phenomenon, as educators, parents and policymakers grapple with trying to curtail this negative and sometimes devastating behavior. Since most cyber bullying emanates from the home computer, parents can play an important role in preventing cyber bullying and in fostering a kinder online…

  17. Students' framing of laboratory exercises using infrared cameras

    NASA Astrophysics Data System (ADS)

    Haglund, Jesper; Jeppsson, Fredrik; Hedberg, David; Schönborn, Konrad J.

    2015-12-01

    Thermal science is challenging for students due to its largely imperceptible nature. Handheld infrared cameras offer a pedagogical opportunity for students to see otherwise invisible thermal phenomena. In the present study, a class of upper secondary technology students (N =30 ) partook in four IR-camera laboratory activities, designed around the predict-observe-explain approach of White and Gunstone. The activities involved central thermal concepts that focused on heat conduction and dissipative processes such as friction and collisions. Students' interactions within each activity were videotaped and the analysis focuses on how a purposefully selected group of three students engaged with the exercises. As the basis for an interpretative study, a "thick" narrative description of the students' epistemological and conceptual framing of the exercises and how they took advantage of the disciplinary affordance of IR cameras in the thermal domain is provided. Findings include that the students largely shared their conceptual framing of the four activities, but differed among themselves in their epistemological framing, for instance, in how far they found it relevant to digress from the laboratory instructions when inquiring into thermal phenomena. In conclusion, the study unveils the disciplinary affordances of infrared cameras, in the sense of their use in providing access to knowledge about macroscopic thermal science.

  18. Cost Computations for Cyber Fighter Associate

    DTIC Science & Technology

    2015-05-01

    associate. Aberdeen Proving Ground (MD): Army Research Laboratory (US); in press. 2 Harman D, Brown S, Henz B, Marvel LM. A communication protocol... Harman , et al.2 A specific class called ListenThread was created for multithreaded listeners. When ListenThread is instantiated, it is passed a given...2. Harman D, Brown S, Henz B, Marvel LM. A communication protocol for CyAMS and the cyber associate interface. Aberdeen Proving Ground (MD): US Army

  19. A Survey of Cyber Ranges and Testbeds

    DTIC Science & Technology

    2013-10-01

    used in organisations is large and growing. The literature indicated that cyber test labs (not explicitly called CRs) have been developed for a... organisation requires a realistic training and proving ground to prepare and conduct military CNO. That is, they need a CR. Operational networks are... developed by the Pacific Northwest National Laboratory (PNNL) to simulate the network environment of many DoD organisations . Its main capabilities

  20. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    DTIC Science & Technology

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  1. Tactical Cyber: Building A Strategy For Cyber Support To Corps And Below

    DTIC Science & Technology

    Future U.S. Army cyber operations will need to be conducted jointly and at all echelons and must include both defensive and offensive components.1...The Army is now developing doctrine, concepts, and capabilities to conduct and support tactical cyber operations. We propose the following vision...statement: The Army will be able to employ organic cyber capabilities at the tactical echelon with dedicated personnel in support of tactical units while

  2. An inter- laboratory proficiency testing exercise for rabies diagnosis in Latin America and the Caribbean

    PubMed Central

    Clavijo, Alfonso; Freire de Carvalho, Mary H.; Orciari, Lillian A.; Velasco-Villa, Andres; Ellison, James A.; Greenberg, Lauren; Yager, Pamela A.; Green, Douglas B.; Vigilato, Marco A.; Cosivi, Ottorino; Del Rio-Vilas, Victor J.

    2017-01-01

    The direct fluorescent antibody test (DFA), is performed in all rabies reference laboratories across Latin America and the Caribbean (LAC). Despite DFA being a critical capacity in the control of rabies, there is not a standardized protocol in the region. We describe the results of the first inter-laboratory proficiency exercise of national rabies laboratories in LAC countries as part of the regional efforts towards dog-maintained rabies elimination in the American region. Twenty three laboratories affiliated to the Ministries of Health and Ministries of Agriculture participated in this exercise. In addition, the laboratories completed an online questionnaire to assess laboratory practices. Answers to the online questionnaire indicated large variability in the laboratories throughput, equipment used, protocols availability, quality control standards and biosafety requirements. Our results will inform actions to improve and harmonize laboratory rabies capacities across LAC in support for the regional efforts towards elimination of dog-maintained rabies. PMID:28369139

  3. A Responsive Cyber Risk Ecosystem

    DTIC Science & Technology

    2017-01-19

    UNCLASSIFIED - Distribution A: Approved for public release; distribution unlimited AIR FORCE CYBERWORX REPORT 16-003: A RESPONSIVE CYBER RISK...right problem to solve and find meaningful solutions by exploring a wide range of possible answers to the design problem. For the Responsive Cyber ...Risk Dashboard Design Project, CyberWorx brought together a design team of 25 participants from UASFA and Industry to explore how cyber risk to AF

  4. Glucose Transport in Cultured Animal Cells: An Exercise for the Undergraduate Cell Biology Laboratory

    ERIC Educational Resources Information Center

    Ledbetter, Mary Lee S.; Lippert, Malcolm J.

    2002-01-01

    Membrane transport is a fundamental concept that undergraduate students of cell biology understand better with laboratory experience. Formal teaching exercises commonly used to illustrate this concept are unbiological, qualitative, or intricate and time consuming to prepare. We have developed an exercise that uses uptake of radiolabeled nutrient…

  5. Cyber Deterrence and Stability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Goychayev, Rustam; Carr, Geoffrey A.; Weise, Rachel A.

    Throughout the 20th and early 21st centuries, deterrence and arms control have been cornerstones of strategic stability between the superpowers. However, the weaponization of the cyber realm by State actors and the multipolar nature of cyber conflict now undermines that stability. Strategic stability is the state in which nations believe that if they act aggressively to undermine U.S. national interests and the post-World War II liberal democratic order, the consequences will outweigh the benefits. The sense of lawlessness and lack of consequences in the cyber realm embolden States to be more aggressive in taking actions that undermine stability. Accordingly, thismore » paper examines 1) the role of deterrence and arms control in securing cyber stability, and 2) the limitations and challenges associated with these traditional national security paradigms as applied to this emerging threat domain. This paper demonstrates that many 20th-century deterrence and arms control concepts are not particularly applicable in the cyber realm. However, they are not entirely irrelevant. The United States can distill lessons learned from this rich deterrence and arms control experience to develop and deploy a strategy to advance cyber stability.« less

  6. An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems

    NASA Astrophysics Data System (ADS)

    Hieb, Jeffrey; Graham, James; Guan, Jian

    This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.

  7. Establishing a Cyber Warrior Force

    DTIC Science & Technology

    2004-09-01

    Cyber Warfare is widely touted to be the next generation of warfare. As America’s reliance on automated systems and information technology increases...so too does the potential vulnerability to cyber attack. Nation and non-nation states are developing the capability to wage cyber warfare . Historically

  8. Cyber Asynchronous versus Blended Cyber Approach in Distance English Learning

    ERIC Educational Resources Information Center

    Ge, Zi-Gang

    2012-01-01

    This study aims to compare the single cyber asynchronous learning approach with the blended cyber learning approach in distance English education. Two classes of 70 students participated in this study, which lasted one semester of about four months, with one class using the blended approach for their English study and the other only using the…

  9. Some of Indonesian Cyber Law Problems

    NASA Astrophysics Data System (ADS)

    Machmuddin, D. D.; Pratama, B.

    2017-01-01

    Cyber regulation is very important to control human interaction within the Internet network in cyber space. On the surface, innovation development in science and technology facilitates human activity. But on the inside, innovation was controlled by new business model. In cyber business activities mingle with individual protection. By this condition, the law should keep the balance of the activities. Cyber law problems, were not particular country concern, but its global concern. This is a good opportunity for developing country to catch up with developed country. Beside this opportunity for talented people in law and technology is become necessity. This paper tries to describe cyber law in Indonesia. As a product of a developing country there are some of weakness that can be explained. Terminology and territory of cyber space is become interesting to discuss, because this two problems can give a broad view on cyber law in Indonesia.

  10. A Laboratory Exercise Relating Soil Energy Budgets to Soil Temperature

    ERIC Educational Resources Information Center

    Koenig, Richard T.; Cerny-Koenig, Teresa; Kotuby-Amacher, Janice; Grossl, Paul R.

    2008-01-01

    Enrollment by students in degree programs other than traditional horticulture, agronomy, and soil science has increased in basic plant and soil science courses. In order to broaden the appeal of these courses to students from majors other than agriculture, we developed a hands-on laboratory exercise relating the basic concepts of a soil energy…

  11. Evaluating a College-Prep Laboratory Exercise for Teenaged Homeschool Students in a University Setting

    ERIC Educational Resources Information Center

    Hercules, Daniel A.; Parrish, Cameron A.; Whitehead, Daniel C.

    2016-01-01

    We devised a half-day laboratory exercise for a group of 10th grade homeschooled students enrolled in an honors-level high school general chemistry course organized by a collective of homeschooling families associated with local Christian churches. Anecdotal evidence suggested that the students met the learning objectives of the exercise. The…

  12. Developing Standard Exercises and Statistics to Measure the Impact of Cyber Defenses

    DTIC Science & Technology

    2014-06-01

    partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN CYBER SYSTEMS AND OPERATIONS from the NAVAL POSTGRADUATE...attributed to insurers’ lack of experience with a new kind of risk, combined with insufficient actuarial data hindering competitive pricing.” Thus, it is...event. This “lack of actuarial data,” as will be seen later, is not just missing in insurance models—it is indeed the missing piece in the cost

  13. Coming Soon: More Cyber Careers?

    Science.gov Websites

    exploring the possibility of creating a cyber career field for Army civilians," Lt. Gen. Edward C Programs and Posture," April 14. Establishing a cyber career management field for civilians may be working to implement a cyber career management field for enlisted personnel that will encompass accessions

  14. Leaf Degradation, Macroinvertebrate Shredders & Energy Flow in Streams: A Laboratory-Based Exercise Examining Ecosystem Processes

    ERIC Educational Resources Information Center

    Sparkes, Timothy C.; Mills, Colleen M.; Volesky, Lisa; Talkington, Jennifer; Brooke, Joanna

    2008-01-01

    A laboratory-based exercise that demonstrates mechanisms underlying leaf degradation in streams. Students examine the effects of "leaf conditioning" on the feeding behavior of invertebrate shredders. The exercise is completed in two sessions and can be adapted to both high school and college levels.

  15. Food Microbiology--Design and Testing of a Virtual Laboratory Exercise

    ERIC Educational Resources Information Center

    Flint, Steve; Stewart, Terry

    2010-01-01

    A web-based virtual laboratory exercise in identifying an unknown microorganism was designed for use with a cohort of 3rd-year university food-technology students. They were presented with a food-contamination case, and then walked through a number of diagnostic steps to identify the microorganism. At each step, the students were asked to select 1…

  16. A Laboratory Exercise for Genotyping Two Human Single Nucleotide Polymorphisms

    ERIC Educational Resources Information Center

    Fernando, James; Carlson, Bradley; LeBard, Timothy; McCarthy, Michael; Umali, Finianne; Ashton, Bryce; Rose, Ferrill F., Jr.

    2016-01-01

    The dramatic decrease in the cost of sequencing a human genome is leading to an era in which a wide range of students will benefit from having an understanding of human genetic variation. Since over 90% of sequence variation between humans is in the form of single nucleotide polymorphisms (SNPs), a laboratory exercise has been devised in order to…

  17. The impact of collaborative groups versus individuals in undergraduate inquiry-based astronomy laboratory learning exercises

    NASA Astrophysics Data System (ADS)

    Sibbernsen, Kendra J.

    One of the long-standing general undergraduate education requirements common to many colleges and universities is a science course with a laboratory experience component. One of the objectives frequently included in the description of most of these courses is that a student will understand the nature and processes of scientific inquiry. However, recent research has shown that learners in traditional undergraduate science laboratory environments are not developing a sufficiently meaningful understanding of scientific inquiry. Recently, astronomy laboratory activities have been developed that intentionally scaffold a student from guided activities to open inquiry ones and preliminary results show that these laboratories are successful for supporting students to understand the nature of scientific inquiry (Slater, S., Slater, T. F., & Shaner, 2008). This mixed-method quasi-experimental study was designed to determine how students in an undergraduate astronomy laboratory increase their understanding of inquiry working in relative isolation compared to working in small collaborative learning groups. The introductory astronomy laboratory students in the study generally increased their understanding of scientific inquiry over the course of the semester and this held true similarly for students working in groups and students working individually in the laboratories. This was determined by the examining the change in responses from the pretest to the posttest administration of the Views of Scientific Inquiry (VOSI) survey, the increase in scores on laboratory exercises, and observations from the instructor. Because the study was successful in determining that individuals in the astronomy laboratory do as well at understanding inquiry as those who complete their exercises in small groups, it would be appropriate to offer these inquiry-based exercises in an online format.

  18. Evaluation of cardiovascular risk-lowering health benefits accruing from laboratory-based, community-based and exercise-referral exercise programmes.

    PubMed

    Webb, R; Thompson, J E S; Ruffino, J-S; Davies, N A; Watkeys, L; Hooper, S; Jones, P M; Walters, G; Clayton, D; Thomas, A W; Morris, K; Llewellyn, D H; Ward, M; Wyatt-Williams, J; McDonnell, B J

    2016-01-01

    To evaluate the ability of community-based exercise programmes to facilitate public participation in exercise and hence improved cardiovascular health, we assessed the respective impacts of: a continuously monitored exercise programme based within our university (study 1); a Valleys Regional Park-facilitated community-based outdoor exercise programme (study 2); a Wales National Exercise Referral Scheme-delivered exercise-referral programme (study 3). Biomolecular (monocytic PPARγ target gene expression), vascular haemodynamic (central/peripheral blood pressure, arterial stiffness), clinical (insulin sensitivity, blood lipids) and anthropometric (body mass index, waist circumference, heart rate) parameters were investigated using RT-PCR, applanation tonometry, chemical analysis and standard anthropometric techniques. In studies 1-3, 22/28, 32/65 and 11/14 participants adhered to their respective exercise programmes, and underwent significant increases in physical activity levels. Importantly, beneficial effects similar to those seen in our previous studies (eg, modulations in expression of monocytic PPARγ target genes, decreases in blood pressure/arterial stiffness, improvements in blood lipids/insulin sensitivity) were observed (albeit to slightly differing extents) only in participants who adhered to their respective exercise programmes. While study 1 achieved more intense exercise and more pronounced beneficial effects, significant cardiovascular risk-lowering health benefits related to biomolecular markers, blood pressure, arterial stiffness and blood lipids were achieved via community/referral-based delivery modes in studies 2 and 3. Because cardiovascular health benefits were observed in all 3 studies, we conclude that the majority of benefits previously reported in laboratory-based studies can also be achieved in community-based/exercise-referral settings. These findings may be of use in guiding policymakers with regard to introduction and/or continued

  19. Cyber Power in the 21st Century

    DTIC Science & Technology

    2008-12-01

    Cyber Warfare .................................................................86 V. Conclusions and Recommendations...40 2 – Asymmetric Effects of Cyber Warfare ........................................................................41 1 CYBER POWER... cyber warfare capabilities with other elements of national power, as evidenced by the concept of “informationization” (xinxihua) put forward in

  20. GHSI Emergency Radionuclide Bioassay Laboratory Network - Summary of the Second Exercise

    PubMed Central

    Li, Chunsheng; Bartizel, Christine; Battisti, Paolo; Böttger, Axel; Bouvier, Céline; Capote-Cuellar, Antonio; Carr, Zhanat; Hammond, Derek; Hartmann, Martina; Heikkinen, Tarja; Jones, Robert L.; Kim, Eunjoo; Ko, Raymond; Koga, Roberto; Kukhta, Boris; Mitchell, Lorna; Morhard, Ryan; Paquet, Francois; Quayle, Debora; Rulik, Petr; Sadi, Baki; Sergei, Aleksanin; Sierra, Inmaculada; de Oliveira Sousa, Wanderson; Szabó, Gyula

    2017-01-01

    The Global Health Security Initiative (GHSI) established a laboratory network within the GHSI community to develop collective surge capacity for radionuclide bioassay in response to a radiological or nuclear emergency as a means of enhancing response capability, health outcomes and community resilience. GHSI partners conducted an exercise in collaboration with the WHO REMPAN (Radiation Emergency Medical Preparedness and Assistance Network) and the IAEA RANET (Response and Assistance Network), to test the participating laboratories (18) for their capabilities in in vitro assay of biological samples, using a urine sample spiked with multiple high-risk radionuclides (90Sr, 106Ru, 137Cs, and 239Pu). Laboratories were required to submit their reports within 72 hours following receipt of the sample, using a pre-formatted template, on the procedures, methods and techniques used to identify and quantify the radionuclides in the sample, as well as the bioassay results with a 95% confidence interval. All of the participating laboratories identified and measured all or some of the radionuclides in the sample. However, gaps were identified in both the procedures used to assay multiple radionuclides in one sample, as well as in the methods or techniques used to assay specific radionuclides in urine. Two third of the participating laboratories had difficulties in determining all the radionuclides in the sample. Results from this exercise indicate that challenges remain with respect to ensuring that results are delivered in a timely, consistent and reliable manner to support medical interventions. Laboratories within the networks are encouraged to work together to develop and maintain collective capabilities and capacity for emergency bioassay, which is an important component of radiation emergency response. PMID:27574317

  1. Emulytics for Cyber-Enabled Physical Attack Scenarios: Interim LDRD Report of Year One Results.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clem, John; Urias, Vincent; Atkins, William Dee

    Sandia National Laboratories has funded the research and development of a new capability to interactively explore the effects of cyber exploits on the performance of physical protection systems. This informal, interim report of progress summarizes the project’s basis and year one (of two) accomplishments. It includes descriptions of confirmed cyber exploits against a representative testbed protection system and details the development of an emulytics capability to support live, virtual, and constructive experiments. This work will support stakeholders to better engineer, operate, and maintain reliable protection systems.

  2. Using agility to combat cyber attacks.

    PubMed

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  3. CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE OFFENSIVE USE OF CYBER

    DTIC Science & Technology

    2015-10-01

    AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY CYBER WARFARE GOVERNANCE: EVALUATION OF CURRENT INTERNATIONAL AGREEMENTS ON THE...order to prevent catastrophic second and third order effects. Rule 43 “prohibits means or methods of cyber warfare that indiscriminate by nature...Means and methods of cyber warfare are indiscriminate by nature if they cannot be: directed at a specific military objective, or limited in their

  4. Human Capital Development - Resilient Cyber Physical Systems

    DTIC Science & Technology

    2017-09-29

    Human Capital Development – Resilient Cyber Physical Systems Technical Report SERC-2017-TR-113 September 29, 2017 Principal Investigator...4.2.2 Cyber Attack Taxonomy for Cyber Physical Systems .............................................................................. 43 4.2.3...Cyber- physical System Attack Taxonomy ................................................................................................ 44 4.2.4

  5. Offensive Cyber Capability: Can it Reduce Cyberterrorism

    DTIC Science & Technology

    2010-12-02

    33 Lech J. Janczewski, and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism (New York: Information Science Reference, 2008...Science and Business Media, 2008. Janczewski, Lech , J. and Andrew M. Colarik, eds., Cyber Warfare and Cyber Terrorism. New York: Information Science

  6. Cyber warfare: Armageddon in a Teacup?

    DTIC Science & Technology

    2009-12-11

    Security concerns over the growing capability of Cyber Warfare are in the forefront of national policy and security discussions. In order to enable a...realistic discussion of the topic this thesis seeks to analyze demonstrated Cyber Warfare capability and its ability to achieve strategic political...objectives. This study examines Cyber Warfare conducted against Estonia in 2007, Georgia in 2008, and Israel in 2008. In all three cases Cyber Warfare did

  7. Animal Galloping and Human Hopping: An Energetics and Biomechanics Laboratory Exercise

    ERIC Educational Resources Information Center

    Lindstedt, Stan L.; Mineo, Patrick M.; Schaeffer, Paul J.

    2013-01-01

    This laboratory exercise demonstrates fundamental principles of mammalian locomotion. It provides opportunities to interrogate aspects of locomotion from biomechanics to energetics to body size scaling. It has the added benefit of having results with robust signal to noise so that students will have success even if not "meticulous" in…

  8. On Cyber Warfare Command and Control Systems

    DTIC Science & Technology

    2004-06-01

    longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare , and... warfare . This causes security devices to be used ineffectively and responses to be untimely. Cyber warfare then becomes a one-sided battle where the... cyber warfare strategy and tactics requires a cyber warfare command and control system. Responses to cyber attacks do not require offensive measures

  9. Students' Cognitive Focus during a Chemistry Laboratory Exercise: Effects of a Computer-Simulated Prelab

    ERIC Educational Resources Information Center

    Winberg, T. Mikael; Berg, C. Anders R.

    2007-01-01

    To enhance the learning outcomes achieved by students, learners undertook a computer-simulated activity based on an acid-base titration prior to a university-level chemistry laboratory activity. Students were categorized with respect to their attitudes toward learning. During the laboratory exercise, questions that students asked their assistant…

  10. Use of CYBER 203 and CYBER 205 computers for three-dimensional transonic flow calculations

    NASA Technical Reports Server (NTRS)

    Melson, N. D.; Keller, J. D.

    1983-01-01

    Experiences are discussed for modifying two three-dimensional transonic flow computer programs (FLO 22 and FLO 27) for use on the CDC CYBER 203 computer system. Both programs were originally written for use on serial machines. Several methods were attempted to optimize the execution of the two programs on the vector machine: leaving the program in a scalar form (i.e., serial computation) with compiler software used to optimize and vectorize the program, vectorizing parts of the existing algorithm in the program, and incorporating a vectorizable algorithm (ZEBRA I or ZEBRA II) in the program. Comparison runs of the programs were made on CDC CYBER 175. CYBER 203, and two pipe CDC CYBER 205 computer systems.

  11. Cyber-Herding and Cyber Activism: Countering Qutbists on the Internet

    DTIC Science & Technology

    2007-12-01

    13 f. Phase 6, Concentrate Web Sites ..........14 g. Phase 7, Develop Darknet ................16 B. CYBER ACTIVISM...continues in Phase 3 with the introduction of web sites owned by the cyber herding program and later on with the introduction of Darknets . The...own doppelganger.) Create several content-rich Darknet environments—a private virtual network where users connect only to people they trust8—that

  12. Merging of Research and Teaching in Developmental Biology: Adaptation of Current Scientific Research Papers for Use in Undergraduate Laboratory Exercises

    ERIC Educational Resources Information Center

    Lee, H. H.; and others

    1970-01-01

    Describes two laboratory exercises adopted from current research papers for use in an undergraduate developmental biology course. Gives methods, summary of student results, and student comments. Lists lecture topics, text and reprint assignments, and laboratory exercises for course. (EB)

  13. How to Generate Understanding of the Scientific Process in Introductory Biology: A Student-Designed Laboratory Exercise on Yeast Fermentation

    ERIC Educational Resources Information Center

    Collins, Linda T.; Bell, Rebekah P.

    2004-01-01

    Heavy faculty teaching loads and limited funds biology teachers designed certain objectives in order to increase the understandability of the subject matter of the laboratory exercises they write. In relation to these objectives an old "cookbook" laboratory exercise on yeast fermentation is introduced which involve students asking questions,…

  14. Are Chicken Embryos Endotherms or Ectotherms? A Laboratory Exercise Integrating Concepts in Thermoregulation and Metabolism

    ERIC Educational Resources Information Center

    Hiebert, Sara M; Noveral, Jocelyne

    2007-01-01

    This investigative laboratory exercise uses the different relations between ambient temperature and metabolic rate in endotherms and ectotherms as a core concept to answer the following question: What thermoregulatory mode is employed by chicken embryos? Emphasis is placed on the physiological concepts that can be taught with this exercise,…

  15. USAF Cyber Capability Development: A Vision for Future Cyber Warfare & a Concept for Education of Cyberspace Leaders

    DTIC Science & Technology

    2009-04-01

    Significant and interrelated problems are hindering the Air Force’s development of cyber warfare capabilities. The first is a lack of awareness about...why the AF has chosen to take cyber warfare on as a core capability on par with air and space. The second stems from the lack of a commonly...the cyber capabilities needed in the future? The contributions of this research include a strategic vision for future cyber warfare capabilities that

  16. Cyber / Physical Security Vulnerability Assessment Integration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Simpkins, Bret E.

    Abstract Both physical protection and cyber security domains offer solutions for the discovery of vulnerabilities through the use of various assessment processes and software tools. Each vulnerability assessment (VA) methodology provides the ability to identify and categorize vulnerabilities, and quantifies the risks within their own areas of expertise. Neither approach fully represents the true potential security risk to a site and/or a facility, nor comprehensively assesses the overall security posture. The technical approach to solving this problem was to identify methodologies and processes that blend the physical and cyber security assessments, and develop tools to accurately quantify the unaccounted formore » risk. SMEs from both the physical and the cyber security domains developed the blending methodologies, and cross trained each other on the various aspects of the physical and cyber security assessment processes. A local critical infrastructure entity volunteered to host a proof of concept physical/cyber security assessment, and the lessons learned have been leveraged by this effort. The four potential modes of attack an adversary can use in approaching a target are; Physical Only Attack, Cyber Only Attack, Physical Enabled Cyber Attack, and the Cyber Enabled Physical Attack. The Physical Only and the Cyber Only pathway analysis are two of the most widely analyzed attack modes. The pathway from an off-site location to the desired target location is dissected to ensure adversarial activity can be detected and neutralized by the protection strategy, prior to completion of a predefined task. This methodology typically explores a one way attack from the public space (or common area) inward towards the target. The Physical Enabled Cyber Attack and the Cyber Enabled Physical Attack are much more intricate. Both scenarios involve beginning in one domain to affect change in the other, then backing outward to take advantage of the reduced system effectiveness

  17. Cyber Warfare as an Operational Fire

    DTIC Science & Technology

    2010-04-03

    This paper explores cyber warfare as an option for creating operational fires effects. Initially, cyberspace is defined and explained from the...fires are defined and the advantages of their use are explained. From there, discussion focuses on how cyber warfare fulfills the purposes of...operational fires. Finally, the paper draws conclusions about the viability of cyber warfare as an operational fire and makes recommendations about how to prioritize the activities of the newly approved U.S. Cyber Command.

  18. Electronic Warfare for Cyber Warriors

    DTIC Science & Technology

    2008-06-01

    This research paper provides complete course content for the AFIT EENG 509, Electronic Warfare class. It is intended as a replacement for the existing course and designed for Intermediate Developmental Education (IDE) students in the Cyber Warfare degree program. This course provides relevant academic courseware and study material to give cyber warriors an academic and operational perspective on electronic warfare and its integration in the cyber domain.

  19. Special Operations And Cyber Warfare

    DTIC Science & Technology

    2016-12-01

    with the high level of Soldier competency in the 95th for CA Soldiers to retrain and fulfill the cyber requirement. With the reorganization of the...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. SPECIAL OPERATIONS AND CYBER...OPERATIONS AND CYBER WARFARE 5. FUNDING NUMBERS 6. AUTHOR(S) Jason C. Tebedo 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School

  20. Cyber Operations: The New Balance

    DTIC Science & Technology

    2009-01-01

    compelling evidence to suggest that enlight - enment, rather than retrenchment, is the path for cyber New Balance. The economic calamity of the Great...www.guardian.co.uk/ technology /2008/ oct/02/interviews.internet>. 16 Langevin, 11. 17 James Lewis, “Cyber Security Recommen- dations for the Next...Administration,” testimony before House Subcommittee on Emerging Threats, Cyber Security, and Science and Technology , Washington, DC, September 16

  1. GHSI EMERGENCY RADIONUCLIDE BIOASSAY LABORATORY NETWORK - SUMMARY OF THE SECOND EXERCISE.

    PubMed

    Li, Chunsheng; Bartizel, Christine; Battisti, Paolo; Böttger, Axel; Bouvier, Céline; Capote-Cuellar, Antonio; Carr, Zhanat; Hammond, Derek; Hartmann, Martina; Heikkinen, Tarja; Jones, Robert L; Kim, Eunjoo; Ko, Raymond; Koga, Roberto; Kukhta, Boris; Mitchell, Lorna; Morhard, Ryan; Paquet, Francois; Quayle, Debora; Rulik, Petr; Sadi, Baki; Sergei, Aleksanin; Sierra, Inmaculada; de Oliveira Sousa, Wanderson; Szab, Gyula

    2017-05-01

    The Global Health Security Initiative (GHSI) established a laboratory network within the GHSI community to develop collective surge capacity for radionuclide bioassay in response to a radiological or nuclear emergency as a means of enhancing response capability, health outcomes and community resilience. GHSI partners conducted an exercise in collaboration with the WHO Radiation Emergency Medical Preparedness and Assistance Network and the IAEA Response and Assistance Network, to test the participating laboratories (18) for their capabilities in in vitro assay of biological samples, using a urine sample spiked with multiple high-risk radionuclides (90Sr, 106Ru, 137Cs, and 239Pu). Laboratories were required to submit their reports within 72 h following receipt of the sample, using a pre-formatted template, on the procedures, methods and techniques used to identify and quantify the radionuclides in the sample, as well as the bioassay results with a 95% confidence interval. All of the participating laboratories identified and measured all or some of the radionuclides in the sample. However, gaps were identified in both the procedures used to assay multiple radionuclides in one sample, as well as in the methods or techniques used to assay specific radionuclides in urine. Two-third of the participating laboratories had difficulties in determining all the radionuclides in the sample. Results from this exercise indicate that challenges remain with respect to ensuring that results are delivered in a timely, consistent and reliable manner to support medical interventions. Laboratories within the networks are encouraged to work together to develop and maintain collective capabilities and capacity for emergency bioassay, which is an important component of radiation emergency response. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. The efficacy of unsupervised home-based exercise regimens in comparison to supervised laboratory-based exercise training upon cardio-respiratory health facets.

    PubMed

    Blackwell, James; Atherton, Philip J; Smith, Kenneth; Doleman, Brett; Williams, John P; Lund, Jonathan N; Phillips, Bethan E

    2017-09-01

    Supervised high-intensity interval training (HIIT) can rapidly improve cardiorespiratory fitness (CRF). However, the effectiveness of time-efficient unsupervised home-based interventions is unknown. Eighteen volunteers completed either: laboratory-HIIT (L-HIIT); home-HIIT (H-HIIT) or home-isometric hand-grip training (H-IHGT). CRF improved significantly in L-HIIT and H-HIIT groups, with blood pressure improvements in the H-IHGT group only. H-HIIT offers a practical, time-efficient exercise mode to improve CRF, away from the laboratory environment. H-IHGT potentially provides a viable alternative to modify blood pressure in those unable to participate in whole-body exercise. © 2017 The Authors. Physiological Reports published by Wiley Periodicals, Inc. on behalf of The Physiological Society and the American Physiological Society.

  3. Cyber security issues in online games

    NASA Astrophysics Data System (ADS)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  4. Reisman exercises on the CEVIS in the U.S. Laboratory during Expedition 17

    NASA Image and Video Library

    2008-05-11

    ISS017-E-006668 (11 May 2008) --- NASA astronaut Garrett Reisman, Expedition 17 flight engineer, exercises on the Cycle Ergometer with Vibration Isolation System (CEVIS) in the Destiny laboratory of the International Space Station.

  5. New Tools for Cyber Terrorism

    DTIC Science & Technology

    2010-12-01

    pharmaceutical formulas, and like data can reap huge profits for criminals” 8 . If cyber criminals are capable of these crimes imagine if Bin Laden could hire...and develops a framework to work with civilian agencies to combat cyber criminals and terrorists. The CNCI comprises of education, defensive...trillion dollars worth of intellectual property to data theft. It is quite obvious that if we don’t get a handle on cyber criminals it’s only a

  6. Building An Adaptive Cyber Strategy

    DTIC Science & Technology

    2016-06-01

    forces. The primary mission of the military in any domain, including cyber , should be readiness to exert force if needed during crisis . AU/ACSC/SMITH...of crisis . The military must be able to AU/ACSC/SMITH, FI/AY16 manipulate the cyber environment, but should avoid direct use of force against...operations focus on maintaining a manageable threat level. Cyberspace is a continually evolving domain, and nations throughout the world can join in cyber

  7. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  8. Cyber Operations and Cyber Terrorism

    DTIC Science & Technology

    2005-08-15

    available from http://www.geocities.com/ Area51 /Shadowlands/6583/project395.html; Internet; accessed 14 April 2004. DCSINT Handbook 1.02, Cyber...www.geocities.com/ Area51 /Shadowlands/6583/project395.html; Internet; Accessed 14 April 2004. Raufer, Xavier. “New World Disorder, New

  9. Kononenko exercises on the CEVIS in the U.S. Laboratory during Expedition 17

    NASA Image and Video Library

    2008-05-11

    ISS017-E-006662 (11 May 2008) --- Russian Federal Space Agency cosmonaut Oleg Kononenko, Expedition 17 flight engineer, exercises on the Cycle Ergometer with Vibration Isolation System (CEVIS) in the Destiny laboratory of the International Space Station.

  10. What good cyber resilience looks like.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  11. Cyber situational awareness and differential hardening

    NASA Astrophysics Data System (ADS)

    Dwivedi, Anurag; Tebben, Dan

    2012-06-01

    The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.

  12. Cyber Warfare: New Character with Strategic Results

    DTIC Science & Technology

    2013-03-01

    The advent of cyber warfare has sparked a debate amongst theorists as to whether timeless Clausewitzian principles remain true in the 21st century...Violence, uncertainty, and rationality still accurately depict the nature of cyber warfare , however, its many defining attributes and means by which...this style of warfare is conducted has definitively changed the character of war. Although cyber warfare is contested in the cyber domain, it often

  13. Security Informatics Research Challenges for Mitigating Cyber Friendly Fire

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carroll, Thomas E.; Greitzer, Frank L.; Roberts, Adam D.

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly re (FF). We dene cyber FF as intentional o*ensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission e*ectiveness of friendly or neutral forces. We describe examples of cyber FF and discuss how it ts within a general conceptual framework for cyber security failures. Because it involves human failure, cyber FF may be considered to belong to a sub-class of cyber security failures characterized as unintentional insider threats. Cyber FF is closelymore » related to combat friendly re in that maintaining situation awareness (SA) is paramount to avoiding unintended consequences. Cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and o*ensive countermeasures that may be applied to thwart network attacks. We describe a test bed designed to support empirical research on factors a*ecting cyber FF. Finally, we discuss mitigation strategies to combat cyber FF, including both training concepts and suggestions for decision aids and visualization approaches.« less

  14. Cyber Friendly Fire: Research Challenges for Security Informatics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Carroll, Thomas E.; Roberts, Adam D.

    This paper addresses cognitive implications and research needs surrounding the problem of cyber friendly fire (FF). We define cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintention-ally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, maintaining situation awareness (SA) is paramount to avoiding cyber FF incidents. Cyber SA concerns knowledge of a system’s topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components thatmore » comprise the system and its nodes, the nature of the activities or work performed, and the available defensive and offensive countermeasures that may be applied to thwart network attacks. Mitigation strategies to combat cyber FF— including both training concepts and suggestions for decision aids and visualization approaches—are discussed.« less

  15. Introducing Human Population Biology through an Easy Laboratory Exercise on Mitochondrial DNA

    ERIC Educational Resources Information Center

    Pardinas, Antonio F.; Dopico, Eduardo; Roca, Agustin; Garcia-Vazquez, Eva; Lopez, Belen

    2010-01-01

    This article describes an easy and cheap laboratory exercise for students to discover their own mitochondrial haplogroup. Students use buccal swabs to obtain mucosa cells as noninvasive tissue samples, extract DNA, and with a simple polymerase chain reaction-restriction fragment length polymorphism analysis they can obtain DNA fragments of…

  16. Operationalizing Army Cyber

    DTIC Science & Technology

    2013-03-01

    killed just under 3,000 people and cost the U.S. economy somewhere between three and five trillion dollars. The Japanese attacked with a state... economy , and military readiness. The challenge is to design an Army Cyber force that can support the United States Cyber Command (USCYBERCOM) national...still keeps the intelligence and signal functions separate in most units today from battalion to echelon above Corps ( EAC ). There are many past reasons

  17. Whitson exercises on the CEVIS in the U.S. Laboratory during Joint Operations

    NASA Image and Video Library

    2008-03-23

    S123-E-008961 (23 March 2008) --- Astronaut Peggy Whitson, Expedition 16 commander, exercises on the Cycle Ergometer with Vibration Isolation System (CEVIS) in the Destiny laboratory of the International Space Station while Space Shuttle Endeavour remains docked with the station.

  18. Pages - U.S. Fleet Cyber Command

    Science.gov Websites

    Links Expand Links : U.S. Fleet Cyber Command Help (new window) Site Help Page Content Website 2nd Banner.jpg Since its establishment on Jan. 29, 2010, U.S. Fleet Cyber Command (FCC)/U.S. TENTH Fleet (C10F civilians organized into 26 active commands, 40 Cyber Mission Force units, and 27 reserve commands around

  19. A Laboratory Exercise Using a Physical Model for Demonstrating Countercurrent Heat Exchange

    ERIC Educational Resources Information Center

    Loudon, Catherine; Davis-Berg, Elizabeth C.; Botz, Jason T.

    2012-01-01

    A physical model was used in a laboratory exercise to teach students about countercurrent exchange mechanisms. Countercurrent exchange is the transport of heat or chemicals between fluids moving in opposite directions separated by a permeable barrier (such as blood within adjacent blood vessels flowing in opposite directions). Greater exchange of…

  20. A Laboratory Exercise to Determine Human ABO Blood Type by Noninvasive Methods

    ERIC Educational Resources Information Center

    Martin, Michael P.; Detzel, Stephen M.

    2008-01-01

    Analysis of single-nucleotide polymorphisms and their association with diseases and nondisease phenotypes is of growing importance in human biology studies. In this laboratory exercise, students determine the genetic basis for their ABO blood type; however, no blood is drawn. Students isolate genomic DNA from buccal mucosa cells that are present…

  1. ARMY CYBER STRUCTURE ALIGNMENT

    DTIC Science & Technology

    2016-02-16

    Director of Navy Staff Vice Admiral J. M. Bird , Missions, Functions, and Tasks of Commander, U.S. Fleet Cyber Command and Commander, U.S. Tenth Fleet...www.doncio.navy.mil/ContentView.aspx?ID=649. Director of Navy Staff Vice Admiral J. M. Bird , Missions, Functions, and Tasks of Commander, U.S. Fleet Cyber

  2. Addressing Human Factors Gaps in Cyber Defense

    DTIC Science & Technology

    2016-09-23

    Factors Gaps in Cyber Defense 5a. CONTRACT NUMBER FA8650-14-D-6501-0009 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Alex... Cyber security is a high-ranking national priority that is only likely to grow as we become more dependent on cyber systems. From a research perspective...currently available work often focuses solely on technological aspects of cyber , acknowledging the human in passing, if at all. In recent years, the

  3. A cyber-event correlation framework and metrics

    NASA Astrophysics Data System (ADS)

    Kang, Myong H.; Mayfield, Terry

    2003-08-01

    In this paper, we propose a cyber-event fusion, correlation, and situation assessment framework that, when instantiated, will allow cyber defenders to better understand the local, regional, and global cyber-situation. This framework, with associated metrics, can be used to guide assessment of our existing cyber-defense capabilities, and to help evaluate the state of cyber-event correlation research and where we must focus our future cyber-event correlation research. The framework, based on the cyber-event gathering activities and analysis functions, consists of five operational steps, each of which provides a richer set of contextual information to support greater situational understanding. The first three steps are categorically depicted as increasingly richer and broader-scoped contexts achieved through correlation activity, while in the final two steps, these richer contexts are achieved through analytical activities (situation assessment, and threat analysis & prediction). Category 1 Correlation focuses on the detection of suspicious activities and the correlation of events from a single cyber-event source. Category 2 Correlation clusters the same or similar events from multiple detectors that are located at close proximity and prioritizes them. Finally, the events from different time periods and event sources at different location/regions are correlated at Category 3 to recognize the relationship among different events. This is the category that focuses on the detection of large-scale and coordinated attacks. The situation assessment step (Category 4) focuses on the assessment of cyber asset damage and the analysis of the impact on missions. The threat analysis and prediction step (Category 5) analyzes attacks based on attack traces and predicts the next steps. Metrics that can distinguish correlation and cyber-situation assessment tools for each category are also proposed.

  4. Space and Cyber: Shared Challenges, Shared Opportunities

    DTIC Science & Technology

    2011-11-15

    adversaries to have effective capabilities against networks and computer systems, unlike those anywhere else—here, cyber criminals , proxies for hire, and...or unintentional, conditions can impact our ability to use space and cyber capabilities. As the tools and techniques developed by cyber criminals continue

  5. The cyber threat, trophy information and the fortress mentality.

    PubMed

    Scully, Tim

    2011-10-01

    'It won't happen to me' is a prevalent mindset among senior executives in the private and public sectors when considering targeted cyber intrusions. This is exacerbated by the long-term adoption of a 'fortress mentality' towards cyber security, and by the attitude of many of our cyber-security professionals, who speak a different language when it comes to communicating cyber-security events to senior executives. The prevailing approaches to cyber security have clearly failed. Almost every week another serious, targeted cyber intrusion is reported, but reported intrusions are only the tip of the iceberg. Why have we got it so wrong? It must be acknowledged that cyber security is no longer the domain of cyber-security experts alone. Many more of us at various levels of leadership must understand, and be more deeply engaged in, the cyber-security challenge if we are to deal with the threat holistically and effectively. Governments cannot combat the cyber threat alone, particularly the so-called advanced persistent threat; they must work closely with industry as trusted partners. Industry will be the 'boots on the ground' in cyber security, but there are challenges to building this relationship, which must be based on sound principles.

  6. Protecting Networks Via Automated Defense of Cyber Systems

    DTIC Science & Technology

    2016-09-01

    autonomics, and artificial intelligence . Our conclusion is that automation is the future of cyber defense, and that advances are being made in each of...SUBJECT TERMS Internet of Things, autonomics, sensors, artificial intelligence , cyber defense, active cyber defense, automated indicator sharing...called Automated Defense of Cyber Systems, built upon three core technological components: sensors, autonomics, and artificial intelligence . Our

  7. Confronting the Pedagogical Challenge of Cyber Safety

    ERIC Educational Resources Information Center

    Hanewald, Ria

    2008-01-01

    Cyber violence and the antidote of cyber safety are fast becoming a global concern for governments, educational authorities, teachers, parents and children alike. Despite substantial funding for information dissemination on preventative strategies and the development of electronic responses to hinder perpetrators, the phenomenon of cyber violence…

  8. Joint Command and Control of Cyber Operations: The Joint Force Cyber Component Command (JFCCC)

    DTIC Science & Technology

    2012-05-04

    relies so heavily on complex command and control systems and interconnectivity in general, cyber warfare has become a serious topic of interest at the...defensive cyber warfare into current and future operations and plans. In particular, Joint Task Force (JTF) Commanders must develop an optimum method to

  9. The Power of Exercise and the Exercise of Power: The Harvard Fatigue Laboratory, Distance Running, and the Disappearance of Work, 1919-1947.

    PubMed

    Scheffler, Robin Wolfe

    2015-08-01

    In the early twentieth century, fatigue research marked an area of conflicting scientific, industrial, and cultural understandings of working bodies. These different understandings of the working body marked a key site of political conflict during the growth of industrial capitalism. Many fatigue researchers understood fatigue to be a physiological fact and allied themselves with Progressive-era reformers in urging industrial regulation. Opposed to these researchers were advocates of Taylorism and scientific management, who held that fatigue was a mental event and that productivity could be perpetually increased through managerial efficiency. Histories of this conflict typically cease with the end of the First World War, when it is assumed that industrial fatigue research withered away. This article extends the history of fatigue research through examining the activities of the Harvard Fatigue Laboratory in the 1920s and 1930s. The Laboratory developed sophisticated biochemical techniques to study the blood of exercising individuals. In particular, it found that exercising individuals could attain a biochemically "steady state," or equilibrium, and extrapolated from this to assert that fatigue was psychological, not physiological, in nature. In contrast to Progressive-era research, the Laboratory reached this conclusion through laboratory examination, not of industrial workers, but of Laboratory staff members and champion marathon runners. The translation of laboratory research to industrial settings, and the eventual erasure of physiological fatigue from discussions of labor, was a complex function of institutional settings, scientific innovation, and the cultural meanings of work and sport.

  10. Results of an inter and intra laboratory exercise on the assessment of complex autosomal DNA profiles.

    PubMed

    Benschop, Corina C G; Connolly, Edward; Ansell, Ricky; Kokshoorn, Bas

    2017-01-01

    The interpretation of complex DNA profiles may differ between laboratories and reporting officers, which can lead to discrepancies in the final reports. In this study, we assessed the intra and inter laboratory variation in DNA mixture interpretation for three European ISO17025-accredited laboratories. To this aim, 26 reporting officers analyzed five sets of DNA profiles. Three main aspects were considered: 1) whether the mixed DNA profiles met the criteria for comparison to a reference profile, 2) the actual result of the comparison between references and DNA profiling data and 3) whether the weight of the DNA evidence could be assessed. Similarity in answers depended mostly on the complexity of the tasks. This study showed less variation within laboratories than between laboratories which could be the result of differences between internal laboratory guidelines and methods and tools available. Results show the profile types for which the three laboratories report differently, which informs indirectly on the complexity threshold the laboratories employ. Largest differences between laboratories were caused by the methods available to assess the weight of the DNA evidence. This exercise aids in training forensic scientists, refining laboratory guidelines and explaining differences between laboratories in court. Undertaking more collaborative exercises in future may stimulate dialog and consensus regarding interpretation. For training purposes, DNA profiles of the mixed stains and questioned references are made available. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.

  11. Anaerobic threshold employed on exercise training prescription and performance assessment for laboratory rodents: A short review.

    PubMed

    Abreu, Phablo; Mendes, Sávio Victor Diogenes; Leal-Cardoso, José Henrique; Ceccatto, Vânia Marilande

    2016-04-15

    Several studies have generated numerous terms in the field of exercise training prescription and performance assessment that often do not match the information previously demonstrated by many other works, generating much debate and resulting in an immense pool of scientific results. Several protocols in exercise training prescription and performance assessment have been proposed for these purposes by many reasons. In the field of exercise science, the protocol must be thoroughly investigated and provide real tools to be reproducible. Many laboratories have been adapting and developing evaluation protocols and testing on physical training of rodents in different experimental conditions. In this context, mice, rats and rabbits are preferentially chosen due to easy manipulation and good response to exercise, and comparable at results obtained with humans in compatible effort intensities. But, the exercise training programs and aerobic-anaerobic transition assessment proposed for animal models vary extensively, depending on the species, gender, age, type of stimulus, type of exercise, type of method and also on the specific objectives of the program. This short review demonstrates the need in offering tools performed by invasive measurement to assess the anaerobic threshold by blood lactate employed on evolution of aerobic-anaerobic parameters of rodents. The objective of this short review was to present and to discuss physical evaluation protocols applications to rodents. The table submitted may give a basis for anaerobic threshold employed on exercise training prescription and performance assessment for laboratory rodents in future research. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Cyber Warfare: Protecting Military Systems

    DTIC Science & Technology

    2000-01-01

    Software is a key component in nearly every critical system used by the Department of Defense. Attacking the software in a system- cyber warfare - is a...revolutionary method of pursuing war. This article describes various cyber warfare approaches and suggests methods to counter them.

  13. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-21

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR...), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the... for all levels of government to complete a cyber network security assessment so that a full measure of...

  14. Index of cyber integrity

    NASA Astrophysics Data System (ADS)

    Anderson, Gustave

    2014-05-01

    Unfortunately, there is no metric, nor set of metrics, that are both general enough to encompass all possible types of applications yet specific enough to capture the application and attack specific details. As a result we are left with ad-hoc methods for generating evaluations of the security of our systems. Current state of the art methods for evaluating the security of systems include penetration testing and cyber evaluation tests. For these evaluations, security professionals simulate an attack from malicious outsiders and malicious insiders. These evaluations are very productive and are able to discover potential vulnerabilities resulting from improper system configuration, hardware and software flaws, or operational weaknesses. We therefore propose the index of cyber integrity (ICI), which is modeled after the index of biological integrity (IBI) to provide a holistic measure of the health of a system under test in a cyber-environment. The ICI provides a broad base measure through a collection of application and system specific metrics. In this paper, following the example of the IBI, we demonstrate how a multi-metric index may be used as a holistic measure of the health of a system under test in a cyber-environment.

  15. Cyber Victimization and Perceived Stress: Linkages to Late Adolescents' Cyber Aggression and Psychological Functioning

    ERIC Educational Resources Information Center

    Wright, Michelle F.

    2015-01-01

    The present study examined multiple sources of strain, particular cyber victimization, and perceived stress from parents, peers, and academics, in relation to late adolescents' (ages 16-18; N = 423) cyber aggression, anxiety, and depression, each assessed 1 year later (Time 2). Three-way interactions revealed that the relationship between Time 1…

  16. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  17. Cyber-Warfare: Jus Post Bellum

    DTIC Science & Technology

    2015-03-01

    used to design a cyber - warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided...and the ability to contain and reverse cyberattacks. This thesis proposes a cyber - warfare jus post bellum framework, with emphasis on prevention and

  18. Dietary Supplement Laboratory Quality Assurance Program: The First Five Exercises

    PubMed Central

    Phillips, Melissa M.; Rimmer, Catherine A.; Wood, Laura J.; Lippa, Katrice A.; Sharpless, Katherine E.; Duewer, David L.; Sander, Lane C.; Betz, Joseph M.

    2011-01-01

    The National Institute of Standards and Technology (NIST) has established a Dietary Supplement Laboratory Quality Assurance Program (DSQAP) in collaboration with the National Institutes of Health Office of Dietary Supplements. Program participants measure concentrations of active and/or marker compounds as well as nutritional and toxic elements in food and dietary supplements distributed by NIST. Data are compiled at NIST, where they are analyzed for accuracy relative to reference values and concordance among the participants. Performance reports and certificates of completion are provided to participants, which can be used to demonstrate compliance with current Good Manufacturing Practices as promulgated by the U.S. Food and Drug Administration. The DSQAP has conducted five exercises to date, with total participation including more than 75 different laboratories and many more individual analysts. PMID:21797008

  19. Development of JSDF Cyber Warfare Defense Critical Capability

    DTIC Science & Technology

    2010-03-01

    attack identification capability is essential for a nation to defend her vital infrastructures against offensive cyber warfare . Although the necessity of...cyber-attack identification capability is quite clear, the Japans preparation against cyber warfare is quite limited.

  20. Real-time laboratory exercises to test contingency plans for classical swine fever: experiences from two national laboratories.

    PubMed

    Koenen, F; Uttenthal, A; Meindl-Böhmer, A

    2007-12-01

    In order to adequately and efficiently handle outbreaks of contagious diseases such as classical swine fever (CSF), foot and mouth disease or highly pathogenic avian influenza, competent authorities and the laboratories involved have to be well prepared and must be in possession of functioning contingency plans. These plans should ensure that in the event of an outbreak access to facilities, equipment, resources, trained personnel, and all other facilities needed for the rapid and efficient eradication of the outbreak is guaranteed, and that the procedures to follow are well rehearsed. It is essential that these plans are established during 'peace-time' and are reviewed regularly. This paper provides suggestions on how to perform laboratory exercises to test preparedness and describes the experiences of two national reference laboratories for CSF. The major lesson learnt was the importance of a well-documented laboratory contingency plan. The major pitfalls encountered were shortage of space, difficulties in guaranteeing biosecurity and sufficient supplies of sterile equipment and consumables. The need for a standardised laboratory information management system, that is used by all those involved in order to reduce the administrative load, is also discussed.

  1. Discussing Cyber Ethics with Students Is Critical

    ERIC Educational Resources Information Center

    Kruger, Robert

    2003-01-01

    As computers become a larger part of the curriculum, educators everywhere are being asked to take a stand for cyber ethics, the right and wrong of computer and Internet use. Teachers cannot always depend on parents to instill cyber ethics. Parents may not know or follow the rules, either. Once students understand cyber ethics, they may have a…

  2. Cyber Children: What Parents Need to Know

    ERIC Educational Resources Information Center

    Roberts, Kevin J.

    2010-01-01

    Parents need to be aware of the dangers and the opportunities the cyber world offers. Video games are being used in the classroom. Commerce is increasingly taking place online and computers are indispensable in the workplace. A cyber-oriented child possesses some great advantages. The author urges parents to become experts in the cyber world so…

  3. Towards a Research Agenda for Cyber Friendly Fire

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.

    Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is tomore » examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.« less

  4. Greenbeards in Yeast: An Undergraduate Laboratory Exercise to Teach the Genetics of Cooperation

    ERIC Educational Resources Information Center

    Ågren, J. Arvid; Williamson, Robert J.; Campitelli, Brandon E.; Wheeler, Jill

    2017-01-01

    Recent years have seen a dramatic increase in our understanding of the social behaviour of microbes. Here, we take advantage of these developments to present an undergraduate laboratory exercise that uses the cooperative flocculating behaviour of yeast ("Saccharomyces sp.") to introduce the concept of inclusive fitness and teach the…

  5. BRI: Cyber Trust and Suspicion

    DTIC Science & Technology

    2017-06-06

    Basis for Trust and Suspicion: Manipulating Insider Threat In Cyber Intelligence & Operations: For 2013, the concepts of Predictability...1 THRUST 1 – A SOCIAL, CULTURAL, AND EMOTIONAL BASIS FOR TRUST AND SUSPICION: MANIPULATING INSIDER THREAT IN CYBER INTELLIGENCE ...APPROACH ......................................... 59 3.1 Cybersecurity with humans in the loop

  6. Cyber-Physical System Security of Smart Grids

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dagle, Jeffery E.

    2012-01-31

    Abstract—This panel presentation will provide perspectives of cyber-physical system security of smart grids. As smart grid technologies are deployed, the interconnected nature of these systems is becoming more prevalent and more complex, and the cyber component of this cyber-physical system is increasing in importance. Studying system behavior in the face of failures (e.g., cyber attacks) allows a characterization of the systems’ response to failure scenarios, loss of communications, and other changes in system environment (such as the need for emergent updates and rapid reconfiguration). The impact of such failures on the availability of the system can be assessed and mitigationmore » strategies considered. Scenarios associated with confidentiality, integrity, and availability are considered. The cyber security implications associated with the American Recovery and Reinvestment Act of 2009 in the United States are discussed.« less

  7. The psychological effects of cyber terrorism

    PubMed Central

    Gross, Michael L.; Canetti, Daphna; Vashdi, Dana R.

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism. PMID:28366962

  8. CYBER THREAT AWARENESS FOR THE WARFIGHTER

    DTIC Science & Technology

    2016-02-16

    Writing on the future of cyber warfare, Col William Poirier and Maj James Lotspeich posit that eventually advances in the Air Force’s cyber...Defending the Walls,” 3. 7 Col William J. Poirier and Maj James Lotspeich, “Air Force Cyber Warfare - Now and the Future,” Air and Space Power Journal 27...and Associated Terms, 8 November 2010. http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf. Poirier , Col William J., and Lotspeich, Maj James. “Air

  9. The psychological effects of cyber terrorism.

    PubMed

    Gross, Michael L; Canetti, Daphna; Vashdi, Dana R

    2016-01-01

    When ordinary citizens think of cyber threats, most are probably worried about their passwords and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as physical destruction, and our research has found that, depending on who the attackers and the victims are, the psychological effects of cyber threats can rival those of traditional terrorism.

  10. Realizing Scientific Methods for Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber securitymore » science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.« less

  11. Cyber Warfare: An Evolution in Warfare not Just War Theory

    DTIC Science & Technology

    2013-04-05

    cyber warfare is greatly debated. While some argue that Just War Theory is irrelevant to cyber warfare , a careful analysis demonstrates that it is a...useful tool for considering the morality of cyber warfare . This paper examines the application of Just War Theory to cyber warfare and contends that...Just War Theory is a useful tool for considering the morality of cyber warfare .

  12. Cyber Bullying and Academic Performance

    ERIC Educational Resources Information Center

    Faryadi, Qais

    2011-01-01

    This research investigates the emotional and physiological effects of cyber bullying on the university students. The primary objective of this investigation is to identify the victims of cyber bullying and critically analyze their emotional state and frame of mind in order to provide them with a workable and feasible intervention in fighting cyber…

  13. Use of a Laboratory Exercise on Molar Absorptivity to Help Students Understand the Authority of the Primary Literature

    ERIC Educational Resources Information Center

    Soundararajan, Madhavan; Bailey, Cheryl P.; Markwell, John

    2008-01-01

    To promote understanding of the authority of the primary literature in students taking our biochemistry laboratory courses, a biochemistry laboratory exercise on the determination of an acceptable molar absorptivity value of 2-nitrophenol (2-NP) was developed. This made the laboratory course much more relevant by linking to a thematic thread,…

  14. A Cyber-ITS Framework for Massive Traffic Data Analysis Using Cyber Infrastructure

    PubMed Central

    Fontaine, Michael D.

    2013-01-01

    Traffic data is commonly collected from widely deployed sensors in urban areas. This brings up a new research topic, data-driven intelligent transportation systems (ITSs), which means to integrate heterogeneous traffic data from different kinds of sensors and apply it for ITS applications. This research, taking into consideration the significant increase in the amount of traffic data and the complexity of data analysis, focuses mainly on the challenge of solving data-intensive and computation-intensive problems. As a solution to the problems, this paper proposes a Cyber-ITS framework to perform data analysis on Cyber Infrastructure (CI), by nature parallel-computing hardware and software systems, in the context of ITS. The techniques of the framework include data representation, domain decomposition, resource allocation, and parallel processing. All these techniques are based on data-driven and application-oriented models and are organized as a component-and-workflow-based model in order to achieve technical interoperability and data reusability. A case study of the Cyber-ITS framework is presented later based on a traffic state estimation application that uses the fusion of massive Sydney Coordinated Adaptive Traffic System (SCATS) data and GPS data. The results prove that the Cyber-ITS-based implementation can achieve a high accuracy rate of traffic state estimation and provide a significant computational speedup for the data fusion by parallel computing. PMID:23766690

  15. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE PAGES

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...

    2015-04-06

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  16. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  17. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    PubMed

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  18. A Cyber-ITS framework for massive traffic data analysis using cyber infrastructure.

    PubMed

    Xia, Yingjie; Hu, Jia; Fontaine, Michael D

    2013-01-01

    Traffic data is commonly collected from widely deployed sensors in urban areas. This brings up a new research topic, data-driven intelligent transportation systems (ITSs), which means to integrate heterogeneous traffic data from different kinds of sensors and apply it for ITS applications. This research, taking into consideration the significant increase in the amount of traffic data and the complexity of data analysis, focuses mainly on the challenge of solving data-intensive and computation-intensive problems. As a solution to the problems, this paper proposes a Cyber-ITS framework to perform data analysis on Cyber Infrastructure (CI), by nature parallel-computing hardware and software systems, in the context of ITS. The techniques of the framework include data representation, domain decomposition, resource allocation, and parallel processing. All these techniques are based on data-driven and application-oriented models and are organized as a component-and-workflow-based model in order to achieve technical interoperability and data reusability. A case study of the Cyber-ITS framework is presented later based on a traffic state estimation application that uses the fusion of massive Sydney Coordinated Adaptive Traffic System (SCATS) data and GPS data. The results prove that the Cyber-ITS-based implementation can achieve a high accuracy rate of traffic state estimation and provide a significant computational speedup for the data fusion by parallel computing.

  19. Moving Target Techniques: Cyber Resilience throught Randomization, Diversity, and Dynamism

    DTIC Science & Technology

    2017-03-03

    Moving Target Techniques: Cyber Resilience through Randomization, Diversity, and Dynamism Hamed Okhravi and Howard Shrobe Overview: The static...nature of computer systems makes them vulnerable to cyber attacks. Consider a situation where an attacker wants to compromise a remote system running... cyber resilience that attempts to rebalance the cyber landscape is known as cyber moving target (MT) (or just moving target) techniques. Moving target

  20. Cyber threats within civil aviation

    NASA Astrophysics Data System (ADS)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  1. Health implications of cyber-terrorism.

    PubMed

    Clem, A; Galwankar, Sagar; Buck, George

    2003-01-01

    The world is becoming ever more interconnected via the Internet, creating both benefits and disadvantages for human communities. This article examines cyber-terrorism, one of the major negative consequences of the Internet. It also examines the potential impact of cyber-terrorism on the health of populations, its possible perpetrators, and its prevention and control.

  2. The Penn State ``Cyber Wind Facility''

    NASA Astrophysics Data System (ADS)

    Brasseur, James; Vijayakumar, Ganesh; Lavely, Adam; Nandi, Tarak; Jayaraman, Balaji; Jha, Pankaj; Dunbar, Alex; Motta-Mena, Javier; Haupt, Sue; Craven, Brent; Campbell, Robert; Schmitz, Sven; Paterson, Eric

    2012-11-01

    We describe development and results from a first generation Penn State ``Cyber Wind Facility'' (CWF). The aim of the CWF program is to develop and validate a computational ``facility'' that, in the most powerful HPC environments, will be basis for the design and implementation of cyber ``experiments'' at a level of complexity, fidelity and resolution to be treated similarly to field experiments on wind turbines operating in true atmospheric environments. We see cyber experiments as complimentary to field experiments in the sense that, whereas field data can record over ranges of events not representable in the cyber environment, with sufficient resolution, numerical accuracy, and HPC power, it is theoretically possible to collect cyber data from more true, albeit canonical, atmospheric environments can produce data from extraordinary numbers of sensors impossible to obtain in the field. I will describe our first generation CWF, from which we have quantified and analyzed useful details of the interactions between atmospheric turbulence and wind turbine loadings for an infinitely stiff commercial-scale turbine rotor in a canonical convective daytime atmospheric boundary layer over horizontally homogeneous rough flat terrain. Supported by the DOE Offshore Initiative and the National Science Foundation.

  3. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.

    PubMed

    Albahar, Marwan

    2017-01-05

    In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.

  4. The Cyber Defense Review. Volume 1, Number 1, Spring 2016

    DTIC Science & Technology

    2016-04-20

    in the Land and Cyber Domains Lieutenant General Edward C. Cardon The U.S. Navy’s Evolving Cyber/ Cybersecurity Story Rear Admiral Nancy Norton...Olav Lysne Cyber Situational Awareness Maj. Gen. Earl D. Matthews, USAF, Ret Dr. Harold J. Arata III Mr. Brian L. Hale Is There a Cybersecurity ...Kallberg The Decision to Attack: Military and Intelligence Cyber Decision-Making by Dr. Aaron F. Brantly The Cyber Defense Review

  5. Strategic Impact of Cyber Warfare Rules for the United States

    DTIC Science & Technology

    2010-03-01

    Despite the growing complexities of cyberspace and the significant strategic challenge cyber warfare poses on the United States’ vital interests few...specific rules for cyber warfare exist. The United States should seek to develop and maintain cyber warfare rules in order to establish...exemplify the need for multilaterally prepared cyber warfare rules that will reduce the negative influence cyber warfare presently has on the United States’ national interests.

  6. Cyber Security Applications: Freeware & Shareware

    ERIC Educational Resources Information Center

    Rogers, Gary; Ashford, Tina

    2015-01-01

    This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…

  7. Remodeling Air Force Cyber Command and Control

    DTIC Science & Technology

    2017-10-10

    AIR FORCE CYBERWORX REPORT: REMODELING AIR FORCE CYBER COMMAND & CONTROL COURSE DESIGN PROJECT CONDUCTED 5 Jan – 5 May 17 Produced...For the Air Force Cyber Command and Control (C2) Design Project, CyberWorx brought together 25 cadets from the United States Air Force Academy...warfighting based upon the findings of the design teams. Participants The design course was attended by a diverse group of civilians from industry

  8. The U.S. Needs International Cyber Treaties

    DTIC Science & Technology

    2010-03-01

    formed to deal with issues surrounding cyber warfare . However, no major treaties between nations exist regarding this form of combat. Examining...the history of cyber warfare , the inadequate international response, the obstacles to international agreement, and poor U.S. readiness demonstrates...the current need for the U.S. to lead the effort to codify treaties. First, a brief history of cyber warfare helps to shed light on the international

  9. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force that...constantly keeping cyber warfare capabilities in pace with the technologies of the environment.This paper reaches these conclusions by first providing a

  10. Cyber Capabilities for Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    operations force, by treating cyber warfare capabilities in the same manner as it treats its other weapon systems. It argues that despite preconceptions of...As such, while automation is required, cyber warfare will be much more manpower intensive than is currently understood, and will require a force...constantly keeping cyber warfare capabilities in pace with the technologies of the environment. This paper reaches these conclusions by first providing a

  11. Software Acquisition in the Age of Cyber Warfare

    DTIC Science & Technology

    2011-05-01

    s c h o o l o f S Y S T E M S a n d L O G I S T I C S education service research Software Acquisition in the Age of Cyber Warfare Maj...DATE MAY 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Acquisition in the Age of Cyber Warfare 5a...AFIT Cyber 200/300 Courses Cyber Warfare IDE Program 34 Special Emphasis On… Enterprise Integration (Active Directory, PKI) Security

  12. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152 RTG

    DTIC Science & Technology

    2018-04-18

    Significant research is currently conducted on dynamic learning and threat detection. However, this work is held back by gaps in validation methods ...and network path rotation (e.g., Stream Splitting MTD). Agents can also employ various cyber-deception methods , including direct observation hiding...ARL-SR-0395 ● APR 2018 US Army Research Laboratory Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017

  13. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG

    DTIC Science & Technology

    2018-04-01

    Significant research is currently conducted on dynamic learning and threat detection. However, this work is held back by gaps in validation methods ...and network path rotation (e.g., Stream Splitting MTD). Agents can also employ various cyber-deception methods , including direct observation hiding...ARL-SR-0395 ● APR 2018 US Army Research Laboratory Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017

  14. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    ERIC Educational Resources Information Center

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  15. Predictors of willingness to use cyber counseling for college students with disabilities.

    PubMed

    Lan, Chu-Mei

    2016-04-01

    Cyber counseling is a new method for assisting people in coping with distress. People in Taiwan are more familiar with face-to-face counseling than with cyber counseling. Using computers is the most popular activity among college students with disabilities. Cyber counseling is effective for lessening client disturbance. Therefore, cyber counseling is an alternative to face-to-face counseling. This study measured the willingness of college students with disabilities to use cyber counseling to meet their mental health needs. In addition, the predictors of the willingness to use cyber counseling were explored. The subjects were college students with disabilities who were recruited from universities in Southern Taiwan through the Internet and in college counseling centers. A total of 214 structured questionnaires were collected and subsequently analyzed using SPSS Version 18.0 through stepwise regression for discovering the crucial predictors of the willingness of college students to use cyber counseling. The crucial predictors of the willingness of college students to use cyber counseling were cyber-counseling needs, the need for cyber-counseling methods (the need to use various cyber-counseling methods), a help-seeking attitude in cyber counseling, a hearing disorder, cyber counseling need for academic achievement, and grade level. The explained proportion of variance was 65.4%. The willingness of college students with disabilities to use cyber counseling was explained according to cyber-counseling needs, cyber-counseling attitudes, disease type, and grades. Based on the results, this study offers specific suggestions and future directions for research on cyber counseling for college students with disabilities. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. Cyber Security: A Road Map for Turkey

    DTIC Science & Technology

    2012-03-19

    Cyber warfare is a form of information warfare, sometimes seen as analogous to conventional warfare, among a range of potential actors, including...nation states, non-state groups, and a complex hybrid of conflict involving both state and non-state actors. Cyber warfare is a tool of national power...An entire nation s ability to operate and fight in the information age is vital toward survival. Nowadays, cyber warfare is mostly focused on

  17. A Communication Protocol for CyAMS and the Cyber Fighter Associate Interface

    DTIC Science & Technology

    2015-05-01

    by David Harman , Scott Brown, Brian Henz, and Lisa M Marvel Approved for public release; distribution unlimited...Laboratory A Communication Protocol for CyAMS and the Cyber Fighter Associate Interface by David Harman College Qualified Leaders Student...CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) David Harman , Scott Brown, Brian Henz, and Lisa M Marvel 5d. PROJECT

  18. Rumination mediates the association between cyber-victimization and depressive symptoms.

    PubMed

    Feinstein, Brian A; Bhatia, Vickie; Davila, Joanne

    2014-06-01

    The current study examined the 3-week prospective associations between cyber-victimization and both depressive symptoms and rumination. In addition, a mediation model was tested, wherein rumination mediated the association between cyber-victimization and depressive symptoms. Participants (N = 565 college-age young adults) completed online surveys at two time points 3 weeks apart. Results indicated that cyber-victimization was associated with increases in both depressive symptoms and rumination over time. Furthermore, results of the path analysis indicated that cyber-victimization was associated with increases in rumination over time, which were then associated with greater depressive symptoms, providing support for the proposed mediation effect for women, but not men. Findings extend previous correlational findings by demonstrating that cyber-victimization is associated with increases in symptomatology over time. Findings also suggest that the negative consequences of cyber-victimization extend beyond mental health problems to maladaptive emotion regulation. In fact, rumination may be a mechanism through which cyber-victimization influences mental health problems, at least for women. Mental health professionals are encouraged to assess cyber-victimization as part of standard victimization assessments and to consider targeting maladaptive emotion regulation in addition to mental health problems in clients who have experienced cyber-victimization.

  19. [Cyber-bullying in adolescents: associated psychosocial problems and comparison with school bullying].

    PubMed

    Kubiszewski, V; Fontaine, R; Huré, K; Rusch, E

    2013-04-01

    The aim of this study was to determine the prevalence of adolescents engaged in cyber-bullying and then to identify whether students involved in cyber- and school bullying present the same characteristics of internalizing problems (insomnia, perceived social disintegration, psychological distress) and externalizing problems (general aggressiveness, antisocial behavior). Semi-structured interviews were conducted with 738 adolescents from a high-school and a middle-school (mean age=14.8 ± 2.7). The Electronic Bullying Questionnaire and the Olweus Bully/Victim Questionnaire were used to identify profiles of cyber-bullying (cyber-victim, cyber-bully, cyber-bully/victim and cyber-neutral) and school bullying (victim, bully, bully/victim and neutral). Internalizing problems were investigated using the Athens Insomnia Scale, a Perceived Social Disintegration Scale and a Psychological Distress Scale. Externalizing problems were assessed using a General Aggressiveness Scale and an Antisocial Behavior Scale. Almost one student in four was involved in cyber-bullying (16.4% as cyber-victim, 4.9% as cyber-bully and 5.6% as cyber-bully/victim); 14% of our sample was engaged in school bullying as a victim, 7.2% as a bully and 2.8% as a bully/victim. The majority of adolescents involved in cyber-bullying were not involved in school bullying. With regard to the problems associated with school bullying, internalizing problems were more prevalent in victims and bully/victims, whereas externalizing problems were more common in bullies and bully/victims. A similar pattern was found in cyber-bullying where internalizing problems were characteristic of cyber-victims and cyber-bully/victims. Insomnia was elevated in the cyber-bully group which is specific to cyberbullying. General aggressiveness and antisocial behavior were more prevalent in cyber-bullies and cyber-bully/victims. Looking at the differences between types of bullying, victims of "school only" and "school and cyber

  20. Cyber bullying prevention: intervention in Taiwan.

    PubMed

    Lee, Ming-Shinn; Zi-Pei, Wu; Svanström, Leif; Dalal, Koustuv

    2013-01-01

    This study aimed to explore the effectiveness of the cyber bullying prevention WebQuest course implementation. The study adopted the quasi-experimental design with two classes made up of a total of 61 junior high school students of seventh grade. The study subjects comprised of 30 students from the experimental group and 31 students from the control group. The experimental group received eight sessions (total 360 minutes) of the teaching intervention for four consecutive weeks, while the control group did not engage in any related courses. The self-compiled questionnaire for the student's knowledge, attitudes, and intentions toward cyber bullying prevention was adopted. Data were analysed through generalized estimating equations to understand the immediate results on the student's knowledge, attitudes, and intentions after the intervention. The results show that the WebQuest course immediately and effectively enhanced the knowledge of cyber bullying, reduced the intentions, and retained the effects after the learning. But it produced no significant impact on the attitude toward cyber bullying. The intervention through this pilot study was effective and positive for cyber bulling prevention. It was with small number of students. Therefore, studies with large number of students and long experimental times, in different areas and countries are warranted.

  1. Cyber Bullying Prevention: Intervention in Taiwan

    PubMed Central

    Lee, Ming-Shinn; Zi-Pei, Wu; Svanström, Leif; Dalal, Koustuv

    2013-01-01

    Background This study aimed to explore the effectiveness of the cyber bullying prevention WebQuest course implementation. Methodology/Findings The study adopted the quasi-experimental design with two classes made up of a total of 61 junior high school students of seventh grade. The study subjects comprised of 30 students from the experimental group and 31 students from the control group. The experimental group received eight sessions (total 360 minutes) of the teaching intervention for four consecutive weeks, while the control group did not engage in any related courses. The self-compiled questionnaire for the student’s knowledge, attitudes, and intentions toward cyber bullying prevention was adopted. Data were analysed through generalized estimating equations to understand the immediate results on the student’s knowledge, attitudes, and intentions after the intervention. The results show that the WebQuest course immediately and effectively enhanced the knowledge of cyber bullying, reduced the intentions, and retained the effects after the learning. But it produced no significant impact on the attitude toward cyber bullying. Conclusions/Significance The intervention through this pilot study was effective and positive for cyber bulling prevention. It was with small number of students. Therefore, studies with large number of students and long experimental times, in different areas and countries are warranted. PMID:23724018

  2. Problem-Based Learning and Creative Instructional Approaches for Laboratory Exercises in Introductory Crop Science

    ERIC Educational Resources Information Center

    Teplitski, Max; McMahon, Margaret J.

    2006-01-01

    The implementation of problem-based learning (PBL) and other inquiry-driven educational techniques is often resisted by both faculty and students, who may not be comfortable with this learning/instructional style. We present here a hybrid approach, which combines elements of expository education with inquiry-driven laboratory exercises and…

  3. The Temporal Association Between Traditional and Cyber Dating Abuse Among Adolescents.

    PubMed

    Temple, Jeff R; Choi, Hye Jeong; Brem, Meagan; Wolford-Clevenger, Caitlin; Stuart, Gregory L; Peskin, Melissa Fleschler; Elmquist, JoAnna

    2016-02-01

    While research has explored adolescents' use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58 % female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration 1 year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts.

  4. The Temporal Association between Traditional and Cyber Dating Abuse among Adolescents

    PubMed Central

    Temple, Jeff R.; Choi, Hye Jeong; Brem, Meagan; Wolford-Clevenger, Caitlin; Stuart, Gregory L.; Peskin, Melissa Fleschler; Elmquist, JoAnna

    2015-01-01

    While research has explored adolescents’ use of technology to perpetrate dating violence, little is known about how traditional in-person and cyber abuse are linked, and no studies have examined their relationship over time. Using our sample of 780 diverse adolescents (58% female), we found that traditional and cyber abuse were positively associated, and cyber abuse perpetration and victimization were correlated at each time point. Cyber abuse perpetration in the previous year (spring 2013) predicted cyber abuse perpetration one year later (spring 2014), while controlling for traditional abuse and demographic variables. In addition, physical violence victimization and cyber abuse perpetration and victimization predicted cyber abuse victimization the following year. These findings highlight the reciprocal nature of cyber abuse and suggest that victims may experience abuse in multiple contexts. PMID:26525389

  5. RFID as a Tool in Cyber Warfare

    DTIC Science & Technology

    2010-11-01

    RTO-MP-IST-091 P4 - 1 RFID as a Tool in Cyber Warfare Mikko Kiviharju P.O.Box 10 FIN-11311 Riihimaki FINLAND mikko.kiviharju@mil.fi...auditing existing systems and planning new establishments. 1 INTRODUCTION Cyber warfare , especially computer network operations (CNO) have a deep...SUBTITLE RFID as a Tool in Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  6. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-21

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR... Protection and Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the following Information...

  7. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  8. Potato Types and Characteristics: Laboratory Exercises.

    ERIC Educational Resources Information Center

    Pavlista, Alexander D.

    1997-01-01

    Presents a number of simple exercises that demonstrate potato tuber characteristics and are designed for high school biology students and teachers. Exercises include Typing, Grading, Shape, Eye Characteristics, Defects, Specific Gravity, Dry Matter Content, Glucose Content, Baking, Frying/Chipping, and Taste Testing. (JRH)

  9. Cyber ACTS/SAASS: A Second Year of Command and Staff College for the Future Leaders of Our Cyber Forces

    DTIC Science & Technology

    2009-01-01

    objectives. The Air Force is struggling to determine the best way of developing offensive and defensive capabilities for cyber warfare . Our warfighting...education (IDE) cyber warfare program at the Air Force Institute of Technology (AFIT), located at Wright-Patterson AFB, Ohio. I propose that the Air...Force create a two-year professional military education (PME) path consisting of ACSC followed by AFIT’s cyber warfare program, paralleling the current path of ACSC followed by SAASS.

  10. Traditional and cyber aggressors and victims: a comparison of psychosocial characteristics.

    PubMed

    Sontag, Lisa M; Clemans, Katherine H; Graber, Julia A; Lyndon, Sarah T

    2011-04-01

    To date, relatively little is known about differences between perpetrators and victims of cyber and traditional forms of aggression. Hence, this study investigated differences among traditional and cyber aggressors and victims on psychosocial characteristics typically examined in research on traditional aggression and victimization, specifically effortful control, manipulativeness, remorselessness, proactive and reactive aggression, and anxious/depressive symptoms. Participants (N = 300; 63.2% female; M age = 12.89, SD = .95; 52% Caucasian, 27% African American, 11% Latino, and 10% other) were categorized based on aggressor type (non/low aggressor, traditional-only, cyber-only, and combined traditional and cyber) and victim type (non-victim, traditional-only, cyber-only, and combined traditional and cyber). Cyber aggressors reported lower levels of reactive aggression compared to traditional-only and combined aggressors. Combined aggressors demonstrated the poorest psychosocial profile compared to all other aggressor groups. For victimization, cyber-only and combined victims reported higher levels of reactive aggression and were more likely to be cyber aggressors themselves compared to traditional-only victims and non-victims. Findings suggest that there may be unique aspects about cyber aggression and victimization that warrant further investigation.

  11. The Defender's Role in Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The embodiment of this work is a table top game to explore cyber security and network defense concepts and cost. The game structure is such that it provides players an immersive environment to play a given role in cyber security to investigate the result of infrastructure and response decisions.

  12. Normative beliefs about aggression and cyber aggression among young adults: a longitudinal investigation.

    PubMed

    Wright, Michelle F; Li, Yan

    2013-01-01

    This longitudinal study examined normative beliefs about aggression (e.g., face-to-face, cyber) in relation to the engagement in cyber aggression 6 months later among 126 (69 women) young adults. Participants completed electronically administered measures assessing their normative beliefs, face-to-face and cyber aggression at Time 1, and cyber aggression 6 months later (Time 2). We found that men reported more cyber relational and verbal aggression when compared to women. After controlling for each other, Time 1 face-to-face relational aggression was positively related to Time 2 cyber relational aggression, whereas Time 1 face-to-face verbal aggression was positively related to Time 2 cyber verbal aggression. Normative beliefs regarding cyber aggression was positively related to both forms of cyber aggression 6 months later, after controlling for normative beliefs about face-to-face aggression. Furthermore, a significant two-way interaction between Time 1 cyber relational aggression and normative beliefs about cyber relational aggression was found. Follow-up analysis showed that Time 1 cyber relational aggression was more strongly related to Time 2 cyber relational aggression when young adults held higher normative beliefs about cyber relational aggression. A similar two-way interaction was found for cyber verbal aggression such that the association between Time 1 and Time 2 cyber verbal aggression was stronger at higher levels of normative beliefs about cyber verbal aggression. Results are discussed in terms of the social cognitive and behavioral mechanisms associated with the engagement of cyber aggression. © 2013 Wiley Periodicals, Inc.

  13. Optimization and Control of Cyber-Physical Vehicle Systems

    PubMed Central

    Bradley, Justin M.; Atkins, Ella M.

    2015-01-01

    A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined. PMID:26378541

  14. Optimization and Control of Cyber-Physical Vehicle Systems.

    PubMed

    Bradley, Justin M; Atkins, Ella M

    2015-09-11

    A cyber-physical system (CPS) is composed of tightly-integrated computation, communication and physical elements. Medical devices, buildings, mobile devices, robots, transportation and energy systems can benefit from CPS co-design and optimization techniques. Cyber-physical vehicle systems (CPVSs) are rapidly advancing due to progress in real-time computing, control and artificial intelligence. Multidisciplinary or multi-objective design optimization maximizes CPS efficiency, capability and safety, while online regulation enables the vehicle to be responsive to disturbances, modeling errors and uncertainties. CPVS optimization occurs at design-time and at run-time. This paper surveys the run-time cooperative optimization or co-optimization of cyber and physical systems, which have historically been considered separately. A run-time CPVS is also cooperatively regulated or co-regulated when cyber and physical resources are utilized in a manner that is responsive to both cyber and physical system requirements. This paper surveys research that considers both cyber and physical resources in co-optimization and co-regulation schemes with applications to mobile robotic and vehicle systems. Time-varying sampling patterns, sensor scheduling, anytime control, feedback scheduling, task and motion planning and resource sharing are examined.

  15. Leadership of Cyber Warriors: Enduring Principles and New Directions

    DTIC Science & Technology

    2011-07-11

    cyber warfare threat against the United States, the creation of United States Cyber Command and the designation of cyberspace as a warfighting domain now necessitate study of the attributes of successful cyber warfare leaders and the leadership techniques required to successfully lead cyber warriors. In particular, we must develop an understanding of where traditional kinetic leadership paradigms succeed, where they fail, and where new techniques must be adopted. Leadership is not a one size fits all endeavor. The capabilities and characteristics of

  16. Toward a theoretical framework for trustworthy cyber sensing

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    2010-04-01

    Cyberspace is an indispensable part of the economy and society, but has been "polluted" with many compromised computers that can be abused to launch further attacks against the others. Since it is likely that there always are compromised computers, it is important to be aware of the (dynamic) cyber security-related situation, which is however challenging because cyberspace is an extremely large-scale complex system. Our project aims to investigate a theoretical framework for trustworthy cyber sensing. With the perspective of treating cyberspace as a large-scale complex system, the core question we aim to address is: What would be a competent theoretical (mathematical and algorithmic) framework for designing, analyzing, deploying, managing, and adapting cyber sensor systems so as to provide trustworthy information or input to the higher layer of cyber situation-awareness management, even in the presence of sophisticated malicious attacks against the cyber sensor systems?

  17. Cyber-Cops: Angels on the Net.

    ERIC Educational Resources Information Center

    Educom Review, 1996

    1996-01-01

    Curtis Sliwa, founder of the Guardian Angels citizens' safety patrol, discusses the development of the Cyber Angels, an online citizens' patrol group that monitors Internet communication. Cyber Angels voluntarily look for and report any illegal activity conducted over the Internet, such as pyramid scams, transmission of stolen credit card and…

  18. Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy

    DTIC Science & Technology

    2011-05-15

    attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks

  19. Reconstruction of Cyber and Physical Software Using Novel Spread Method

    NASA Astrophysics Data System (ADS)

    Ma, Wubin; Deng, Su; Huang, Hongbin

    2018-03-01

    Cyber and Physical software has been concerned for many years since 2010. Actually, many researchers would disagree with the deployment of traditional Spread Method for reconstruction of Cyber and physical software, which embodies the key principles reconstruction of cyber physical system. NSM(novel spread method), our new methodology for reconstruction of cyber and physical software, is the solution to all of these challenges.

  20. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    NASA Technical Reports Server (NTRS)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  1. Measuring and Inferring the State of the User via the Microsoft Kinect with Application to Cyber Security Research

    DTIC Science & Technology

    2018-01-16

    ARL-TN-0864 ● JAN 2018 US Army Research Laboratory Measuring and Inferring the State of the User via the Microsoft Kinect with...Application to Cyber Security Research by Christopher J Garneau Approved for public release; distribution is unlimited...this report when it is no longer needed. Do not return it to the originator. ARL-TN-0864● JAN 2018 US Army Research Laboratory

  2. Man vs. Machine: A Junior-level Laboratory Exercise Comparing Human and Instrumental Detection Limits

    ERIC Educational Resources Information Center

    Elias, Ryan J.; Hopfer, Helene; Hofstaedter, Amanda N.; Hayes, John E.

    2017-01-01

    The human nose is a very sensitive detector and is able to detect potent aroma compounds down to low ng/L levels. These levels are often below detection limits of analytical instrumentation. The following laboratory exercise is designed to compare instrumental and human methods for the detection of volatile odor active compounds. Reference…

  3. Witnessing Evolution First Hand: A K-12 Laboratory Exercise in Genetics & Evolution Using "Drosophila"

    ERIC Educational Resources Information Center

    Heil, Caiti S. S.; Manzano-Winkler, Brenda; Hunter, Mika J.; Noor, Juliet K. F.; Noor, Mohamed A. F.

    2013-01-01

    We present a laboratory exercise that leverages student interest in genetics to observe and understand evolution by natural selection. Students begin with white-eyed fruit fly populations, to which they introduce a single advantageous variant (one male with red eyes). The superior health and vision associated with having the red-eye-color allele…

  4. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    PubMed

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.

  5. Cyber High School Students' Transition to a Traditional University

    ERIC Educational Resources Information Center

    Gracey, Dorothy M.

    2010-01-01

    This mixed-method study identifies cyber high school graduates' perceptions of the effect of a cyber high school education on successful transition to a traditional university. The study examined students' perceptions of the advantages and disadvantages their cyber education experience contributed to their academic and social transition to…

  6. Data fusion in cyber security: first order entity extraction from common cyber data

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2012-06-01

    The Joint Directors of Labs Data Fusion Process Model (JDL Model) provides a framework for how to handle sensor data to develop higher levels of inference in a complex environment. Beginning from a call to leverage data fusion techniques in intrusion detection, there have been a number of advances in the use of data fusion algorithms in this subdomain of cyber security. While it is tempting to jump directly to situation-level or threat-level refinement (levels 2 and 3) for more exciting inferences, a proper fusion process starts with lower levels of fusion in order to provide a basis for the higher fusion levels. The process begins with first order entity extraction, or the identification of important entities represented in the sensor data stream. Current cyber security operational tools and their associated data are explored for potential exploitation, identifying the first order entities that exist in the data and the properties of these entities that are described by the data. Cyber events that are represented in the data stream are added to the first order entities as their properties. This work explores typical cyber security data and the inferences that can be made at the lower fusion levels (0 and 1) with simple metrics. Depending on the types of events that are expected by the analyst, these relatively simple metrics can provide insight on their own, or could be used in fusion algorithms as a basis for higher levels of inference.

  7. Department of Defenses Enhanced Requirement for Offensive Cyber Warfare Operations

    DTIC Science & Technology

    2010-04-01

    The Department of Defense (DoD) needs to further develop its offensive cyber warfare capabilities at all levels. In an asymmetric environment...battlefields. If the DoD does not prosecute offensive cyber warfare tactics then the DoD has effectively allowed a significant advantage to be given...offensive cyber warfare operations, These states utilize their cyber warfare capabilities to support their national, operational and strategic

  8. Multiple hypothesis tracking for the cyber domain

    NASA Astrophysics Data System (ADS)

    Schwoegler, Stefan; Blackman, Sam; Holsopple, Jared; Hirsch, Michael J.

    2011-09-01

    This paper discusses how methods used for conventional multiple hypothesis tracking (MHT) can be extended to domain-agnostic tracking of entities from non-kinematic constraints such as those imposed by cyber attacks in a potentially dense false alarm background. MHT is widely recognized as the premier method to avoid corrupting tracks with spurious data in the kinematic domain but it has not been extensively applied to other problem domains. The traditional approach is to tightly couple track maintenance (prediction, gating, filtering, probabilistic pruning, and target confirmation) with hypothesis management (clustering, incompatibility maintenance, hypothesis formation, and Nassociation pruning). However, by separating the domain specific track maintenance portion from the domain agnostic hypothesis management piece, we can begin to apply the wealth of knowledge gained from ground and air tracking solutions to the cyber (and other) domains. These realizations led to the creation of Raytheon's Multiple Hypothesis Extensible Tracking Architecture (MHETA). In this paper, we showcase MHETA for the cyber domain, plugging in a well established method, CUBRC's INFormation Engine for Real-time Decision making, (INFERD), for the association portion of the MHT. The result is a CyberMHT. We demonstrate the power of MHETA-INFERD using simulated data. Using metrics from both the tracking and cyber domains, we show that while no tracker is perfect, by applying MHETA-INFERD, advanced nonkinematic tracks can be captured in an automated way, perform better than non-MHT approaches, and decrease analyst response time to cyber threats.

  9. Correlates of cyber dating abuse among teens.

    PubMed

    Zweig, Janine M; Lachman, Pamela; Yahner, Jennifer; Dank, Meredith

    2014-08-01

    Recent advancements in technology (e.g., social networking, texting) have created new ways for dating youth to relate to one another, including in abusive ways via "cyber dating abuse." Cyber dating abuse is a form of teen dating violence that overlaps with other types of abuse (e.g., psychological) but also has several unique characteristics. Given the phenomenon's limited presence in dating violence literature, we focus on identifying how experiencing cyber dating abuse relates to youths' individual behaviors and experiences (e.g., substance use, sexual activity), psychosocial adjustment, school connection, family relationships, and partner relationships. A total of 3,745 youth (52% female, 74% White) in three northeastern states participated in the survey and reported currently being in a dating relationship or having been in one during the prior year. We found that experiences of cyber dating abuse were most significantly correlated with being female, committing a greater variety of delinquent behaviors, having had sexual activity in one's lifetime, having higher levels of depressive symptoms, and having higher levels of anger/hostility. Further, cyber dating abuse appeared somewhat more strongly related to depressive symptoms and delinquency than did other forms of teen dating violence and abuse.

  10. International Cyber Incident Repository System: Information Sharing on a Global Scale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.

    According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelatedmore » Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.« less

  11. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glenn, Colleen; Sterbentz, Dane; Wright, Aaron

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best

  12. Multinational Experiment 7. Outcome 3 - Cyber Domain Objective 3.4: Cyber Situational Awareness Standard Operating Procedure

    DTIC Science & Technology

    2012-12-01

    and activity coordination (for example, SOC management ). 10. In Reference D the information sharing framework represents a hub & node model in... management , vulnerabilities, critical assets, threats, impacts on operations etc. UNCLASSIFIED UNCLASSIFIED 6 PART 3 - CYBER SITUATIONAL AWARENESS...limit the effect of cyber incidents. 23. Tasks of the SOC include: • System maintenance and management including applying the directed security

  13. Realizing situation awareness within a cyber environment

    NASA Astrophysics Data System (ADS)

    Tadda, George; Salerno, John J.; Boulware, Douglas; Hinman, Michael; Gorton, Samuel

    2006-04-01

    Situation Awareness (SA) problems all require an understanding of current activities, an ability to anticipate what may happen next, and techniques to analyze the threat or impact of current activities and predictions. These processes of SA are common regardless of the domain and can be applied to the detection of cyber attacks. This paper will describe the application of a SA framework to implementing Cyber SA, describe some metrics for measuring and evaluating systems implementing Cyber SA, and discuss ongoing work in this area. We conclude with some ideas for future activities.

  14. Cyber-Bullying: The Situation in Ireland

    ERIC Educational Resources Information Center

    O'Moore, Mona

    2012-01-01

    This paper reports on the first major survey of cyber-bullying undertaken in Ireland. While preliminary results have been published they were based on a smaller and incomplete sample of 12-16 year olds living in Ireland. The preliminary results addressed the incidence level of cyber-bullying and that of the different subcategories of…

  15. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    NASA Astrophysics Data System (ADS)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  16. Seeking Balance in Cyber Education

    DTIC Science & Technology

    2015-02-01

    properties that can be applied to computer systems, networks, and software. For example, in our Introduction to Cyber Security Course, given to...Below is the submittal schedule for the areas of emphasis we are looking for: Data Mining in Metrics? Jul/ JAug 2015 Issue Submission Deadline: Feb...Phone Arena. PhoneArena.com, 12 Nov. 2013. Web. 08 Aug. 2014. 8. Various. “SI110: Introduction to Cyber Security, Technical Foundations.” SI110

  17. Coupling Molecular Modeling to the Traditional "IR-ID" Exercise in the Introductory Organic Chemistry Laboratory

    ERIC Educational Resources Information Center

    Stokes-Huby, Heather; Vitale, Dale E.

    2007-01-01

    This exercise integrates the infrared unknown identification ("IR-ID") experiment common to most organic laboratory syllabi with computer molecular modeling. In this modification students are still required to identify unknown compounds from their IR spectra, but must additionally match some of the absorptions with computed frequencies they…

  18. Initial Report of the Deans Cyber Warfare Ad Hoc Committee

    DTIC Science & Technology

    2011-12-22

    in a cyber warfare environment. Among the more notable recent developments have been the establishment of a new Cyber Warfare Command (USCYBERCOM) at...information-warfare-centric organization. Clearly, future Naval Academy graduates will be expected to know more about cyber warfare than those we have...graduated in the past. The Academic Dean and Provost tasked an ad hoc committeethe Cyber Warfare ad hoc Committeeto examine how USNA can best ensure that

  19. Defense Science Board Task Force Report on Cyber Defense Management

    DTIC Science & Technology

    2016-09-01

    manage cyber security is often a verymanual and labor intensive process. When a crisis hits, DoD responses range from highly automatedand instrumented...DSB Task Force Report on Cyber Defense Management September 2016 (U) This page intentionally blank REPORT OF THE DEFENSE SCIENCE BOARD STUDY ON Cyber ...DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on Cyber Defense Management I am

  20. CYBER: CHANGING THE LANDSCAPE OF FOREIGN INTERVENTION IN DEMOCRATIC ELECTIONS

    DTIC Science & Technology

    than the costs); and 3) the methods and tools for intervening are readily available. Cyber has had a significant impact on all three of the components...significant domestic actor and can act unilaterally to influence public opinion. Second, cyber lowers both the actual and perceived costs of...intervention. Finally, cyber methods and tools are available to almost anyone at any level. Cyber has lowered the barrier to electoral intervention. As a

  1. An Analysis of Pennsylvania's Cyber Charter Schools. Issue Brief

    ERIC Educational Resources Information Center

    Jack, James; Sludden, John; Schott, Adam

    2013-01-01

    Pennsylvania's first cyber charter school opened in 1998, enrolling 44 full-time students. From this modest beginning, Pennsylvania's cyber charter sector has grown to 16 schools enrolling 35,000 students from all but one school district in the Commonwealth. Pennsylvania has one of the nation's most extensive cyber charter sectors, and six…

  2. Modeling Cyber Conflicts Using an Extended Petri Net Formalism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zakrzewska, Anita N; Ferragut, Erik M

    2011-01-01

    When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way thatmore » is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.« less

  3. Temporal Cyber Attack Detection.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ingram, Joey Burton; Draelos, Timothy J.; Galiardi, Meghan

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms requiremore » large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.« less

  4. Why Is That Dog Paralyzed? A Problem-Based Case & Laboratory Exercise about Neuromuscular Transmission

    ERIC Educational Resources Information Center

    Milanick, Mark; Graham, Kerri; Wessel, Melissa

    2013-01-01

    Students are provided with a mystery concerning dogs that are paralyzed. This motivates a laboratory exercise to measure parameters from the dog's "blood" to determine whether the paralysis is due to pesticide poisoning or an autoimmune attack on nerve myelin. Most of the materials are available from the grocery store. The real-world nature of the…

  5. Cyber Warfare: A Need for Beyond Goldwater-Nichols

    DTIC Science & Technology

    2011-05-13

    of Military Studies Research Paper September 2010- May 2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Cyber Warfare : "A Need for Beyond Goldwater...22134-5068 MASTER OF MlLIT AR Y STUDJES Cyber Warfare : "A Need for Beyond Goldwater Nichols" SlffiMITTED IN PARTIAL FULFitLMENT OF THE...DOCUMENT IS PERMITTED PROVIDED PROPER ACKNOWLEDGEMENT IS MADE.· l . ii EXECUTIVE SUMMARY Title: Cyber Warfare : "A Need for Beyond Goldwater Nichols

  6. Rapid Delivery of Cyber Capabilities: Evaluation of the Requirement for a Rapid Cyber Acquisition Process

    DTIC Science & Technology

    2012-06-01

    record (PoR) to give both a quantitative and qualitative perspective on the rapid cyber acquisitions framework . It also investigates if cyber operations...acquisition is a complex topic that does not yet have a solidified framework . To scope this research, a comprehensive review of past, present and...for AT&L is working with the DoD cyberspace community to develop a common framework for Services and Agencies to acquire capabilities for cyberspace

  7. Online social networking and the experience of cyber-bullying.

    PubMed

    O'Dea, Bridianne; Campbell, Andrew

    2012-01-01

    Online social networking sites (SNS) are popular social tools used amongst adolescents and account for much of their daily internet activity. Recently, these sites have presented opportunities for youth to experience cyber-bullying. Often resulting in psychological distress, cyber-bullying is a common experience for many young people. Continual use of SNS signifies the importance of examining its links to cyber-bullying. This study examined the relationship between online social networking and the experience of cyber-bullying. A total of 400 participants (Mage=14.31 years) completed an online survey which examined the perceived definitions and frequency of cyber-bullying. Users of SNS reported significantly higher frequencies of stranger contact compared to non-users. Spearman's rho correlations determined no significant relationship between daily time on SNS and the frequency of stranger contact. This suggests that ownership of a SNS profile may be a stronger predictor of some cyber-bullying experiences compared to time spent on these sites. Findings encourage continued research on the nature of internet activities used by young adolescents and the possible exposure to online victimization.

  8. Structural Causes and Cyber Effects: A Response to Our Critics

    DTIC Science & Technology

    2015-01-01

    the incident, saying “North Korea’s attack on [Sony] reaf- firms that cyber threats pose one of the gravest national security dangers to the United...around the world to strengthen cyber - security , promote norms of acceptable state behavior, uphold freedom of expression, and ensure that the Internet... cyber working group that made progress toward “interna- tional cyberspace rules, and measures to boost dialogue and cooperation on cyber security .”15

  9. Psychological Impact of Cyber-Bullying: Implications for School Counsellors

    ERIC Educational Resources Information Center

    Nordahl, Jennifer; Beran, Tanya; Dittrick, Crystal J.

    2013-01-01

    Cyber-bullying is a significant problem for children today. This study provides evidence of the psychological impact of cyber-bullying among victimized children ages 10 to 17 years (M = 12.48, SD = 1.79) from 23 urban schools in a western province of Canada (N = 239). Students who were cyber-bullied reported high levels of anxious,…

  10. Recruiting the Cyber Leader: An Evaluation of the Human Resource Model Used for Recruiting the Army’s Cyber Operations Officer

    DTIC Science & Technology

    2017-09-01

    For the first time since the creation of the Special Forces branch in 1987, the Army authorized the creation of a new branch, the Cyber branch. With...management model. The purpose of our research is to evaluate the effectiveness of that model to recruit Cyber Operations Officers and to examine the...performance (MOPs) and measures of effectiveness (MOEs) based on data collected from: Army institutions; a survey of the Cyber Branch population; and the

  11. Cyber War: The Next Frontier for NATO

    DTIC Science & Technology

    2015-03-01

    cyber-attacks as a way to advance their agenda. Common examples of cyber- attacks include computer viruses, worms , malware, and distributed denial of...take advantage of security holes and cause damage to computer systems, steal financial data, or acquire sensitive secrets. As technology becomes

  12. Optimizing CyberShake Seismic Hazard Workflows for Large HPC Resources

    NASA Astrophysics Data System (ADS)

    Callaghan, S.; Maechling, P. J.; Juve, G.; Vahi, K.; Deelman, E.; Jordan, T. H.

    2014-12-01

    The CyberShake computational platform is a well-integrated collection of scientific software and middleware that calculates 3D simulation-based probabilistic seismic hazard curves and hazard maps for the Los Angeles region. Currently each CyberShake model comprises about 235 million synthetic seismograms from about 415,000 rupture variations computed at 286 sites. CyberShake integrates large-scale parallel and high-throughput serial seismological research codes into a processing framework in which early stages produce files used as inputs by later stages. Scientific workflow tools are used to manage the jobs, data, and metadata. The Southern California Earthquake Center (SCEC) developed the CyberShake platform using USC High Performance Computing and Communications systems and open-science NSF resources.CyberShake calculations were migrated to the NSF Track 1 system NCSA Blue Waters when it became operational in 2013, via an interdisciplinary team approach including domain scientists, computer scientists, and middleware developers. Due to the excellent performance of Blue Waters and CyberShake software optimizations, we reduced the makespan (a measure of wallclock time-to-solution) of a CyberShake study from 1467 to 342 hours. We will describe the technical enhancements behind this improvement, including judicious introduction of new GPU software, improved scientific software components, increased workflow-based automation, and Blue Waters-specific workflow optimizations.Our CyberShake performance improvements highlight the benefits of scientific workflow tools. The CyberShake workflow software stack includes the Pegasus Workflow Management System (Pegasus-WMS, which includes Condor DAGMan), HTCondor, and Globus GRAM, with Pegasus-mpi-cluster managing the high-throughput tasks on the HPC resources. The workflow tools handle data management, automatically transferring about 13 TB back to SCEC storage.We will present performance metrics from the most recent Cyber

  13. Cyber-Physical Test Platform for Microgrids: Combining Hardware, Hardware-in-the-Loop, and Network-Simulator-in-the-Loop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, Austin; Chakraborty, Sudipta; Wang, Dexin

    This paper presents a cyber-physical testbed, developed to investigate the complex interactions between emerging microgrid technologies such as grid-interactive power sources, control systems, and a wide variety of communication platforms and bandwidths. The cyber-physical testbed consists of three major components for testing and validation: real time models of a distribution feeder model with microgrid assets that are integrated into the National Renewable Energy Laboratory's (NREL) power hardware-in-the-loop (PHIL) platform; real-time capable network-simulator-in-the-loop (NSIL) models; and physical hardware including inverters and a simple system controller. Several load profiles and microgrid configurations were tested to examine the effect on system performance withmore » increasing channel delays and router processing delays in the network simulator. Testing demonstrated that the controller's ability to maintain a target grid import power band was severely diminished with increasing network delays and laid the foundation for future testing of more complex cyber-physical systems.« less

  14. Astronomy Laboratory Exercise on Olbers’ Paradox and the Age of the Universe

    NASA Astrophysics Data System (ADS)

    Glazer, Kelsey Samantha; Edwards, Charlotte; Overduin, James; Storrs, Alex

    2018-01-01

    We describe the development of a new laboratory exercise for undergraduate introductory astronomy courses. Students begin by estimating the intensity of the extragalactic background light using a simple Newtonian cosmological model that agrees with recent measurements to within a factor of two. They then use the 0.5m Towson University telescope to image a dark patch of sky such as the Hubble Deep Field near or during new Moon, and compare the intensity actually observed with that predicted. This comparison leads to a new appreciation of foreground contributions such as light pollution, airglow, zodiacal light, starlight and others. Students pick up important skills in uncertainty analysis and astronomical unit conversion. But the most valuable aspect of the exercise in our view is that it enables students to draw a direct connection between the evidence of their own eyes and the age of the Universe.

  15. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  16. Ocean modelling on the CYBER 205 at GFDL

    NASA Technical Reports Server (NTRS)

    Cox, M.

    1984-01-01

    At the Geophysical Fluid Dynamics Laboratory, research is carried out for the purpose of understanding various aspects of climate, such as its variability, predictability, stability and sensitivity. The atmosphere and oceans are modelled mathematically and their phenomenology studied by computer simulation methods. The present state-of-the-art in the computer simulation of large scale oceans on the CYBER 205 is discussed. While atmospheric modelling differs in some aspects, the basic approach used is similar. The equations of the ocean model are presented along with a short description of the numerical techniques used to find their solution. Computational considerations and a typical solution are presented in section 4.

  17. A Testbed Environment for Buildings-to-Grid Cyber Resilience Research and Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sridhar, Siddharth; Ashok, Aditya; Mylrea, Michael E.

    The Smart Grid is characterized by the proliferation of advanced digital controllers at all levels of its operational hierarchy from generation to end consumption. Such controllers within modern residential and commercial buildings enable grid operators to exercise fine-grained control over energy consumption through several emerging Buildings-to-Grid (B2G) applications. Though this capability promises significant benefits in terms of operational economics and improved reliability, cybersecurity weaknesses in the supporting infrastructure could be exploited to cause a detrimental effect and this necessitates focused research efforts on two fronts. First, the understanding of how cyber attacks in the B2G space could impact grid reliabilitymore » and to what extent. Second, the development and validation of cyber-physical application-specific countermeasures that are complementary to traditional infrastructure cybersecurity mechanisms for enhanced cyber attack detection and mitigation. The PNNL B2G testbed is currently being developed to address these core research needs. Specifically, the B2G testbed combines high-fidelity buildings+grid simulators, industry-grade building automation and Supervisory Control and Data Acquisition (SCADA) systems in an integrated, realistic, and reconfigurable environment capable of supporting attack-impact-detection-mitigation experimentation. In this paper, we articulate the need for research testbeds to model various B2G applications broadly by looking at the end-to-end operational hierarchy of the Smart Grid. Finally, the paper not only describes the architecture of the B2G testbed in detail, but also addresses the broad spectrum of B2G resilience research it is capable of supporting based on the smart grid operational hierarchy identified earlier.« less

  18. Particle in a Disk: A Spectroscopic and Computational Laboratory Exercise Studying the Polycyclic Aromatic Hydrocarbon Corannulene

    ERIC Educational Resources Information Center

    Frey, E. Ramsey; Sygula, Andrzej; Hammer, Nathan I.

    2014-01-01

    This laboratory exercise introduces undergraduate chemistry majors to the spectroscopic and theoretical study of the polycyclic aromatic hydrocarbon (PAH), corannulene. Students explore the spectroscopic properties of corannulene using UV-vis and Raman vibrational spectroscopies. They compare their experimental results to simulated vibrational…

  19. Cyber English

    ERIC Educational Resources Information Center

    Nellen, Ted; Hogue, Dawn; Patterson, Nancy G.; Schulze, Patricia

    2004-01-01

    Four experienced teachers replaced the traditional classroom dynamics and environment having micromanaged routines with CyberEnglish classroom structure that supports scholars' choices and voices. The lack of voice in students' writing was one of the reasons for the changes in the classrooms and exciting results were achieved with different…

  20. Interval forecasting of cyber-attacks on industrial control systems

    NASA Astrophysics Data System (ADS)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  1. Problematic alcohol use as a risk factor for cyber aggression within romantic relationships.

    PubMed

    Crane, Cory A; Umehira, Nicole; Berbary, Cassandra; Easton, Caroline J

    2018-06-06

    Cyber aggression has emerged as a modern form of intimate partner violence which has yet to undergo sufficient research necessary to identify risk factors that may increase the likelihood or severity of cyber aggressive behavior toward a relationship partner. Prior research offers contradictory findings pertaining to the relationship between problematic alcohol use and cyber aggression. We recruited 100 (40 female) adult participants through online crowdsourcing to complete a series of questionnaires assessing traditional partner violence, cyber aggression, and problematic alcohol use. Forty-two percent of the sample reported perpetrating cyber relational aggression and 35% reported perpetrating cyber privacy invasion during the year prior to study participation. Traditional partner violence was associated with both forms of cyber aggression. Problematic alcohol use was only associated with privacy invasion after accounting for demographic factors and traditional partner violence. Cyber aggression was prevalent among the current adult sample. Results suggest that problematic alcohol use is a risk factor for cyber privacy invasion but not cyber relational aggression. Findings add to and clarify the nascent, conflicting results that have emerged from prior research on alcohol-related cyber aggression. (Am J Addict 2018;XX:1-7). © 2018 American Academy of Addiction Psychiatry.

  2. Cyber Deterrence by Engagement and Surprise

    DTIC Science & Technology

    2017-12-21

    virtual, psychological , moral, and physical aspects in an integrated way, thus lever- aging cyber power (i.e. information power) together with...are going to receive if they continue what they are doing. This psychologi - cal state could be reached through a number of factors, to include...dominance if they are integrated appropriately into conventional military capabil- ities.7 An examination of retaliation in the cyber domain reveals

  3. "Chips with Everything": A Laboratory Exercise for Comparing Subjective and Objective Measurements of Potato Chips

    ERIC Educational Resources Information Center

    Davies, Cathy

    2005-01-01

    The following laboratory exercise was designed to aid student understanding of the differences between subjective and objective measurements. Students assess the color and texture of different varieties of potato chip (crisps) by means of an intensity rating scale and a rank test and objectively with a colorimeter and texture analyzer. For data…

  4. Defense Science Board (DSB) Task Force on Cyber Deterrence

    DTIC Science & Technology

    2017-02-01

    the 2015 cyber heist from the Office of Personnel Management of some 18 million records containing personal information as so egregious as to warrant...major war, including through misperception and inadvertent escalation. The dynamics of cyber offensive weapons will increase challenges to crisis ...may have hoped to gain. − Proposed norms for the conduct of offensive cyber operations, in crisis and conflict. These norms will provide boundaries

  5. A continuous arc delivery optimization algorithm for CyberKnife m6.

    PubMed

    Kearney, Vasant; Descovich, Martina; Sudhyadhom, Atchar; Cheung, Joey P; McGuinness, Christopher; Solberg, Timothy D

    2018-06-01

    This study aims to reduce the delivery time of CyberKnife m6 treatments by allowing for noncoplanar continuous arc delivery. To achieve this, a novel noncoplanar continuous arc delivery optimization algorithm was developed for the CyberKnife m6 treatment system (CyberArc-m6). CyberArc-m6 uses a five-step overarching strategy, in which an initial set of beam geometries is determined, the robotic delivery path is calculated, direct aperture optimization is conducted, intermediate MLC configurations are extracted, and the final beam weights are computed for the continuous arc radiation source model. This algorithm was implemented on five prostate and three brain patients, previously planned using a conventional step-and-shoot CyberKnife m6 delivery technique. The dosimetric quality of the CyberArc-m6 plans was assessed using locally confined mutual information (LCMI), conformity index (CI), heterogeneity index (HI), and a variety of common clinical dosimetric objectives. Using conservative optimization tuning parameters, CyberArc-m6 plans were able to achieve an average CI difference of 0.036 ± 0.025, an average HI difference of 0.046 ± 0.038, and an average LCMI of 0.920 ± 0.030 compared with the original CyberKnife m6 plans. Including a 5 s per minute image alignment time and a 5-min setup time, conservative CyberArc-m6 plans achieved an average treatment delivery speed up of 1.545x ± 0.305x compared with step-and-shoot plans. The CyberArc-m6 algorithm was able to achieve dosimetrically similar plans compared to their step-and-shoot CyberKnife m6 counterparts, while simultaneously reducing treatment delivery times. © 2018 American Association of Physicists in Medicine.

  6. After Action Report: Idaho National Laboratory Annual Exercise June 10, 2015

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barnes, Vernon Scott

    On June 10, 2015, Idaho National Laboratory (INL), in coordination with the State of Idaho, local jurisdictions, Department of Energy Idaho Operations Office (DOE-ID), and DOE Headquarters (DOE HQ), conducted the annual emergency exercise to demonstrate the ability to implement the requirements of DOE O 151.1C, “Comprehensive Emergency Management System.” The INL contractor, Battelle Energy Alliance, LLC (BEA), in coordination with other INL contractors, conducted operations and demonstrated appropriate response measures to mitigate an event and protect the health and safety of personnel, the environment, and property. Offsite response organizations participated to demonstrate appropriate response measures.

  7. A cognitive and economic decision theory for examining cyber defense strategies.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bier, Asmeret Brooke

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participantsmore » interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.« less

  8. Emotional Problems in Traditional and Cyber Victimization

    ERIC Educational Resources Information Center

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  9. A Mixed Learning Approach to Integrating Digital Signal Processing Laboratory Exercises into a Non-Lab Junior Year DSP Course

    ERIC Educational Resources Information Center

    McPheron, Benjamin D.; Thangaraj, Charles V.; Thomas, Charles R.

    2017-01-01

    Laboratory courses can be difficult to fit into an engineering program at a liberal arts-focused university, which requires students to be exposed to appropriate breadth, as well as sufficient depth in their engineering education. One possible solution to this issue is to integrate laboratory exercises with lecture in a "studio" format,…

  10. Human Subject Research Protocol: Computer-Aided Human Centric Cyber Situation Awareness: Understanding Cognitive Processes of Cyber Analysts

    DTIC Science & Technology

    2013-11-01

    by existing cyber-attack detection tools far exceeds the analysts’ cognitive capabilities. Grounded in perceptual and cognitive theory , many visual...Processes Inspired by the sense-making theory discussed earlier, we model the analytical reasoning process of cyber analysts using three key...analyst are called “working hypotheses”); each hypothesis could trigger further actions to confirm or disconfirm it. New actions will lead to new

  11. Recommendations for Model Driven Paradigms for Integrated Approaches to Cyber Defense

    DTIC Science & Technology

    2017-03-06

    analogy (e.g., Susceptible, Infected, Recovered [SIR]) • Abstract wargaming: game -theoretic model of cyber conflict without modeling the underlying...malware. 3.7 Abstract Wargaming Here, a game -theoretic process is modeled with moves and effects inspired by cyber conflict but without modeling the...underlying processes of cyber attack and defense. Examples in literature include the following: • Cho J-H, Gao J. Cyber war game in temporal networks

  12. SOLAR ROTATION: A Laboratory Exercise from Project CLEA and the GONG Project

    NASA Astrophysics Data System (ADS)

    Marschall, L. A.; Sudol, J. J.; Snyder, G. A.

    2002-12-01

    Digital images from the GONG Project provide a nearly continuous record of sunspots that are ideal for determining the rate of rotation of the Sun. A new laboratory exercise from Project CLEA provides students with the capability to access an archive of 368 images of the Sun obtained at GONG solar telescopes between January 1, 2002 and April 30, 2002, during a period near solar maximum when large numbers of spots were daily visible on the sun. The resolution of each image is about 2.5 arcsec per pixel (or about 0.25 degree in longitude and latitude at the center of the solar disk). Because these images have such exquisite spatial and temporal resolution, they are the best images to date from which students can determine the solar rotation rate. CLEA software for this exercise allows students to select images by date and time, to overlay a coordinate grid on the image, and to record the latitudes and longitudes of sunspots. This data can be tabulated and analyzed with the software to determine solar rotation rates. The expected precision in the solar rotation rates is +/- 3 hours. Students will also have the ability to combine their chosen images into a digital movie showing the solar rotation. The exercise includes a student workbook and a technical manual, as well as a CD-rom of the data and the software. This exercise was produced with funding from the National Science Foundation and Gettysburg College and with the support of the GONG Project at the National Solar Observatory.

  13. The cyber security threat stops in the boardroom.

    PubMed

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  14. Neural Cognition and Affective Computing on Cyber Language.

    PubMed

    Huang, Shuang; Zhou, Xuan; Xue, Ke; Wan, Xiqiong; Yang, Zhenyi; Xu, Duo; Ivanović, Mirjana; Yu, Xueer

    2015-01-01

    Characterized by its customary symbol system and simple and vivid expression patterns, cyber language acts as not only a tool for convenient communication but also a carrier of abundant emotions and causes high attention in public opinion analysis, internet marketing, service feedback monitoring, and social emergency management. Based on our multidisciplinary research, this paper presents a classification of the emotional symbols in cyber language, analyzes the cognitive characteristics of different symbols, and puts forward a mechanism model to show the dominant neural activities in that process. Through the comparative study of Chinese, English, and Spanish, which are used by the largest population in the world, this paper discusses the expressive patterns of emotions in international cyber languages and proposes an intelligent method for affective computing on cyber language in a unified PAD (Pleasure-Arousal-Dominance) emotional space.

  15. Neural Cognition and Affective Computing on Cyber Language

    PubMed Central

    Huang, Shuang; Zhou, Xuan; Xue, Ke; Wan, Xiqiong; Yang, Zhenyi; Xu, Duo; Ivanović, Mirjana

    2015-01-01

    Characterized by its customary symbol system and simple and vivid expression patterns, cyber language acts as not only a tool for convenient communication but also a carrier of abundant emotions and causes high attention in public opinion analysis, internet marketing, service feedback monitoring, and social emergency management. Based on our multidisciplinary research, this paper presents a classification of the emotional symbols in cyber language, analyzes the cognitive characteristics of different symbols, and puts forward a mechanism model to show the dominant neural activities in that process. Through the comparative study of Chinese, English, and Spanish, which are used by the largest population in the world, this paper discusses the expressive patterns of emotions in international cyber languages and proposes an intelligent method for affective computing on cyber language in a unified PAD (Pleasure-Arousal-Dominance) emotional space. PMID:26491431

  16. CyberEconomics.

    ERIC Educational Resources Information Center

    Schenk, Robert

    2003-01-01

    Describes CyberEconomics, a complete, free, two-semester principles of economics textbook available on the World Wide Web. Contains chapters, sections, a table of contents, a set of learning objectives, and links to chapter introductions and sections. Offers a CD-ROM version available for a fee that contains interactive review questions. (JEH)

  17. Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  18. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov Websites

    Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  19. CPAD: Cyber-Physical Attack Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ferragut, Erik M; Laska, Jason A

    The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.

  20. Interview with a Cyber-Student: A Look behind Online Cheating

    ERIC Educational Resources Information Center

    Davis, Julia

    2014-01-01

    This case study offers insights into the motivation and experiences of a cyber-student, an individual who completes all or portions of an online class for the registered student. The cyber-student shares information on the inner-workings of online companies specializing in matching cyber-students with potential clients. A portrait of both a…

  1. CRIS Cyber Range Lexicon, Version 1.0

    DTIC Science & Technology

    2015-11-10

    Figure 4: Planes and Teams...Technology (S&T) experimentation , Developmental and Operational Test and Evaluation (DT&E, OT&E), cyber force training, and mission rehearsal. To...an Event in cyber space . A Range contains a set of assets and capabilities located at one or more sites. A Range has a single Range Manager. A

  2. Kicking the digital dog: a longitudinal investigation of young adults' victimization and cyber-displaced aggression.

    PubMed

    Wright, Michelle F; Li, Yan

    2012-09-01

    Using the general strain theory as a theoretical framework, the present longitudinal study investigated both face-to-face and cyber victimization in relation to cyber-displaced aggression. Longitudinal data were collected from 130 (70 women) young adults who completed measures assessing their victimization (face-to-face and cyber), cyber aggression, and both face-to-face and cyber-displaced aggression. Findings indicated that victimization in both social contexts (face-to-face and cyber) contributed to cyber-displaced aggression 6 months later (Time 2), after controlling for gender, cyber aggression, face-to-face displaced aggression, and cyber-displaced aggression at Time 1. A significant two-way interaction revealed that Time 1 cyber victimization was more strongly related to Time 2 cyber-displaced aggression when young adults had higher levels of face-to-face victimization at Time 1. Implications of these findings are discussed as well as a call for more research investigating displaced aggression in the cyber context.

  3. Different Cells Make Different Proteins: A Laboratory Exercise Illustrating Tissue-Specific Protein Expression in Animals

    ERIC Educational Resources Information Center

    Ibarguren, Izaskun; Villamarín, Antonio

    2017-01-01

    All the cells of higher organisms have the same DNA but not the same proteins. Each type of specialised cell that forms a tissue has its own pattern of gene expression and, consequently, it contains a particular set of proteins that determine its function. Here, we describe a laboratory exercise addressed to undergraduate students that aims to…

  4. Implementation of a Parameterization Framework for Cybersecurity Laboratories

    DTIC Science & Technology

    2017-03-01

    designer of laboratory exercises with tools to parameterize labs for each student , and automate some aspects of the grading of laboratory exercises. A...is to provide the designer of laboratory exercises with tools to parameterize labs for each student , and automate some aspects of the grading of...support might assist the designer of laboratory exercises to achieve the following? 1. Verify that students performed lab exercises, with some

  5. Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying.

    PubMed

    Modecki, Kathryn L; Minchin, Jeannie; Harbaugh, Allen G; Guerra, Nancy G; Runions, Kevin C

    2014-11-01

    Bullying involvement in any form can have lasting physical and emotional consequences for adolescents. For programs and policies to best safeguard youth, it is important to understand prevalence of bullying across cyber and traditional contexts. We conducted a thorough review of the literature and identified 80 studies that reported corresponding prevalence rates for cyber and traditional bullying and/or aggression in adolescents. Weighted mean effect sizes were calculated, and measurement features were entered as moderators to explain variation in prevalence rates and in traditional-cyber correlations within the sample of studies. Prevalence rates for cyber bullying were lower than for traditional bullying, and cyber and traditional bullying were highly correlated. A number of measurement features moderated variability in bullying prevalence; whereas a focus on traditional relational aggression increased correlations between cyber and traditional aggressions. In our meta-analytic review, traditional bullying was twice as common as cyber bullying. Cyber and traditional bullying were also highly correlated, suggesting that polyaggression involvement should be a primary target for interventions and policy. Results of moderation analyses highlight the need for greater consensus in measurement approaches for both cyber and traditional bullying. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  6. A Severe Weather Laboratory Exercise for an Introductory Weather and Climate Class Using Active Learning Techniques

    ERIC Educational Resources Information Center

    Grundstein, Andrew; Durkee, Joshua; Frye, John; Andersen, Theresa; Lieberman, Jordan

    2011-01-01

    This paper describes a new severe weather laboratory exercise for an Introductory Weather and Climate class, appropriate for first and second year college students (including nonscience majors), that incorporates inquiry-based learning techniques. In the lab, students play the role of meteorologists making forecasts for severe weather. The…

  7. Middle School Students' Perceptions of and Responses to Cyber Bullying

    ERIC Educational Resources Information Center

    Holfeld, Brett; Grabe, Mark

    2012-01-01

    This study explored the nature and extent of middle school students' (n = 665) experiences with cyber bullying. Approximately one in five students reported being cyber bullied in the past year, with 55% of those students being repeatedly victimized within the past 30 days. Female students were more likely to be involved in cyber bullying (victim,…

  8. Medical Differential Diagnosis (MDD) as the Architectural Framework for a Knowledge Model: A Vulnerability Detection and Threat Identification Methodology for Cyber-Crime and Cyber-Terrorism

    ERIC Educational Resources Information Center

    Conley-Ware, Lakita D.

    2010-01-01

    This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…

  9. CyberShake Physics-Based PSHA in Central California

    NASA Astrophysics Data System (ADS)

    Callaghan, S.; Maechling, P. J.; Goulet, C. A.; Milner, K. R.; Graves, R. W.; Olsen, K. B.; Jordan, T. H.

    2017-12-01

    The Southern California Earthquake Center (SCEC) has developed a simulation platform, CyberShake, which performs physics-based probabilistic seismic hazard analyis (PSHA) using 3D deterministic wave propagation simulations. CyberShake performs PSHA by simulating a wavefield of Strain Green Tensors. An earthquake rupture forecast (ERF) is then extended by varying hypocenters and slips on finite faults, generating about 500,000 events per site of interest. Seismic reciprocity is used to calculate synthetic seismograms, which are processed to obtain intensity measures (IMs) such as RotD100. These are combined with ERF probabilities to produce hazard curves. PSHA results from hundreds of locations across a region are interpolated to produce a hazard map. CyberShake simulations with SCEC 3D Community Velocity Models have shown how the site and path effects vary with differences in upper crustal structure, and they are particularly informative about epistemic uncertainties in basin effects, which are not well parameterized by depths to iso-velocity surfaces, common inputs to GMPEs. In 2017, SCEC performed CyberShake Study 17.3, expanding into Central California for the first time. Seismic hazard calculations were performed at 1 Hz at 438 sites, using both a 3D tomographically-derived central California velocity model and a regionally averaged 1D model. Our simulation volumes extended outside of Central California, so we included other SCEC velocity models and developed a smoothing algorithm to minimize reflection and refraction effects along interfaces. CyberShake Study 17.3 ran for 31 days on NCSA's Blue Waters and ORNL's Titan supercomputers, burning 21.6 million core-hours and producing 285 million two-component seismograms and 43 billion IMs. These results demonstrate that CyberShake can be successfully expanded into new regions, and lend insights into the effects of directivity-basin coupling associated with basins near major faults such as the San Andreas. In

  10. RPD-based Hypothesis Reasoning for Cyber Situation Awareness

    NASA Astrophysics Data System (ADS)

    Yen, John; McNeese, Michael; Mullen, Tracy; Hall, David; Fan, Xiaocong; Liu, Peng

    Intelligence workers such as analysts, commanders, and soldiers often need a hypothesis reasoning framework to gain improved situation awareness of the highly dynamic cyber space. The development of such a framework requires the integration of interdisciplinary techniques, including supports for distributed cognition (human-in-the-loop hypothesis generation), supports for team collaboration (identification of information for hypothesis evaluation), and supports for resource-constrained information collection (hypotheses competing for information collection resources). We here describe a cognitively-inspired framework that is built upon Klein’s recognition-primed decision model and integrates the three components of Endsley’s situation awareness model. The framework naturally connects the logic world of tools for cyber situation awareness with the mental world of human analysts, enabling the perception, comprehension, and prediction of cyber situations for better prevention, survival, and response to cyber attacks by adapting missions at the operational, tactical, and strategic levels.

  11. Empirical analysis of the effects of cyber security incidents.

    PubMed

    Davis, Ginger; Garcia, Alfredo; Zhang, Weide

    2009-09-01

    We analyze the time series associated with web traffic for a representative set of online businesses that have suffered widely reported cyber security incidents. Our working hypothesis is that cyber security incidents may prompt (security conscious) online customers to opt out and conduct their business elsewhere or, at the very least, to refrain from accessing online services. For companies relying almost exclusively on online channels, this presents an important business risk. We test for structural changes in these time series that may have been caused by these cyber security incidents. Our results consistently indicate that cyber security incidents do not affect the structure of web traffic for the set of online businesses studied. We discuss various public policy considerations stemming from our analysis.

  12. Public Policy and Private Enterprise in the Development of Flood Plains: A Laboratory Exercise in Physical Geography

    ERIC Educational Resources Information Center

    Nunnally, Nelson R.; And Others

    1974-01-01

    This activity is designed to introduce college students to the concept of floods as natural hazards, to flood frequency analysis, to hazard adjustment, and to the mechanics of public policy formulation through a six hour laboratory exercise, culminating in a simulation game. (JH)

  13. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyers, C A; Powers, S S; Faissol, D M

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform futuremore » studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.« less

  14. Cross-disciplinary thermoregulation and sweat analysis laboratory experiences for undergraduate Chemistry and Exercise Science students.

    PubMed

    Mulligan, Gregory; Taylor, Nichole; Glen, Mary; Tomlin, Dona; Gaul, Catherine A

    2011-06-01

    Cross-disciplinary (CD) learning experiences benefit student understanding of concepts and curriculum by offering opportunities to explore topics from the perspectives of alternate fields of study. This report involves a qualitative evaluation of CD health sciences undergraduate laboratory experiences in which concepts and students from two distinct disciplines [chemistry (CHEM) and exercise physiology (EPHE)] combined to study exercise thermoregulation and sweat analysis. Twenty-eight senior BSc Kinesiology (EPHE) students and 42 senior BSc CHEM students participated as part of their mutually exclusive, respective courses. The effectiveness of this laboratory environment was evaluated qualitatively using written comments collected from all students as well as from formal focus groups conducted after the CD laboratory with a representative cohort from each class (n = 16 CHEM students and 9 EPHE students). An open coding strategy was used to analyze the data from written feedback and focus group transcripts. Coding topics were generated and used to develop five themes found to be consistent for both groups of students. These themes reflected the common student perceptions that the CD experience was valuable and that students enjoyed being able to apply academic concepts to practical situations as well as the opportunity to interact with students from another discipline of study. However, students also reported some challenges throughout this experience that stemmed from the combination of laboratory groups from different disciplines with limited modification to the design of the original, pre-CD, learning environments. The results indicate that this laboratory created an effective learning opportunity that fostered student interest and enthusiasm for learning. The findings also provide information that could inform subsequent design and implementation of similar CD experiences to enhance engagement of all students and improve instructor efficacy.

  15. 7 Key Challenges for Visualization in Cyber Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Best, Daniel M.; Endert, Alexander; Kidwell, Dan

    In this paper we present seven challenges, informed by two user studies, to be considered when developing a visualization for cyber security purposes. Cyber security visualizations must go beyond isolated solutions and “pretty picture” visualizations in order to make impact to users. We provide an example prototype that addresses the challenges with a description of how they are met. Our aim is to assist in increasing utility and adoption rates for visualization capabilities in cyber security.

  16. Analyzing Online Teacher Networks: Cyber Networks Require Cyber Research Tools

    ERIC Educational Resources Information Center

    Schlager, Mark S.; Farooq, Umer; Fusco, Judith; Schank, Patricia; Dwyer, Nathan

    2009-01-01

    The authors argue that conceptual and methodological limitations in existing research approaches severely hamper theory building and empirical exploration of teacher learning and collaboration through cyber-enabled networks. They conclude that new frameworks, tools, and techniques are needed to understand and maximize the benefits of teacher…

  17. Cross-Layer Damage Assessment for Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  18. Cyber incivility @ work: the new age of interpersonal deviance.

    PubMed

    Giumetti, Gary W; McKibben, Eric S; Hatfield, Andrea L; Schroeder, Amber N; Kowalski, Robin M

    2012-03-01

    The current study was designed to extend the interpersonal deviance literature into the online domain by examining the incidence and impact of supervisor cyber incivility and neuroticism on employee outcomes at work. Conservation of Resources (COR) theory was used as the guiding framework because cyber incivility is thought to deplete energetic resources in much the same way that other stressors do, ultimately leading to negative outcomes like burnout. Results indicate that supervisor cyber incivility is positively related to burnout, absenteeism, and turnover intentions. Support was also found for the role of neuroticism as a moderator of the relationship between supervisor cyber incivility and outcomes. In general, the relations between cyber incivility and outcomes were stronger for those individuals reporting higher levels of neuroticism. Results are discussed in terms of COR theory, and possible mechanisms for the role of neuroticism in the stressor-strain relationship are discussed. The current study highlights the importance of understanding workplace online behavior and its impact on employee health and organizational well-being. Future research directions examining online interpersonal deviance are suggested.

  19. Psychometric properties of the Florence CyberBullying-CyberVictimization Scales.

    PubMed

    Palladino, Benedetta Emanuela; Nocentini, Annalaura; Menesini, Ersilia

    2015-02-01

    The present study tried to answer the research need for empirically validated and theoretically based instruments to assess cyberbullying and cybervictimization. The psychometric properties of the Florence CyberBullying-CyberVictimization Scales (FCBVSs) were analyzed in a sample of 1,142 adolescents (Mage=15.18 years; SD=1.12 years; 54.5% male). For both cybervictimization and cyberbullying, results support a gender invariant model involving 14 items and four factors covering four types of behaviors (written-verbal, visual, impersonation, and exclusion). The second-order confirmatory factor analysis confirmed that a "global," second-order measure of cyberbullying and cybervictimization fits the data well. Overall, the scales showed good validity (construct, concurrent, and convergent) and reliability (internal consistency and test-retest). In addition, using the global key question measure as a criterion, ROC analyses, determining the ability of a test to discriminate between groups, allowed us to identify cutoff points to classify respondents as involved/not involved starting from the continuum measure derived from the scales.

  20. Resilience of Cyber Systems with Over- and Underregulation.

    PubMed

    Gisladottir, Viktoria; Ganin, Alexander A; Keisler, Jeffrey M; Kepner, Jeremy; Linkov, Igor

    2017-09-01

    Recent cyber attacks provide evidence of increased threats to our critical systems and infrastructure. A common reaction to a new threat is to harden the system by adding new rules and regulations. As federal and state governments request new procedures to follow, each of their organizations implements their own cyber defense strategies. This unintentionally increases time and effort that employees spend on training and policy implementation and decreases the time and latitude to perform critical job functions, thus raising overall levels of stress. People's performance under stress, coupled with an overabundance of information, results in even more vulnerabilities for adversaries to exploit. In this article, we embed a simple regulatory model that accounts for cybersecurity human factors and an organization's regulatory environment in a model of a corporate cyber network under attack. The resulting model demonstrates the effect of under- and overregulation on an organization's resilience with respect to insider threats. Currently, there is a tendency to use ad-hoc approaches to account for human factors rather than to incorporate them into cyber resilience modeling. It is clear that using a systematic approach utilizing behavioral science, which already exists in cyber resilience assessment, would provide a more holistic view for decisionmakers. © 2016 Society for Risk Analysis.

  1. LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE

    DTIC Science & Technology

    2015-12-01

    Lessons From The Front: A Case Study Of Russian Cyber Warfare looks to capitalize on the lessons learned from the alleged Russian cyber-offensive on...through the careful analysis and comparison of two disparate conflicts related by their collision with Russian cyber - warfare . Following case study

  2. The Characterization and Measurement of Cyber Warfare, Spring 2008 - Project 08-01

    DTIC Science & Technology

    2008-05-01

    Global Innovation and Strategy Center The Characterization and Measurement of Cyber Warfare Spring 2008 – Project 08-01 May 2008...and Measurement of Cyber Warfare N/A N/A N/A 08-01Dobitz, Kyle Haas, Brad Holtje, Michael Jokerst, Amanda Ochsner, Geoff Silva, Stephanie...research team as critical for purposes of cyber act characterization: Motivation, Intent, Target, Effects, and Actors. cyberspace, cyber warfare , targets

  3. Psychological Needs as a Predictor of Cyber Bullying: A Preliminary Report on College Students

    ERIC Educational Resources Information Center

    Dilmac, Bulent

    2009-01-01

    Recent surveys show that cyber bullying is a pervasive problem in North America. Many news stories have reported cyber bullying incidents around the world. Reports on the prevalence of cyber bullying and victimization as a result of cyber bullying increase yearly. Although we know what cyber bullying is it is important that we learn more about the…

  4. An analytic approach to cyber adversarial dynamics

    NASA Astrophysics Data System (ADS)

    Sweeney, Patrick; Cybenko, George

    2012-06-01

    To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.

  5. Lab Exercises for Kinesiology.

    ERIC Educational Resources Information Center

    Mills, Brett D.; And Others

    This monograph presents descriptions of various exercises and athletic activities with a kinesiological and biomechanical analysis of the muscle systems involved. It is intended as examples of laboratory activities and projects in a college course in kinesiology. A listing of the required laboratory exercises precedes the examples. Specific…

  6. Cyber Astronomy: A Cyber University Course for School Students

    ERIC Educational Resources Information Center

    Chan, C. W.; Wong, K. Y. Michael

    2003-01-01

    Teaching university physics through the internet is not new, but a new course providing the same service for secondary school students is the first of its kind in Hong Kong. Taking advantage of the fast and affordable broadband internet in the region, some university courses have been converted to a cyber curriculum suitable for secondary school…

  7. Beyond Mission Command: Maneuver Warfare for Cyber Command and Control

    DTIC Science & Technology

    2015-05-18

    operation in an A2AD environment. 15. SUBJECT TERMS command and control; maneuver warfare; cyberspace; cyberspace operations; cyber warfare , mission...Some Principles of Cyber Warfare (NWC 2160) (U.S. Naval War College, Joint Military Operations Department, Newport, RI: U.S. Naval War College...research/ innovationleadership.pdf. Crowell, Richard M. Some Principles of Cyber Warfare (NWC 2160). U.S. Naval War College, Joint Military Operations

  8. Phase-Space Detection of Cyber Events

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hernandez Jimenez, Jarilyn M; Ferber, Aaron E; Prowell, Stacy J

    Energy Delivery Systems (EDS) are a network of processes that produce, transfer and distribute energy. EDS are increasingly dependent on networked computing assets, as are many Industrial Control Systems. Consequently, cyber-attacks pose a real and pertinent threat, as evidenced by Stuxnet, Shamoon and Dragonfly. Hence, there is a critical need for novel methods to detect, prevent, and mitigate effects of such attacks. To detect cyber-attacks in EDS, we developed a framework for gathering and analyzing timing data that involves establishing a baseline execution profile and then capturing the effect of perturbations in the state from injecting various malware. The datamore » analysis was based on nonlinear dynamics and graph theory to improve detection of anomalous events in cyber applications. The goal was the extraction of changing dynamics or anomalous activity in the underlying computer system. Takens' theorem in nonlinear dynamics allows reconstruction of topologically invariant, time-delay-embedding states from the computer data in a sufficiently high-dimensional space. The resultant dynamical states were nodes, and the state-to-state transitions were links in a mathematical graph. Alternatively, sequential tabulation of executing instructions provides the nodes with corresponding instruction-to-instruction links. Graph theorems guarantee graph-invariant measures to quantify the dynamical changes in the running applications. Results showed a successful detection of cyber events.« less

  9. Cyber Warfare as a Form of Conflict: Evaluation of Models of Cyber Conflict as a Prototype to Conceptual Analysis

    ERIC Educational Resources Information Center

    Liles, Samuel P.

    2012-01-01

    In April 2007, what has been incorrectly called the first cyber war and since then referred more correctly as a cyber riot, an attack on the domain name systems and the various servers of Estonia occurred. It was perpetrated by ethnic Russians living in Estonia who were incensed by the movement of a bronze war memorial for Russian soldiers to a…

  10. Feasibility Study on Applying Radiophotoluminescent Glass Dosimeters for CyberKnife SRS Dose Verification

    PubMed Central

    Hsu, Shih-Ming; Hung, Chao-Hsiung; Liao, Yi-Jen; Fu, Hsiao-Mei; Tsai, Jo-Ting

    2017-01-01

    CyberKnife is one of multiple modalities for stereotactic radiosurgery (SRS). Due to the nature of CyberKnife and the characteristics of SRS, dose evaluation of the CyberKnife procedure is critical. A radiophotoluminescent glass dosimeter was used to verify the dose accuracy for the CyberKnife procedure and validate a viable dose verification system for CyberKnife treatment. A radiophotoluminescent glass dosimeter, thermoluminescent dosimeter, and Kodak EDR2 film were used to measure the lateral dose profile and percent depth dose of CyberKnife. A Monte Carlo simulation for dose verification was performed using BEAMnrc to verify the measured results. This study also used a radiophotoluminescent glass dosimeter coupled with an anthropomorphic phantom to evaluate the accuracy of the dose given by CyberKnife. Measurements from the radiophotoluminescent glass dosimeter were compared with the results of a thermoluminescent dosimeter and EDR2 film, and the differences found were less than 5%. The radiophotoluminescent glass dosimeter has some advantages in terms of dose measurements over CyberKnife, such as repeatability, stability, and small effective size. These advantages make radiophotoluminescent glass dosimeters a potential candidate dosimeter for the CyberKnife procedure. This study concludes that radiophotoluminescent glass dosimeters are a promising and reliable dosimeter for CyberKnife dose verification with clinically acceptable accuracy within 5%. PMID:28046056

  11. LASL benchmark performance 1978. [CDC STAR-100, 6600, 7600, Cyber 73, and CRAY-1

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McKnight, A.L.

    1979-08-01

    This report presents the results of running several benchmark programs on a CDC STAR-100, a Cray Research CRAY-1, a CDC 6600, a CDC 7600, and a CDC Cyber 73. The benchmark effort included CRAY-1's at several installations running different operating systems and compilers. This benchmark is part of an ongoing program at Los Alamos Scientific Laboratory to collect performance data and monitor the development trend of supercomputers. 3 tables.

  12. The Relationship between Cyber-Loafing and Internet Addiction

    ERIC Educational Resources Information Center

    Keser, Hafize; Kavuk, Melike; Numanoglu, Gulcan

    2016-01-01

    The goal of this study was to investigate the relationship between preservice teachers' internet addiction level and cyber-loafing activities. This study was conducted as a survey study. Participants of the study was Computer Education and Instructional Technology department students (n = 139) at Ankara University. "Cyber loafing activity…

  13. Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now

    Science.gov Websites

    Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  14. Cyber Intelligence: Challenges and Best Practices

    DTIC Science & Technology

    2015-01-15

    2015 2 . REPORT TYPE N/A 3. DATES COVERED 4. TITLE AND SUBTITLE Cyber Intelligence Challenges and Best Practices 5a. CONTRACT NUMBER 5b...ANSI Std Z39-18 2 Cyber Intel – Challenges and Best Practices January 2015 © 2015 Carnegie Mellon University Copyright 2015 Carnegie Mellon University...University Reporting timelines Gov’t Agency 1 Gov’t Agency 2 Gov’t Agency 3 Gov’t Agency 4 Urgent Normal Strategic 2 -4 Hours 1 Day 1 Month 1 Day 2

  15. Introductory Archaeology: The Inexpensive Laboratory.

    ERIC Educational Resources Information Center

    Rice, Patricia C.

    1990-01-01

    Describes a number of student-focused laboratory exercises that are inexpensive, yet show the scientific character of archaeology. Describes the environmental laboratory exercise which includes the following analysis topics: (1) pollen; (2) earth core; (3) microfaunal; and (4) microwear. Describes the ceramic laboratory which involves…

  16. Computer-aided Human Centric Cyber Situation Awareness

    DTIC Science & Technology

    2016-03-20

    in Video, IJCAI: International Joint Conf. on Artificial Intelligence . 16-JUL-11, . : , Kun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei Tang...Cyber-Security Conference, June 2015. 2. V.S. Subrahmanian, Invited Speaker, Summer School on Business Intelligence and Big Data Analysis, Capri, Italy... Cybersecurity Conference, Yuval Ne’eman Workshop for Science, Technology and Security, Tel Aviv University, the Israeli National Cyber Bureau, Prime

  17. National Guard Forces in the Cyber Domain

    DTIC Science & Technology

    2015-05-22

    TITLE AND SUBTITLE National Guard Forces in the Cyber Domain 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...Soldiers. Army Cyber Command (ARCYBER) commander, Lieutenant General Edward Cardon stated that Guard will begin to build combat power with...90 2014 Quadrennial Defense Review, 15. 91 Ibid. 92 Edward C. Cardon , "ARMY.MIL, The Official Homepage of the United

  18. Defining Cyber and Focusing the Military’s Role in Cyberspace

    DTIC Science & Technology

    2013-03-01

    Service (USSS) and the U.S. Immigration and Customs Enforcement (ICE) to investigate cyber criminals .7 DoD’s role is not only to defend its own...identify trends, tactics, techniques, and procedures that cyber criminals use so that if the same type of events meet the definition of cyber war, DoD

  19. Cyber-Physical System Security of a Power Grid: State-of-the-Art

    DOE PAGES

    Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing

    2016-07-14

    Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less

  20. Cyber-Physical System Security of a Power Grid: State-of-the-Art

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing

    Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less

  1. Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data

    DTIC Science & Technology

    2017-03-02

    AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data Philip Walther UNIVERSITT WIEN Final...REPORT TYPE Final 3. DATES COVERED (From - To) 15 Oct 2015 to 31 Dec 2016 4. TITLE AND SUBTITLE Quantum-Enhanced Cyber Security: Experimental Computation...FORM SF 298 Final Report for FA9550-1-6-1-0004 Quantum-enhanced cyber security: Experimental quantum computation with quantum-encrypted data

  2. Cyber dating abuse among teens using school-based health centers.

    PubMed

    Dick, Rebecca N; McCauley, Heather L; Jones, Kelley A; Tancredi, Daniel J; Goldstein, Sandi; Blackburn, Samantha; Monasterio, Erica; James, Lisa; Silverman, Jay G; Miller, Elizabeth

    2014-12-01

    To estimate the prevalence of cyber dating abuse among youth aged 14 to 19 years seeking care at school-based health centers and associations with other forms of adolescent relationship abuse (ARA), sexual violence, and reproductive and sexual health indicators. A cross-sectional survey was conducted during the 2012-2013 school year (participant n = 1008). Associations between cyber dating abuse and study outcomes were assessed via logistic regression models for clustered survey data. Past 3-month cyber dating abuse was reported by 41.4% of this clinic-based sample. More female than male participants reported cyber dating abuse victimization (44.6% vs 31.0%). Compared with no exposure, low- ("a few times") and high-frequency ("once or twice a month" or more) cyber dating abuse were significantly associated with physical or sexual ARA (low: adjusted odds ratio [aOR] 2.8, 95% confidence interval [CI] 1.8-4.4; high: aOR 5.4, 95% CI 4.0-7.5) and nonpartner sexual assault (low: aOR 2.7, 95% CI 1.3-5.5; high: aOR 4.1, 95% CI 2.8-5.9). Analysis with female participants found an association between cyber dating abuse exposure and contraceptive nonuse (low: aOR 1.8, 95% CI 1.2-2.7; high: aOR 4.1, 95% CI 2.0-8.4) and reproductive coercion (low: aOR 3.0, 95% CI 1.4-6.2; high: aOR 5.7, 95% CI 2.8-11.6). Cyber dating abuse is common and associated with ARA and sexual assault in an adolescent clinic-based sample. The associations of cyber dating abuse with sexual behavior and pregnancy risk behaviors suggest a need to integrate ARA education and harm reduction counseling into sexual health assessments in clinical settings. Copyright © 2014 by the American Academy of Pediatrics.

  3. Cyber Mentoring in an Online Introductory Statistics Course

    ERIC Educational Resources Information Center

    Rashid, Mamunur; Sarkar, Jyotirmoy

    2018-01-01

    Students in an online statistics course were prone to become increasingly disengaged as the semester progressed. In Spring 2015, we took a proactive measure to retain student engagement by introducing a cyber mentoring session. We describe the framework, operation and effectiveness of cyber mentoring in improving students' learning experience and…

  4. Competitive Cyber-Insurance and Internet Security

    NASA Astrophysics Data System (ADS)

    Shetty, Nikhil; Schwartz, Galina; Felegyhazi, Mark; Walrand, Jean

    This paper investigates how competitive cyber-insurers affect network security and welfare of the networked society. In our model, a user's probability to incur damage (from being attacked) depends on both his security and the network security, with the latter taken by individual users as given. First, we consider cyberinsurers who cannot observe (and thus, affect) individual user security. This asymmetric information causes moral hazard. Then, for most parameters, no equilibrium exists: the insurance market is missing. Even if an equilibrium exists, the insurance contract covers only a minor fraction of the damage; network security worsens relative to the no-insurance equilibrium. Second, we consider insurers with perfect information about their users' security. Here, user security is perfectly enforceable (zero cost); each insurance contract stipulates the required user security. The unique equilibrium contract covers the entire user damage. Still, for most parameters, network security worsens relative to the no-insurance equilibrium. Although cyber-insurance improves user welfare, in general, competitive cyber-insurers fail to improve network security.

  5. Recommended Practice: Creating Cyber Forensics Plans for Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eric Cornelius; Mark Fabro

    Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are notmore » comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address

  6. WHEN NORMS FAIL: NORTH KOREA AND CYBER AS AN ELEMENT OF STATECRAFT

    DTIC Science & Technology

    2017-04-06

    use these increased cyber capabilities in attempts to wield greater influence in statecraft, cyber tools have not lived up to the hype of the great... influenced by, the cyber domain. A 2017 U.S. Defense Science Board report recognizes the significant economic, social, and military advantages the U.S. gains...reliant upon or connected to the internet, look to cyber to provide them a disproportionate level of influence in international affairs. The lack of

  7. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    NASA Astrophysics Data System (ADS)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and

  8. Cyber threats to health information systems: A systematic review.

    PubMed

    Luna, Raul; Rhine, Emily; Myhra, Matthew; Sullivan, Ross; Kruse, Clemens Scott

    2016-01-01

    Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. The rationale behind this systematic review is to provide a framework for future research by identifying themes and trends of cybercrime in the healthcare industry. The authors conducted a systematic search through the CINAHL, Academic Search Complete, PubMed, and ScienceDirect databases to gather literature relative to cyber threats in healthcare. All authors reviewed the articles collected and excluded literature that did not focus on the objective. Researchers selected and examined 19 articles for common themes. The most prevalent cyber-criminal activity in healthcare is identity theft through data breach. Other concepts identified are internal threats, external threats, cyber-squatting, and cyberterrorism. The industry has now come to rely heavily on digital technologies, which increase risks such as denial of service and data breaches. Current healthcare cyber-security systems do not rival the capabilities of cyber criminals. Security of information is a costly resource and therefore many HCOs may hesitate to invest what is required to protect sensitive information.

  9. Developing the Cyber Victimization Experiences and Cyberbullying Behaviors Scales.

    PubMed

    Betts, Lucy R; Spenser, Karin A

    2017-01-01

    The reported prevalence rates of cyber victimization experiences and cyberbullying behaviors vary. Part of this variation is likely due to the diverse definitions and operationalizations of the constructs adopted in previous research and the lack of psychometrically robust measures. Through 2 studies, the authors developed (Study 1) and evaluated (Study 2) the cyber victimization experiences and cyberbullying behaviors scales. Participants in Study 1 were 393 (122 boys, 171 girls) and in Study 2 were 345 (153 boys, 192 girls) 11-15-year-olds who completed measures of cyber victimization experiences, cyberbullying behaviors, face-to-face victimization experiences, face-to-face bullying behaviors, and social desirability. The 3-factor cyber victimization experiences scale comprised threat, shared images, and personal attack. The 3-factor cyberbullying behaviors scale comprised sharing images, gossip, and personal attack. Both scales demonstrated acceptable internal consistency and convergent validity.

  10. Adolescent predictors of young adult cyber-bullying perpetration and victimization among Australian youth

    PubMed Central

    Hemphill, Sheryl A.; Heerde, Jessica A.

    2014-01-01

    Purpose The purpose of the current paper was to examine the adolescent risk and protective factors (at the individual, peer group, and family level) for young adult cyber-bullying perpetration and victimization. Methods Data from 2006 (Grade 9) to 2010 (young adulthood) were analyzed from a community sample of 927 Victorian students originally recruited as a state-wide representative sample in Grade 5 (age 10–11 years) in 2002 and followed up to age 18–19 years in 2010 (N = 809). Participants completed a self-report survey on adolescent risk and protective factors and traditional and cyber-bullying perpetration and victimization, and young adult cyber-bullying perpetration and victimization. Results As young adults, 5.1% self-reported cyber-bullying perpetration only, 5.0% cyber-bullying victimization only, and 9.5% reported both cyber-bullying perpetration and victimization. In fully adjusted logistic regression analyses, the adolescent predictors of cyber-bullying perpetration only were traditional bullying perpetration, traditional bullying perpetration and victimization, and poor family management. For young adulthood cyber-bullying victimization only, the adolescent predictor was emotion control. The adolescent predictors for young adult cyber-bullying perpetration and victimization were traditional bullying perpetration and cyber-bullying perpetration and victimization. Conclusions Based on the results of this study, possible targets for prevention and early intervention are reducing adolescent involvement in (traditional or cyber-) bullying through the development of social skills and conflict resolution skills. In addition, another important prevention target is to support families with adolescents to ensure they set clear rules and monitor adolescent’s behavior. Universal programs that assist adolescents to develop skills in emotion control are warranted. PMID:24939014

  11. A Laboratory Exercise to Illustrate Increased Salivary Cortisol in Response to Three Stressful Conditions Using Competitive ELISA

    ERIC Educational Resources Information Center

    Haussmann, Mark F.; Vleck, Carol M; Farrar, Eugenia S.

    2007-01-01

    Perceived stress activates the hypothalamus-pituitary-adrenal axis, resulting in the release of glucocorticoids into the systemic circulation. Glucocorticoids cause the elevation of blood glucose, providing the necessary energy for the organism to cope with stress. Here, we outline a laboratory exercise that uses a competitive ELISA kit to…

  12. Reassigning the Structures of Natural Products Using NMR Chemical Shifts Computed with Quantum Mechanics: A Laboratory Exercise

    ERIC Educational Resources Information Center

    Palazzo, Teresa A.; Truong, Tiana T.; Wong, Shirley M. T.; Mack, Emma T.; Lodewyk, Michael W.; Harrison, Jason G.; Gamage, R. Alan; Siegel, Justin B.; Kurth, Mark J.; Tantillo, Dean J.

    2015-01-01

    An applied computational chemistry laboratory exercise is described in which students use modern quantum chemical calculations of chemical shifts to assign the structure of a recently isolated natural product. A pre/post assessment was used to measure student learning gains and verify that students demonstrated proficiency of key learning…

  13. Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.

    Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less

  14. Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT)

    DTIC Science & Technology

    2016-07-27

    Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) 5a. CONTRACT NUMBER FA8650-16-C-6722 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...network analysts. Therefore, a new cyber STE focused on network analysts called the Air Force Cyber Intruder Alert Testbed (CIAT) was developed. This...Prescribed by ANSI Std. Z39-18 Development and Validation of the Air Force Cyber Intruder Alert Testbed (CIAT) Gregory Funke, Gregory Dye, Brett Borghetti

  15. The relationship between young adults' beliefs about anonymity and subsequent cyber aggression.

    PubMed

    Wright, Michelle F

    2013-12-01

    Anonymity is considered a key motivator for cyber aggression, but few investigations have focused on the connection between anonymity and the subsequent engagement in aggression through the cyber context. The present longitudinal study utilized structural equation modeling to reveal indirect associations between two types of anonymity (i.e., punishment by authority figures and retaliation from the target) and later cyber aggression among 130 young adults. These relationships were examined through the influence of beliefs about not getting caught and not believing in the permanency of online content. Findings indicated that both forms of anonymity were related to cyber aggression 6 months later through two explanatory mechanisms (i.e., confidence with not getting caught and believing online content is not permanent), after controlling for gender and cyber aggression at Time 1. The implications of these findings are discussed, and an appeal for additional research investigating cyber aggression among young adults is given.

  16. Cyber Security Audit and Attack Detection Toolkit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  17. Will electrical cyber-physical interdependent networks undergo first-order transition under random attacks?

    NASA Astrophysics Data System (ADS)

    Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting

    2016-10-01

    Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.

  18. Modern Laboratory Exercises in Astronomy V: New Lab Exercises, Electronic Publication and Dissemination

    NASA Astrophysics Data System (ADS)

    Caton, D. B.; Gray, R. O.; Pollock, J. T.; Burns, W. C.; Hawkins, R. L.

    1993-12-01

    New lab exercises are presented, continuing a series developed over the past few years (see Caton and Pollock, BAAS 18 No. 4, 22 Nos. 1 and 4, and 23 No.4, and 24 No. 4), including a PC-based spectral classification exercise that displays spectra on a VGA screen, and a simple PC-based eclipsing binary light curve simulation program. Information packets will be available, including software, lab exercises, and instructor's notes. These will be on paper and on (PC) disk, in ASCII and WordPerfect formats, including some figures in AutoDesk's Generic CADD form. This will allow other institutions to modify the exercises to fit their own equipment and procedures. Information will also be provided on accessing a PC that we have installed on the Internet to allow acquisition of future updates and additional materials that will be developed.

  19. The Cyber Security Crisis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Spafford, Eugene

    2006-05-10

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight intomore » causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'« less

  20. The Cyber Security Crisis

    ScienceCinema

    Spafford, Eugene

    2018-05-11

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  1. Cyber Bullying in ADHD and Asperger Syndrome Populations

    ERIC Educational Resources Information Center

    Kowalski, Robin M.; Fedina, Cristin

    2011-01-01

    Cyber bullying or electronic bullying refers to bullying that occurs through the Internet or cellular phones. With the rise of technology, researchers have shown a keen interest in the topic of cyber bullying. However, that interest has not extended to individuals with special needs. To address this gap in the literature, the current study…

  2. Securing Cyber Acquisitions

    DTIC Science & Technology

    2015-02-01

    networking provides 24-hour access to data and information between friends and strangers alike. Technology also has played a significant role in the world’s...economic environment, many or- ganizations look at cyber budgets as areas to cut back. And many top-level managers and members of the acquisition

  3. Cyber situation awareness as distributed socio-cognitive work

    NASA Astrophysics Data System (ADS)

    Tyworth, Michael; Giacobe, Nicklaus A.; Mancuso, Vincent

    2012-06-01

    A key challenge for human cybersecurity operators is to develop an understanding of what is happening within, and to, their network. This understanding, or situation awareness, provides the cognitive basis for human operators to take action within their environments. Yet developing situation awareness of cyberspace (cyber-SA) is understood to be extremely difficult given the scope of the operating environment, the highly dynamic nature of the environment and the absence of physical constraints that serve to bound the cognitive task23. As a result, human cybersecurity operators are often "flying blind" regarding understanding the source, nature, and likely impact of malicious activity on their networked assets. In recent years, many scholars have dedicated their attention to finding ways to improve cyber-SA in human operators. In this paper we present our findings from our ongoing research of how cybersecurity analysts develop and maintain cyber-SA. Drawing from over twenty interviews of analysts working in the military, government, industrial, and educational domains, we find that cyber-SA to be distributed across human operators and technological artifacts operating in different functional areas.

  4. Laboratory exercises, remote sensing of the environment

    NASA Technical Reports Server (NTRS)

    Mintzer, O.; Ray, J.

    1981-01-01

    The exercises are designed to convey principles and theory of remote sensing, and methodologies of its application to civil engineering and environmental concerns, including agronomy, geography, geology, wildlife, forestry, hydrology, and other related fields. During the exercises the student is introduced to several types of remote sensing represented by imagery from conventional format: panchromatic, black-and-white infrared, color, and infrared, 35mm aerial photography, thermal infrared, radar, multispectral scanner, and LANDSAT. Upon completion of the exercises the student is expected to know: (1) the electromagnetic spectrum, its various wavelength sub-sections and their uses as sensors, (2) the limitations of each sensor, (3) the interpretation techniques used for extracting data from the various types of imagery, and (4) the cost effectiveness of remote sensing procedures for acquiring and evaluating data of the natural environment.

  5. Competitive Phylogenetics: A Laboratory Exercise

    ERIC Educational Resources Information Center

    McCabe, Declan J.

    2014-01-01

    This exercise demonstrates the principle of parsimony in constructing cladograms. Although it is designed using mammalian cranial characters, the activity could be adapted for characters from any group of organisms. Students score categorical traits on skulls and record the data in a spreadsheet. Using the Mesquite software package, students…

  6. An Examination of the Partner Cyber Abuse Questionnaire in a College Student Sample.

    PubMed

    Wolford-Clevenger, Caitlin; Zapor, Heather; Brasfield, Hope; Febres, Jeniimarie; Elmquist, JoAnna; Brem, Meagan; Shorey, Ryan C; Stuart, Gregory L

    2016-01-01

    To examine the factor structure and convergent validity of a newly developed measure of an understudied form of partner abuse, cyber abuse, and to examine the prevalence of, and gender differences in, victimization by cyber abuse. College students in a dating relationship ( N = 502) completed the Partner Cyber Abuse Questionnaire (Hamby, 2013), as well as measures of partner abuse victimization and depression. Using exploratory factor analysis, we determined a one-factor solution was the most statistically and conceptually best fitting model. The cyber abuse victimization factor was correlated with depressive symptoms and physical, psychological, and sexual partner abuse victimization, supporting the convergent validity of the measure. The overall prevalence of victimization by cyber abuse was 40%, with victimization by specific acts ranging from 2-31%. Men and women did not differ in their victimization by cyber abuse. Cyber abuse is prevalent among college students and occurs concurrently with other partner abuse forms and depressive symptoms. Given the interrelated nature of partner abuse forms, prevention and intervention programs should address partner abuse occurring in-person and through technology. Cyber abuse should also be considered in the conceptualization and measurement of partner abuse to more fully understand this social problem.

  7. The Human Side of Cyber Conflict: Organizing, Training, and Equipping the Air Force Cyber Workforce

    DTIC Science & Technology

    2016-06-01

    Breakdown of the 17D community as of 31 March 2014. (Reproduced from 17D Officer Assignment Team, Cyberspace Operations “Spread the Word” briefing, 9– 11 ...surety 3D0X4 Computer systems programs 3D1X1 Client systems 3D1X2 Cyber transport 3D1X3 Radio frequency transport 3D1X4 Spectrum operations 3D1X5 Radar...Computer systems programs 3D1X1 Client systems 3D1X2 Cyber transport systems 3D1X3 Radio frequency transmissionsystems FORCE DEVELOPMENT │ 123 Table 8

  8. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  9. Cognitive and Non-cognitive Predictors of Career Intentions within Cyber Jobs

    DTIC Science & Technology

    2016-04-01

    in Anaheim, California, April 14-16, 2016. 15. SUBJECT TERMS Cyber, career intentions, retention , cognitive ability, job fit, normative commitment...Predictors of Cyber Job Career Intentions 1 The views, opinions, and findings contained in this article are solely those of the authors and should...other documentation. Cognitive and Non-cognitive Predictors of Career Intentions within Cyber Jobs Kristophor Canali U. S. Army

  10. Developing a Hybrid Virtualization Platform Design for Cyber Warfare Training and Education

    DTIC Science & Technology

    2010-06-01

    CYBER WARFARE TRAINING AND EDUCATION THESIS Kyle E. Stewart 2nd...Government. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE TRAINING...APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GCE/ENG/10-06 DEVELOPING A HYBRID VIRTUALIZATION PLATFORM DESIGN FOR CYBER WARFARE

  11. At the Crossroads of Cyber Warfare: Signposts for the Royal Australian Air Force

    DTIC Science & Technology

    2011-06-01

    At the Crossroads of Cyber Warfare : Signposts for the Royal Australian Air Force by Craig Stallard, Squadron leader, Royal...in the conduct of cyber warfare . The 2009 Defence White Paper provided some clarity by indentifying cyber warfare as critical to the maintenance...of national security, but left open the most important issue: should cyber warfare be a joint engagement or a service oriented fight? The RAAF

  12. Cyber Bullying @ Schools: What Do Turkish Adolescents Think?

    ERIC Educational Resources Information Center

    Topcu, Cigdem; Yildirim, Ali; Erdur-Baker, Ozgur

    2013-01-01

    Cyber bullying is an emerging form of peer bullying, becoming prominent especially over the past decade. The aim of this study was to investigate through interviews the perceptions of Turkish high school students about cyber bullying. The sample consisted of six male and one female high school students all aged 15 years who identified as being…

  13. The Role of Technologies, Behaviors, Gender, and Gender Stereotype Traits in Adolescents' Cyber Aggression.

    PubMed

    Wright, Michelle F

    2017-03-01

    The present study focused on the impact of gender and gender stereotype traits (i.e., masculinity, femininity) on cyber aggression perpetration utilizing different technologies (i.e., social-networking sites, gaming consoles, mobile phones) and behaviors (i.e., cyber relational aggression, cyber verbal aggression, hacking). Participants included 233 eighth graders (108 female; M age = 13.26, SD = 0.36) from two middle schools in the Midwestern United States. Adolescents completed questionnaires on their endorsement of masculinity and femininity traits as well as how often they engaged in cyber aggression perpetration (i.e., cyber relational aggression, cyber verbal aggression, hacking) through mobile phones, social-networking sites, and gaming consoles. Findings indicated that boys and girls with more feminine traits engaged in more cyber relational aggression through social-networking sites and mobile phones, while boys and girls who endorsed more masculine traits perpetrated this behavior and cyber verbal aggression more often through online gaming. In addition, these boys and girls engaged in more hacking through all technologies when compared with girls and boys who reported more feminine traits. Results of this study indicate the importance of delineating gender stereotype traits, behaviors, and technologies when examining cyber aggression perpetration.

  14. Three tenets for secure cyber-physical system design and assessment

    NASA Astrophysics Data System (ADS)

    Hughes, Jeff; Cybenko, George

    2014-06-01

    This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.

  15. CYBER 200 Applications Seminar

    NASA Technical Reports Server (NTRS)

    Gary, J. P. (Compiler)

    1984-01-01

    Applications suited for the CYBER 200 digital computer are discussed. Various areas of application including meteorology, algorithms, fluid dynamics, monte carlo methods, petroleum, electronic circuit simulation, biochemistry, lattice gauge theory, economics and ray tracing are discussed.

  16. Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach

    NASA Technical Reports Server (NTRS)

    Roy, Sandip; Sridhar, Banavar

    2016-01-01

    Air transportation networks are being disrupted with increasing frequency by failures in their cyber- (computing, communication, control) systems. Whether these cyber- failures arise due to deliberate attacks or incidental errors, they can have far-reaching impact on the performance of the air traffic control and management systems. For instance, a computer failure in the Washington DC Air Route Traffic Control Center (ZDC) on August 15, 2015, caused nearly complete closure of the Centers airspace for several hours. This closure had a propagative impact across the United States National Airspace System, causing changed congestion patterns and requiring placement of a suite of traffic management initiatives to address the capacity reduction and congestion. A snapshot of traffic on that day clearly shows the closure of the ZDC airspace and the resulting congestion at its boundary, which required augmented traffic management at multiple locations. Cyber- events also have important ramifications for private stakeholders, particularly the airlines. During the last few months, computer-system issues have caused several airlines fleets to be grounded for significant periods of time: these include United Airlines (twice), LOT Polish Airlines, and American Airlines. Delays and regional stoppages due to cyber- events are even more common, and may have myriad causes (e.g., failure of the Department of Homeland Security systems needed for security check of passengers, see [3]). The growing frequency of cyber- disruptions in the air transportation system reflects a much broader trend in the modern society: cyber- failures and threats are becoming increasingly pervasive, varied, and impactful. In consequence, an intense effort is underway to develop secure and resilient cyber- systems that can protect against, detect, and remove threats, see e.g. and its many citations. The outcomes of this wide effort on cyber- security are applicable to the air transportation infrastructure

  17. Uncovering the Structure of and Gender and Developmental Differences in Cyber Bullying

    ERIC Educational Resources Information Center

    Griezel, Lucy; Finger, Linda R.; Bodkin-Andrews, Gawaian H.; Craven, Rhonda G.; Yeung, Alexander Seeshing

    2012-01-01

    Although literature on traditional bullying is abundant, a limited body of sound empirical research exists regarding its newest form: cyber bullying. The sample comprised Australian secondary students (N = 803) and aimed to identify the underlying structure of cyber bullying, and differences in traditional and cyber bullying behaviors across…

  18. Evaluation of a complementary cyber education program for a pathophysiology class.

    PubMed

    Yoo, Ji-Soo; Ryue, Sook-Hee; Lee, Jung Eun; Ahn, Jeong-Ah

    2009-12-01

    The goal of this study was to develop and evaluate a complementary cyber education program for a required pathophysiology class for nursing students. The cyber education program comprised electronic bulletin boards, correspondence material storage, an announcement section, a report submission section, reference sites, and statistics on learning rates. Twelve online lectures complemented five lectures in the classroom. To evaluate the course's educational effectiveness, we performed an online objective questionnaire and an open questionnaire survey anonymously, and compared the complementary cyber education program with traditional classroom education. The complementary cyber education program effected significant improvements in scores for importance with regard to major, clarity of goals and education plans for courses, professor readiness, preciseness and description of lectures, amount and efficiency of assignments, and fairness in appraisal standards compared with the traditional classroom education group. This study indicates that a complementary cyber education program provides nursing students with the flexibility of time and space, the newest information through updated lectures, efficient motivational aids through intimacy between the lecturer and students, and concrete and meaningful tasks. The complementary cyber education course also increased student effort toward studying and student satisfaction with the class.

  19. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety

    PubMed Central

    Sackner-Bernstein, Jonathan

    2017-01-01

    Background: The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware. PMID:27837161

  20. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.

    PubMed

    Sackner-Bernstein, Jonathan

    2017-03-01

    The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.

  1. Dataset of anomalies and malicious acts in a cyber-physical subsystem.

    PubMed

    Laso, Pedro Merino; Brosset, David; Puentes, John

    2017-10-01

    This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios - Normal, aNomalies, breakdown, sabotages, and cyber-attacks - corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems.

  2. "They Sweat for Science": The Harvard Fatigue Laboratory and Self-Experimentation in American Exercise Physiology.

    PubMed

    Johnson, Andi

    2015-08-01

    In many scientific fields, the practice of self-experimentation waned over the course of the twentieth century. For exercise physiologists working today, however, the practice of self-experimentation is alive and well. This paper considers the role of the Harvard Fatigue Laboratory and its scientific director, D. Bruce Dill, in legitimizing the practice of self-experimentation in exercise physiology. Descriptions of self-experimentation are drawn from papers published by members of the Harvard Fatigue Lab. Attention is paid to the ethical and practical justifications for self-experimentation in both the lab and the field. Born out of the practical, immediate demands of fatigue protocols, self-experimentation performed the long-term, epistemological function of uniting physiological data across time and space, enabling researchers to contribute to a general human biology program.

  3. School Bullying Among US Adolescents: Physical, Verbal, Relational and Cyber

    PubMed Central

    Wang, Jing; Iannotti, Ronald J.; Nansel, Tonja R.

    2009-01-01

    Purpose Four forms of school bullying behaviors among US adolescents and their association with socio-demographic characteristics, parental support and friends were examined. Methods Data were obtained from the Health Behavior in School-Aged Children (HBSC) 2005 Survey, a nationally-representative sample of grades 6 to 10 (N = 7182). The Olweus Bully/Victim Questionnaire was used to measure physical, verbal and relational forms of bullying. Two items were added using the same format to measure cyber bullying. For each form, four categories were created: bully, victim, bully-victim, and not involved. Multinomial logistic regressions were applied, with socio-demographic variables, parental support and number of friends as predictors. Results Prevalence rates of having bullied others or having been bullied at school for at least once in the last 2 months were 20.8% physically, 53.6% verbally, 51.4% socially or 13.6% electronically. Boys were more involved in physical or verbal bullying, while girls were more involved in relational bullying. Boys were more likely to be cyber bullies, while girls were more likely to be cyber victims. African-American adolescents were involved in more bullying (physical, verbal or cyber) but less victimization (verbal or relational). Higher parental support was associated with less involvement across all forms and classifications of bullying. Having more friends was associated with more bullying and less victimization for physical, verbal and relational forms, but was not associated with cyber bullying. Conclusions Parental support may protect adolescents from all four forms of bullying. Friends associate differentially with traditional and cyber bullying. Results indicate that cyber bullying has a distinct nature from traditional bullying. PMID:19766941

  4. CYBER DETERRENCE

    DTIC Science & Technology

    2016-02-11

    directed.36 Protected systems operating on secure networks will weigh into the adversaries calculus of risk and cost of their actions versus this... calculus deterring them from attack. Our extended defense with forts and lookouts searching outside the perimeter providing current intelligence of any...Last accessed 30 January 2016). 51 Phil Stewart , U.S. Defense Chief says pre-emptive action possible over cyber threat, Oct 11, 2012, http

  5. Cyber Bullying: Overview and Strategies for School Counsellors, Guidance Officers, and All School Personnel

    ERIC Educational Resources Information Center

    Bhat, Christine Suniti

    2008-01-01

    Cyber bullying or bullying via information and communications technology tools such as the internet and mobile phones is a problem of growing concern with school-aged students. Cyber bullying actions may not take place on school premises, but detrimental effects are experienced by victims of cyber bullying in schools. Tools used by cyber bullies…

  6. Studying the Earth's Environment from Space: Computer Laboratory Exercised and Instructor Resources

    NASA Technical Reports Server (NTRS)

    Smith, Elizabeth A.; Alfultis, Michael

    1998-01-01

    Studying the Earth's Environment From Space is a two-year project to develop a suite of CD-ROMs containing Earth System Science curriculum modules for introductory undergraduate science classes. Lecture notes, slides, and computer laboratory exercises, including actual satellite data and software, are being developed in close collaboration with Carla Evans of NASA GSFC Earth Sciences Directorate Scientific and Educational Endeavors (SEE) project. Smith and Alfultis are responsible for the Oceanography and Sea Ice Processes Modules. The GSFC SEE project is responsible for Ozone and Land Vegetation Modules. This document constitutes a report on the first year of activities of Smith and Alfultis' project.

  7. Cyber anthropology or anthropology in cyberspace.

    PubMed

    Svilicić, Niksa

    2012-03-01

    As a variety of anthropology, cyber anthropology is considered to be the fastest growing sub branch in the science. It is based on synergic effects of multimedia systems and hypermedia, using their comparative advantages. One of the least researched fields of cyber anthropology is the relationship of individuals and social groups with a multimedia document in terms of their perception of such subject. This is because the foundation of social-informatics perception in the society is created based on the evidence of a real life, whereas here the perception is established at the level of virtual, i.e. online life. The rhetorical question here is whether an identical content causes the same or different user reactions, depending on whether it was perceived offline or online, i.e. to what extend does the medium (and not the information content) dictate the user perception. In this respect the research titled "Perception of online museum content creators and actual habits of Croatian online museum visitors" can be a "case study" for the impact of "cyber potential" on the classic anthropological paradigm.

  8. An Examination of the Partner Cyber Abuse Questionnaire in a College Student Sample

    PubMed Central

    Wolford-Clevenger, Caitlin; Zapor, Heather; Brasfield, Hope; Febres, Jeniimarie; Elmquist, JoAnna; Brem, Meagan; Shorey, Ryan C.; Stuart, Gregory L.

    2015-01-01

    Objective To examine the factor structure and convergent validity of a newly developed measure of an understudied form of partner abuse, cyber abuse, and to examine the prevalence of, and gender differences in, victimization by cyber abuse. Method College students in a dating relationship (N = 502) completed the Partner Cyber Abuse Questionnaire (Hamby, 2013), as well as measures of partner abuse victimization and depression. Results Using exploratory factor analysis, we determined a one-factor solution was the most statistically and conceptually best fitting model. The cyber abuse victimization factor was correlated with depressive symptoms and physical, psychological, and sexual partner abuse victimization, supporting the convergent validity of the measure. The overall prevalence of victimization by cyber abuse was 40%, with victimization by specific acts ranging from 2–31%. Men and women did not differ in their victimization by cyber abuse. Conclusions Cyber abuse is prevalent among college students and occurs concurrently with other partner abuse forms and depressive symptoms. Given the interrelated nature of partner abuse forms, prevention and intervention programs should address partner abuse occurring in-person and through technology. Cyber abuse should also be considered in the conceptualization and measurement of partner abuse to more fully understand this social problem. PMID:27014498

  9. Cyber Bullying and Traditional Bullying: Differential Association with Depression

    PubMed Central

    Wang, Jing; Nansel, Tonja R.; Iannotti, Ronald J.

    2010-01-01

    Purpose The study compared levels of depression among bullies, victims and bully-victims of traditional (physical, verbal and relational) and cyber bullying, and examined the association between depression and frequency of involvement in each form of bullying. Methods A U.S. nationally-representative sample of students in grades 6 to 10 (N = 7313) completed the bullying and depression items in the Health Behavior in School-Aged Children (HBSC) 2005 Survey. Results Depression was associated with each of four forms of bullying. Cyber victims reported higher depression than bullies or bully-victims, a finding not observed in other forms of bullying. For physical, verbal and relational bullies, victims and bully victims, the frequently-involved group reported significantly higher level of depression than the corresponding occasionally-involved group. For cyber bullying, differences were found only between occasional and frequent victims. Conclusion Findings indicate the importance of further study of cyber bullying as its association with depression is distinct from traditional forms of bullying. PMID:21402273

  10. Cyber bullying behaviors among middle and high school students.

    PubMed

    Mishna, Faye; Cook, Charlene; Gadalla, Tahany; Daciuk, Joanne; Solomon, Steven

    2010-07-01

    Little research has been conducted that comprehensively examines cyber bullying with a large and diverse sample. The present study examines the prevalence, impact, and differential experience of cyber bullying among a large and diverse sample of middle and high school students (N = 2,186) from a large urban center. The survey examined technology use, cyber bullying behaviors, and the psychosocial impact of bullying and being bullied. About half (49.5%) of students indicated they had been bullied online and 33.7% indicated they had bullied others online. Most bullying was perpetrated by and to friends and participants generally did not tell anyone about the bullying. Participants reported feeling angry, sad, and depressed after being bullied online. Participants bullied others online because it made them feel as though they were funny, popular, and powerful, although many indicated feeling guilty afterward. Greater attention is required to understand and reduce cyber bullying within children's social worlds and with the support of educators and parents.

  11. A Laboratory Exercise to Understand the Importance of Enzyme Technology in the Fruit-Processing Industry: Viscosity Decrease and Phenols Release from Apple Mash

    ERIC Educational Resources Information Center

    Pinelo, Manuel; Nielsen, Michael K.; Meyer, Anne S.

    2011-01-01

    In a 4-h laboratory exercise, students accomplish a series of enzymatic macerations of apple mash, assess the viscosity of the mash during the maceration, extract the juice by centrifugation, and measure the levels of antioxidant phenols extracted into the juice after different enzyme treatments. The exercise shows the impact of enzyme-catalyzed…

  12. Fraud in Academic Publishing: Researchers Under Cyber-Attacks.

    PubMed

    Dadkhah, Mehdi; Borchardt, Glenn; Maliszewski, Tomasz

    2017-01-01

    Day by day, researchers receive new suspicious e-mails in their inboxes. Many of them do not have sufficient information about these types of e-mails, and may become victims of cyber-attacks. In this short communication, we review current cyber threats in academic publishing and try to present general guidelines for authors. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT

    DTIC Science & Technology

    2017-04-05

    Cyber Strategic Approach The need to protect critical infrastructure, sensitive unclassified and classified data, and Command and Control systems that...high-reward approaches , particularly those that are non -material in nature. Finally, a systemic focus on feedback, memory and continuous...AIR WAR COLLEGE AIR UNIVERSITY AN ANTIFRAGILE APPROACH TO PREPARING FOR CYBER CONFLICT by Lance Baxter, Lt Col, USAF A Research

  14. Uncertainty and Risk Management in Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Li, Jason; Ou, Xinming; Rajagopalan, Raj

    Handling cyber threats unavoidably needs to deal with both uncertain and imprecise information. What we can observe as potential malicious activities can seldom give us 100% confidence on important questions we care about, e.g. what machines are compromised and what damage has been incurred. In security planning, we need information on how likely a vulnerability can lead to a successful compromise to better balance security and functionality, performance, and ease of use. These information are at best qualitative and are often vague and imprecise. In cyber situational awareness, we have to rely on such imperfect information to detect real attacks and to prevent an attack from happening through appropriate risk management. This chapter surveys existing technologies in handling uncertainty and risk management in cyber situational awareness.

  15. Laboratory Exercise for Studying the Morphology of Heat-Denatured and Amyloid Aggregates of Lysozyme by Atomic Force Microscopy

    ERIC Educational Resources Information Center

    Gokalp, Sumeyra; Horton, William; Jónsdóttir-Lewis, Elfa B.; Foster, Michelle; Török, Marianna

    2018-01-01

    To facilitate learning advanced instrumental techniques, essential tools for visualizing biomaterials, a simple and versatile laboratory exercise demonstrating the use of Atomic Force Microscopy (AFM) in biomedical applications was developed. In this experiment, the morphology of heat-denatured and amyloid-type aggregates formed from a low-cost…

  16. Physiology of Angina and Its Alleviation With Nitroglycerin: Insights From Invasive Catheter Laboratory Measurements During Exercise.

    PubMed

    Asrress, Kaleab N; Williams, Rupert; Lockie, Timothy; Khawaja, Muhammed Z; De Silva, Kalpa; Lumley, Matthew; Patterson, Tiffany; Arri, Satpal; Ihsan, Sana; Ellis, Howard; Guilcher, Antoine; Clapp, Brian; Chowienczyk, Philip J; Plein, Sven; Perera, Divaka; Marber, Michael S; Redwood, Simon R

    2017-07-04

    The mechanisms governing exercise-induced angina and its alleviation by the most commonly used antianginal drug, nitroglycerin, are incompletely understood. The purpose of this study was to develop a method by which the effects of antianginal drugs could be evaluated invasively during physiological exercise to gain further understanding of the clinical impact of angina and nitroglycerin. Forty patients (mean age, 65.2±7.6 years) with exertional angina and coronary artery disease underwent cardiac catheterization via radial access and performed incremental exercise using a supine cycle ergometer. As they developed limiting angina, sublingual nitroglycerin was administered to half the patients, and all patients continued to exercise for 2 minutes at the same workload. Throughout exercise, distal coronary pressure and flow velocity and central aortic pressure were recorded with sensor wires. Patients continued to exercise after nitroglycerin administration with less ST-segment depression ( P =0.003) and therefore myocardial ischemia. Significant reductions in afterload (aortic pressure, P =0.030) and myocardial oxygen demand were seen (tension-time index, P =0.024; rate-pressure product, P =0.046), as well as an increase in myocardial oxygen supply (Buckberg index, P =0.017). Exercise reduced peripheral arterial wave reflection ( P <0.05), which was not further augmented by the administration of nitroglycerin ( P =0.648). The observed increases in coronary pressure gradient, stenosis resistance, and flow velocity did not reach statistical significance; however, the diastolic velocity-pressure gradient relation was consistent with a significant increase in relative stenosis severity (k coefficient, P <0.0001), in keeping with exercise-induced vasoconstriction of stenosed epicardial segments and dilatation of normal segments, with trends toward reversal with nitroglycerin. The catheterization laboratory protocol provides a model to study myocardial ischemia and the

  17. A Deeper Level of Network Intelligence: Combating Cyber Warfare

    DTIC Science & Technology

    2010-04-01

    A Deeper Level of Network Intelligence: Combating Cyber Warfare This information is provided for your review only and is not for any distribution...A Deeper Level of Network Intelligence: Combating Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  18. 21st Century Cyber Security: Legal Authorities and Requirements

    DTIC Science & Technology

    2012-03-22

    Cyber warfare has risen to the level of strategic effect. Exigent threats in cyberspace are a critical U.S. strategic vulnerability for which U.S...operations cross many sections of United States Code. But, they have not yielded a genuine whole-of-government approach. This SRP argues that cyber warfare has

  19. A meta-analysis of sex differences in cyber-bullying behavior: the moderating role of age.

    PubMed

    Barlett, Christopher; Coyne, Sarah M

    2014-01-01

    The current research used meta-analysis to determine whether (a) sex differences emerged in cyber-bullying frequency, (b) if age moderated any sex effect, and (c) if any additional moderators (e.g., publication year and status, country and continent of data collection) influenced the sex effect. Theoretically, if cyber-bullying is considered a form of traditional bullying and aggression, males are likely to cyber-bully more than females. Conversely, if cyber-bullying is considered relational/indirect aggression, females will be slightly more likely to cyber-bully than males. Results from 122 effect size estimates showed that males were slightly more likely to cyber-bully than females; however, age moderated the overall effect. Specifically, females were more likely to report cyber-bullying during early to mid-adolescence than males, while males showed higher levels of cyber-bullying during later adolescence than females. Publication status and year and continent and country of data collection also moderated the overall effect. © 2014 Wiley Periodicals, Inc.

  20. Musk as a Pheromone? Didactic Exercise.

    ERIC Educational Resources Information Center

    Bersted, Chris T.

    A classroom/laboratory exercise has been used to introduce college students to factorial research designs, differentiate between interpretations for experimental and quasi-experimental variables, and exemplify application of laboratory research methods to test practical questions (advertising claims). The exercise involves having randomly divided…

  1. Cyber-Dependent Crime Victimization: The Same Risk for Everyone?

    PubMed

    Bergmann, Marie Christine; Dreißigacker, Arne; von Skarczinski, Bennet; Wollinger, Gina Rosa

    2018-02-01

    The Internet has simplified daily life activities. However, besides its comfortability, the Internet also presents the risk of victimization by several kinds of crimes. The present article addresses the question of which factors influence cyber-dependent crime and how they vary between three kinds of cyber-dependent offences: malware infection, ransomware infection, and misuse of personal data. According to the Routine Activity Approach, it is assumed that crime is determined by a motivated offender, the behavior of the Internet user, and the existence of prevention factors. Our analyses were based on a random sample of 26,665 Internet users in two federal states in Germany, aged 16 years and older; 16.6 percent of the respondents had experienced at least one form of cyber-dependent victimization during the year 2014. The results indicate that individual and household factors, as well as online and prevention behavior, influence the risk of cyber-dependent victimization. Furthermore, the effects differ between the three types of offences. In conclusion, the risk of being victimized by cyber-dependent crime is not the same for anyone, but depends on multivariate factors according to the idea of Routine Activity Approach. However, in view of the fact that crime-related factors also matter, studying different cybercrime offences separately seems to be an appropriate research approach.

  2. NATO’s Options for Defensive Cyber Against Non-State Actors

    DTIC Science & Technology

    2013-04-01

    services to cyber criminals and hacker patriots.”33 The FSB had maintained an unsavory relationship with hackers since the early 1990s; 9 Oleg...responsibility under international law to stop the DDOS being facilitated by botnet controllers located within its geographic borders, and prosecute the cyber ... criminals involved. “Rule 5” of the Tallinn Manual addresses the cyber responsibility of a nation-state: “A State shall not knowingly allow the

  3. Sharing the Cyber Journey

    DTIC Science & Technology

    2012-01-01

    destroy information; disrupt networks or communications; or deny service. In military terms, cyberspace is a contested environment. Hactivists, cyber ... criminals , terrorists, and adversarial nations are active in cyberspace networks across the globe; our military networks are no excep­ tion. DoD

  4. Hurtful Cyber-Teasing and Violence: Who's Laughing out Loud?

    ERIC Educational Resources Information Center

    Madlock, Paul E.; Westerman, David

    2011-01-01

    The current study sought to specifically examine the affect of teasing by way of technology (cyber-teasing) and the importance of the redressive component of a tease. A triangulated approach was used here to gain better insight into the concept of "hurtful" cyber-teasing between romantic partners. A pretheoretical model was developed…

  5. Cyber physical systems role in manufacturing technologies

    NASA Astrophysics Data System (ADS)

    Al-Ali, A. R.; Gupta, Ragini; Nabulsi, Ahmad Al

    2018-04-01

    Empowered by the recent development in single System-on-Chip, Internet of Things, and cloud computing technologies, cyber physical systems are evolving as a major controller during and post the manufacturing products process. In additional to their real physical space, cyber products nowadays have a virtual space. A product virtual space is a digital twin that is attached to it to enable manufacturers and their clients to better manufacture, monitor, maintain and operate it throughout its life time cycles, i.e. from the product manufacturing date, through operation and to the end of its lifespan. Each product is equipped with a tiny microcontroller that has a unique identification number, access code and WiFi conductivity to access it anytime and anywhere during its life cycle. This paper presents the cyber physical systems architecture and its role in manufacturing. Also, it highlights the role of Internet of Things and cloud computing in industrial manufacturing and factory automation.

  6. RENEB accident simulation exercise.

    PubMed

    Brzozowska, Beata; Ainsbury, Elizabeth; Baert, Annelot; Beaton-Green, Lindsay; Barrios, Leonardo; Barquinero, Joan Francesc; Bassinet, Celine; Beinke, Christina; Benedek, Anett; Beukes, Philip; Bortolin, Emanuela; Buraczewska, Iwona; Burbidge, Christopher; De Amicis, Andrea; De Angelis, Cinzia; Della Monaca, Sara; Depuydt, Julie; De Sanctis, Stefania; Dobos, Katalin; Domene, Mercedes Moreno; Domínguez, Inmaculada; Facco, Eva; Fattibene, Paola; Frenzel, Monika; Monteiro Gil, Octávia; Gonon, Géraldine; Gregoire, Eric; Gruel, Gaëtan; Hadjidekova, Valeria; Hatzi, Vasiliki I; Hristova, Rositsa; Jaworska, Alicja; Kis, Enikő; Kowalska, Maria; Kulka, Ulrike; Lista, Florigio; Lumniczky, Katalin; Martínez-López, Wilner; Meschini, Roberta; Moertl, Simone; Moquet, Jayne; Noditi, Mihaela; Oestreicher, Ursula; Orta Vázquez, Manuel Luis; Palma, Valentina; Pantelias, Gabriel; Montoro Pastor, Alegria; Patrono, Clarice; Piqueret-Stephan, Laure; Quattrini, Maria Cristina; Regalbuto, Elisa; Ricoul, Michelle; Roch-Lefevre, Sandrine; Roy, Laurence; Sabatier, Laure; Sarchiapone, Lucia; Sebastià, Natividad; Sommer, Sylwester; Sun, Mingzhu; Suto, Yumiko; Terzoudi, Georgia; Trompier, Francois; Vral, Anne; Wilkins, Ruth; Zafiropoulos, Demetre; Wieser, Albrecht; Woda, Clemens; Wojcik, Andrzej

    2017-01-01

    The RENEB accident exercise was carried out in order to train the RENEB participants in coordinating and managing potentially large data sets that would be generated in case of a major radiological event. Each participant was offered the possibility to activate the network by sending an alerting email about a simulated radiation emergency. The same participant had to collect, compile and report capacity, triage categorization and exposure scenario results obtained from all other participants. The exercise was performed over 27 weeks and involved the network consisting of 28 institutes: 21 RENEB members, four candidates and three non-RENEB partners. The duration of a single exercise never exceeded 10 days, while the response from the assisting laboratories never came later than within half a day. During each week of the exercise, around 4500 samples were reported by all service laboratories (SL) to be examined and 54 scenarios were coherently estimated by all laboratories (the standard deviation from the mean of all SL answers for a given scenario category and a set of data was not larger than 3 patient codes). Each participant received training in both the role of a reference laboratory (activating the network) and of a service laboratory (responding to an activation request). The procedures in the case of radiological event were successfully established and tested.

  7. Autonomous perception and decision making in cyber-physical systems

    NASA Astrophysics Data System (ADS)

    Sarkar, Soumik

    2011-07-01

    The cyber-physical system (CPS) is a relatively new interdisciplinary technology area that includes the general class of embedded and hybrid systems. CPSs require integration of computation and physical processes that involves the aspects of physical quantities such as time, energy and space during information processing and control. The physical space is the source of information and the cyber space makes use of the generated information to make decisions. This dissertation proposes an overall architecture of autonomous perception-based decision & control of complex cyber-physical systems. Perception involves the recently developed framework of Symbolic Dynamic Filtering for abstraction of physical world in the cyber space. For example, under this framework, sensor observations from a physical entity are discretized temporally and spatially to generate blocks of symbols, also called words that form a language. A grammar of a language is the set of rules that determine the relationships among words to build sentences. Subsequently, a physical system is conjectured to be a linguistic source that is capable of generating a specific language. The proposed technology is validated on various (experimental and simulated) case studies that include health monitoring of aircraft gas turbine engines, detection and estimation of fatigue damage in polycrystalline alloys, and parameter identification. Control of complex cyber-physical systems involve distributed sensing, computation, control as well as complexity analysis. A novel statistical mechanics-inspired complexity analysis approach is proposed in this dissertation. In such a scenario of networked physical systems, the distribution of physical entities determines the underlying network topology and the interaction among the entities forms the abstract cyber space. It is envisioned that the general contributions, made in this dissertation, will be useful for potential application areas such as smart power grids and

  8. Species identification in forensic samples using the SPInDel approach: A GHEP-ISFG inter-laboratory collaborative exercise.

    PubMed

    Alves, Cíntia; Pereira, Rui; Prieto, Lourdes; Aler, Mercedes; Amaral, Cesar R L; Arévalo, Cristina; Berardi, Gabriela; Di Rocco, Florencia; Caputo, Mariela; Carmona, Cristian Hernandez; Catelli, Laura; Costa, Heloísa Afonso; Coufalova, Pavla; Furfuro, Sandra; García, Óscar; Gaviria, Anibal; Goios, Ana; Gómez, Juan José Builes; Hernández, Alexis; Hernández, Eva Del Carmen Betancor; Miranda, Luís; Parra, David; Pedrosa, Susana; Porto, Maria João Anjos; Rebelo, Maria de Lurdes; Spirito, Matteo; Torres, María Del Carmen Villalobos; Amorim, António; Pereira, Filipe

    2017-05-01

    DNA is a powerful tool available for forensic investigations requiring identification of species. However, it is necessary to develop and validate methods able to produce results in degraded and or low quality DNA samples with the high standards obligatory in forensic research. Here, we describe a voluntary collaborative exercise to test the recently developed Species Identification by Insertions/Deletions (SPInDel) method. The SPInDel kit allows the identification of species by the generation of numeric profiles combining the lengths of six mitochondrial ribosomal RNA (rRNA) gene regions amplified in a single reaction followed by capillary electrophoresis. The exercise was organized during 2014 by a Working Commission of the Spanish and Portuguese-Speaking Working Group of the International Society for Forensic Genetics (GHEP-ISFG), created in 2013. The 24 participating laboratories from 10 countries were asked to identify the species in 11 DNA samples from previous GHEP-ISFG proficiency tests using a SPInDel primer mix and control samples of the 10 target species. A computer software was also provided to the participants to assist the analyses of the results. All samples were correctly identified by 22 of the 24 laboratories, including samples with low amounts of DNA (hair shafts) and mixtures of saliva and blood. Correct species identifications were obtained in 238 of the 241 (98.8%) reported SPInDel profiles. Two laboratories were responsible for the three cases of misclassifications. The SPInDel was efficient in the identification of species in mixtures considering that only a single laboratory failed to detect a mixture in one sample. This result suggests that SPInDel is a valid method for mixture analyses without the need for DNA sequencing, with the advantage of identifying more than one species in a single reaction. The low frequency of wrong (5.0%) and missing (2.1%) alleles did not interfere with the correct species identification, which demonstrated the

  9. Cyber Attacks, Attribution, and Deterrence: Three Case Studies

    DTIC Science & Technology

    2015-05-23

    threat informs his decision about the appropriate deterrent counter-threats. There tend to be three camps in general: Minimalists , Moderates, and...Alarmists. Minimalists do not require much explanation because they are the authors who believe that cyber does not pose any significant threat...Armageddon.”32 Amongst the minimalists are Lawrence Freedman and Thomas Rid. Freedman grants discussion of cyber attacks a scant two pages in his seven

  10. Institutional Foundations for Cyber Security: Current Responses and New Challenges

    DTIC Science & Technology

    2010-09-01

    endowed with regional authority, they remain restricted in their capacity to respond to cyber criminals . National CERTs occupy a first-line responder role...economiccrime/ cybercrime/Documents/CountryProfiles/default_en.asp Federal Bureau of Investigation. (2006). Netting cyber criminals . Retrieved on February

  11. Pencil-and-Paper Neural Networks: An Undergraduate Laboratory Exercise in Computational Neuroscience

    PubMed Central

    Crisp, Kevin M.; Sutter, Ellen N.; Westerberg, Jacob A.

    2015-01-01

    Although it has been more than 70 years since McCulloch and Pitts published their seminal work on artificial neural networks, such models remain primarily in the domain of computer science departments in undergraduate education. This is unfortunate, as simple network models offer undergraduate students a much-needed bridge between cellular neurobiology and processes governing thought and behavior. Here, we present a very simple laboratory exercise in which students constructed, trained and tested artificial neural networks by hand on paper. They explored a variety of concepts, including pattern recognition, pattern completion, noise elimination and stimulus ambiguity. Learning gains were evident in changes in the use of language when writing about information processing in the brain. PMID:26557791

  12. The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance

    PubMed Central

    Dawson, Jessica; Thomson, Robert

    2018-01-01

    One of the challenges in writing an article reviewing the current state of cyber education and workforce development is that there is a paucity of quantitative assessment regarding the cognitive aptitudes, work roles, or team organization required by cybersecurity professionals to be successful. In this review, we argue that the people who operate within the cyber domain need a combination of technical skills, domain specific knowledge, and social intelligence to be successful. They, like the networks they operate, must also be reliable, trustworthy, and resilient. Defining the knowledge, skills, attributes, and other characteristics is not as simple as defining a group of technical skills that people can be trained on; the complexity of the cyber domain makes this a unique challenge. There has been little research devoted to exactly what attributes individuals in the cyber domain need. What research does exist places an emphasis on technical and engineering skills while discounting the important social and organizational influences that dictate success or failure in everyday settings. This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars. PMID:29946276

  13. The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.

    PubMed

    Dawson, Jessica; Thomson, Robert

    2018-01-01

    One of the challenges in writing an article reviewing the current state of cyber education and workforce development is that there is a paucity of quantitative assessment regarding the cognitive aptitudes, work roles, or team organization required by cybersecurity professionals to be successful. In this review, we argue that the people who operate within the cyber domain need a combination of technical skills, domain specific knowledge, and social intelligence to be successful. They, like the networks they operate, must also be reliable, trustworthy, and resilient. Defining the knowledge, skills, attributes, and other characteristics is not as simple as defining a group of technical skills that people can be trained on; the complexity of the cyber domain makes this a unique challenge. There has been little research devoted to exactly what attributes individuals in the cyber domain need. What research does exist places an emphasis on technical and engineering skills while discounting the important social and organizational influences that dictate success or failure in everyday settings. This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars.

  14. Cyber Security for Lighting Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    Fact sheet discusses cyber threats unique to lighting control systems in buildings and helps facility managers identify the types of lighting control systems that could introduce cybersecurity risks. Download the fact sheet.

  15. A Markov game theoretic data fusion approach for cyber situational awareness

    NASA Astrophysics Data System (ADS)

    Shen, Dan; Chen, Genshe; Cruz, Jose B., Jr.; Haynes, Leonard; Kruger, Martin; Blasch, Erik

    2007-04-01

    This paper proposes an innovative data-fusion/ data-mining game theoretic situation awareness and impact assessment approach for cyber network defense. Alerts generated by Intrusion Detection Sensors (IDSs) or Intrusion Prevention Sensors (IPSs) are fed into the data refinement (Level 0) and object assessment (L1) data fusion components. High-level situation/threat assessment (L2/L3) data fusion based on Markov game model and Hierarchical Entity Aggregation (HEA) are proposed to refine the primitive prediction generated by adaptive feature/pattern recognition and capture new unknown features. A Markov (Stochastic) game method is used to estimate the belief of each possible cyber attack pattern. Game theory captures the nature of cyber conflicts: determination of the attacking-force strategies is tightly coupled to determination of the defense-force strategies and vice versa. Also, Markov game theory deals with uncertainty and incompleteness of available information. A software tool is developed to demonstrate the performance of the high level information fusion for cyber network defense situation and a simulation example shows the enhanced understating of cyber-network defense.

  16. Disentangling functions of online aggression: The Cyber-Aggression Typology Questionnaire (CATQ).

    PubMed

    Runions, Kevin C; Bak, Michal; Shaw, Thérèse

    2017-01-01

    Aggression in online contexts has received much attention over the last decade, yet there is a need for measures identifying the proximal psychological drivers of cyber-aggressive behavior. The purpose of this study was to present data on the newly developed Cyber-Aggression Typology Questionnaire (CATQ) designed to distinguish between four distinct types of cyber-aggression on dimensions of motivational valence and self-control. A sample 314 undergraduate students participated in the study. The results confirmed the predicted four-factor structure providing evidence for distinct and independent impulsive-aversive, controlled-aversive, impulsive-appetitive, and controlled-appetitive cyber-aggression types. Further analyses with the Berlin Cyberbullying Questionnaire, Reactive Proactive Aggression Questionnaire, and the Behavior Inhibition and Activation Systems Scale provide support for convergent and divergent validity. Understanding the motivations facilitating cyber-aggressive behavior could aid researchers in the development of new prevention and intervention strategies that focus on individual differences in maladaptive proximal drivers of aggression. Aggr. Behav. 43:74-84, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  17. Cyber dating abuse: prevalence, context, and relationship with offline dating aggression.

    PubMed

    Borrajo, E; Gámez-Guadix, M; Calvete, E

    2015-04-01

    The use of information and communication technologies (ICT) as tools to intimidate, harass, and control the partner has been, so far, little studied in the literature. The aim of this study was to determine the extension and sex differences of victimization of cyber dating abuse, as well as the context in which it occurs, and its relationship with offline psychological and physical aggressions. The sample consisted of 433 college students ages 18 to 30 years. The results showed that over 50% of the participants had been victims of some type of cyber dating abuse in the last six months. The most common behavior was the use of ICT to control the partner. Also, victims of cyber dating abuse were victimized repeatedly, an average of 23 times in the last six months. The data also showed that cyber dating abuse appear usually in a context of jealousy. Finally, the results revealed a significant relationship between cyber dating abuse and offline psychological dating aggressions. Limitations and future lines of research are discussed.

  18. The Language Laboratory.

    ERIC Educational Resources Information Center

    Hughes, John P.

    Concepts pertaining to the language laboratory are clarified for the layman unfamiliar with recent educational developments in foreign language instruction. These include discussion of: (1) language laboratory components and functions, (2) techniques used in the laboratory, (3) new linguistic methods, (4) laboratory exercises, (5) traditional…

  19. Consequence-driven cyber-informed engineering (CCE)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Freeman, Sarah G.; St Michel, Curtis; Smith, Robert

    The Idaho National Lab (INL) is leading a high-impact, national security-level initiative to reprioritize the way the nation looks at high-consequence risk within the industrial control systems (ICS) environment of the country’s most critical infrastructure and other national assets. The Consequence-driven Cyber-informed Engineering (CCE) effort provides both private and public organizations with the steps required to examine their own environments for high-impact events/risks; identify implementation of key devices and components that facilitate that risk; illuminate specific, plausible cyber attack paths to manipulate these devices; and develop concrete mitigations, protections, and tripwires to address the high-consequence risk. The ultimate goal ofmore » the CCE effort is to help organizations take the steps necessary to thwart cyber attacks from even top-tier, highly resourced adversaries that would result in a catastrophic physical effect. CCE participants are encouraged to work collaboratively with each other and with key U.S. Government (USG) contributors to establish a coalition, maximizing the positive effect of lessons-learned and further contributing to the protection of critical infrastructure and other national assets.« less

  20. Laboratory and field evaluation of the impact of exercise on the performance of regular and polymer-based deet repellents.

    PubMed

    Schofield, Steven; Tepper, Martin; Gadawski, Randy

    2007-11-01

    Studies were done in Manitoba, Canada, to evaluate the impact of exercise on repellent performance against mosquitoes. Two products containing the active ingredient N,N-diethyl-3-methylbenzamide (deet) were tested; one product was a polymer-based cream (3M Ultrathon Insect Repellent) and the other product was an alcohol-based pump spray formulation (Muskol Insect Repellent). Assessments were done in the laboratory using Aedes aegypti (L.) and in the field with naturally occurring populations of mosquitoes. Repellent was applied to the forearms (laboratory) or a lower leg (field) of test subjects at 1.5 g of test product per 600 cm2 surface area (0.75 or 0.83 mg deet/cm2). For a given test day, subjects exercised or did not. Exposure to mosquito attack was for 1 min at 30-min intervals in laboratory procedures, and it was continuous in field tests. Performance was measured as complete protection time (CPT). Moderate levels of physical activity resulted in a >40% decline in mean CPT, from 468 to 267 min in the laboratory experiments and from 359 to 203 min in field tests. Repellent product did not affect the magnitude of the decline. Mean biting pressure during field trials was 21.3 bites per min, and mosquito collections were made up primarily of Ochlerotatus sticticus (Meigen) and Aedes vexans (Meigen).

  1. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglectedmore » or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .« less

  2. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.

    PubMed

    Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde

    2013-06-01

    To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.

  3. Adolescents and Cyber Bullying: The Precaution Adoption Process Model

    ERIC Educational Resources Information Center

    Chapin, John

    2016-01-01

    A survey of adolescents (N = 1,488) documented Facebook use and experience with cyber bullying. The study found that 84% of adolescents (middle school through college undergraduates) use Facebook, and that most users log on daily. While 30% of the sample reported being cyber bullied, only 12.5% quit using the site, and only 18% told a parent or…

  4. Harmonization of European laboratory response networks by implementing CWA 15793: use of a gap analysis and an "insider" exercise as tools.

    PubMed

    Sundqvist, Bo; Bengtsson, Ulrika Allard; Wisselink, Henk J; Peeters, Ben P H; van Rotterdam, Bart; Kampert, Evelien; Bereczky, Sándor; Johan Olsson, N G; Szekely Björndal, Asa; Zini, Sylvie; Allix, Sébastien; Knutsson, Rickard

    2013-09-01

    Laboratory response networks (LRNs) have been established for security reasons in several countries including the Netherlands, France, and Sweden. LRNs function in these countries as a preparedness measure for a coordinated diagnostic response capability in case of a bioterrorism incident or other biocrimes. Generally, these LRNs are organized on a national level. The EU project AniBioThreat has identified the need for an integrated European LRN to strengthen preparedness against animal bioterrorism. One task of the AniBioThreat project is to suggest a plan to implement laboratory biorisk management CWA 15793:2011 (CWA 15793), a management system built on the principle of continual improvement through the Plan-Do-Check-Act (PDCA) cycle. The implementation of CWA 15793 can facilitate trust and credibility in a future European LRN and is an assurance that the work done at the laboratories is performed in a structured way with continuous improvements. As a first step, a gap analysis was performed to establish the current compliance status of biosafety and laboratory biosecurity management with CWA 15793 in 5 AniBioThreat partner institutes in France (ANSES), the Netherlands (CVI and RIVM), and Sweden (SMI and SVA). All 5 partners are national and/or international laboratory reference institutes in the field of public or animal health and possess high-containment laboratories and animal facilities. The gap analysis showed that the participating institutes already have robust biorisk management programs in place, but several gaps were identified that need to be addressed. Despite differences between the participating institutes in their compliance status, these variations are not significant. Biorisk management exercises also have been identified as a useful tool to control compliance status and thereby implementation of CWA 15793. An exercise concerning an insider threat and loss of a biological agent was performed at SVA in the AniBioThreat project to evaluate

  5. FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER PHYSICAL SYSTEMS

    DTIC Science & Technology

    2018-02-23

    FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER- PHYSICAL SYSTEMS UNIVERSITY OF TEXAS AT ARLINGTON FEBRUARY 2018 FINAL...COVERED (From - To) APR 2015 – APR 2017 4. TITLE AND SUBTITLE FORMAL MODELING, MONITORING, AND CONTROL OF EMERGENCE IN DISTRIBUTED CYBER- PHYSICAL ...dated 16 Jan 09 13. SUPPLEMENTARY NOTES 14. ABSTRACT This project studied emergent behavior in distributed cyber- physical systems (DCPS). Emergent

  6. Mitigating Cyber Security Risk in Satellite Ground Systems

    DTIC Science & Technology

    2015-04-01

    because cyber security in government remains shrouded in secrecy. However, using the Defense Operational Test and Evaluation Office’s (DOT& E ) FY14...report on cybersecurity one grasps the seriousness of the problem. DOT& E reported only 85% of networks in DoD were compliant with the cyber...security regulations discussed later in this paper. Not until compliance is near 100% could DOT& E conceive with confidence that DoD networks were safe

  7. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describemore » the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.« less

  8. Cyber Power Potential of the Army’s Reserve Component

    DTIC Science & Technology

    2017-01-01

    and could extend logically to include electric power, water, food, railway, gas pipelines , and so forth. One consideration to note is that in cases...29 CHAPTER FOUR Army Reserve Component Cyber Inventory Analysis .......................... 31...Background and Analytical Framework ........................................................... 31 Army Reserve Component Cyber Inventory Analysis , 2015

  9. A Simple Lab Exercise Demonstrating Koch's Postulates.

    ERIC Educational Resources Information Center

    Fulton, Michael M.

    1981-01-01

    Describes a laboratory exercise which applies Koch's Postulates to a plant disease, bacterial speck. Includes an explanation of Koch's Postulate, list of equipment needed, advance preparation, outline of the three-week activity, and variations of the laboratory exercise. (DS)

  10. Cyber secure systems approach for NPP digital control systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCreary, T. J.; Hsu, A.

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder

  11. Cyber-physical approach to the network-centric robotics control task

    NASA Astrophysics Data System (ADS)

    Muliukha, Vladimir; Ilyashenko, Alexander; Zaborovsky, Vladimir; Lukashin, Alexey

    2016-10-01

    Complex engineering tasks concerning control for groups of mobile robots are developed poorly. In our work for their formalization we use cyber-physical approach, which extends the range of engineering and physical methods for a design of complex technical objects by researching the informational aspects of communication and interaction between objects and with an external environment [1]. The paper analyzes network-centric methods for control of cyber-physical objects. Robots or cyber-physical objects interact with each other by transmitting information via computer networks using preemptive queueing system and randomized push-out mechanism [2],[3]. The main field of application for the results of our work is space robotics. The selection of cyber-physical systems as a special class of designed objects is due to the necessity of integrating various components responsible for computing, communications and control processes. Network-centric solutions allow using universal means for the organization of information exchange to integrate different technologies for the control system.

  12. An Examination of the Relationship between Self-Control and Cyber Victimization in Adolescents

    ERIC Educational Resources Information Center

    Peker, Adem

    2017-01-01

    Purpose: Cyber bullying is a new phenomenon which adversely affects young people. Exposure to the cyber bullying can negatively affect the mental health. The aim of this study is to examine the predictive effect of self-control on cyber victimization in adolescents. Research Methods: The study group was composed of 353 Turkish secondary school…

  13. A Better State of War: Surmounting the Ethical Cliff in Cyber Warfare

    DTIC Science & Technology

    2014-06-01

    This study analyzes the emergent field of cyber warfare through the lens of commonly-accepted tenets of ethical warfare. By comparing the...foundational understanding of concepts that determine the justice of wars (jus ad bellum) and justice in war (jus en bello) with the capabilities cyber warfare offers...analyzing how cyber warfare affects each of the core concepts introduced above. The fourth chapter presents a case study that tests the theoretical

  14. Adolescents' Cyber Aggression Perpetration and Cyber Victimization: The Longitudinal Associations with School Functioning

    ERIC Educational Resources Information Center

    Wright, Michelle F.

    2015-01-01

    The literature on cyber aggression is advancing, revealing many risk factors associated with the involvement in these behaviors. Academic correlates, particularly academic performance, have received some attention, with few studies utilizing longitudinal designs. The present study examined these associations among 673 8th graders (51% female) from…

  15. Developing the Cyber Defenders of Tomorrow with Regional Collegiate Cyber Defense Competitions (CCDC)

    ERIC Educational Resources Information Center

    Carlin, Anna; Manson, Daniel P.; Zhu, Jake

    2010-01-01

    With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…

  16. ORGANIZING, TRAINING, AND RETAINING INTELLIGENCE PROFESSIONALS FOR CYBER OPERATIONS

    DTIC Science & Technology

    2016-02-13

    in Education,” Preventing School Failure 57(3), (2013): 162-170. Wall , Andru, “Demystifying the Title 10-Title 50 Debate,” Harvard Law School...AIR WAR COLLEGE AIR UNIVERSITY ORGANIZING, TRAINING, AND RETAINING INTELLIGENCE PROFESSIONALS FOR CYBER OPERATIONS by Melissa A...to adequately organize, train and retain cyber expertise. This is especially true within Air Force intelligence, a critical component of the

  17. Cyber risk and privacy liability: a click in the right direction?

    PubMed

    McDonough, William J

    2007-01-01

    Cyber risk and privacy exposure exert an impact upon virtually every aspect of a healthcare organization (HCO)--assets, clinical operations, finances and reputation. Exposure is enterprise-wide and includes risk to both physical and non-physical assets in increasing degrees. The consequences of a cyber attack or privacy breach could be operationally and financially catastrophic, so an HCO's move toward an enterprise-wide approach at identifying and minimizing risk, cyber and privacy liability should be on the radar screen for risk managers and leadership.

  18. The Effectiveness of Hands-on Health Informatics Skills Exercises in the Multidisciplinary Smart Home Healthcare and Health Informatics Training Laboratories.

    PubMed

    Sapci, A H; Sapci, H A

    2017-10-01

    This article aimed to evaluate the effectiveness of newly established innovative smart home healthcare and health informatics laboratories, and a novel laboratory course that focuses on experiential health informatics training, and determine students' self-confidence to operate wireless home health monitoring devices before and after the hands-on laboratory course. Two web-based pretraining and posttraining questionnaires were sent to 64 students who received hands-on training with wireless remote patient monitoring devices in smart home healthcare and health informatics laboratories. All 64 students completed the pretraining survey (100% response rate), and 49 students completed the posttraining survey (76% response rate). The quantitative data analysis showed that 95% of students had an interest in taking more hands-on laboratory courses. Sixty-seven percent of students had no prior experience with medical image, physiological data acquisition, storage, and transmission protocols. After the hands-on training session, 75.51% of students expressed improved confidence about training patients to measure blood pressure monitor using wireless devices. Ninety percent of students preferred to use a similar experiential approach in their future learning experience. Additionally, the qualitative data analysis demonstrated that students were expecting to have more courses with hands-on exercises and integration of technology-enabled delivery and patient monitoring concepts into the curriculum. This study demonstrated that the multidisciplinary smart home healthcare and health informatics training laboratories and the hands-on exercises improved students' technology adoption rates and their self-confidence in using wireless patient monitoring devices. Schattauer GmbH Stuttgart.

  19. How is cyber threat evolving and what do organisations need to consider?

    PubMed

    Borrett, Martin; Carter, Roger; Wespi, Andreas

    Organisations and members of the public are becoming accustomed to the increasing velocity, frequency and variety of cyber-attacks that they have been facing over the last few years. In response to this challenge, it is important to explore what can be done to offer commercial and private users a reliable and functioning environment. This paper discusses how cyber threats might evolve in the future and seeks to explore these threats more fully. Attention is paid to the changing nature of cyber-attackers and their motivations and what this means for organisations. Finally, useful and actionable steps are provided, which practitioners can use to understand how they can start to address the future challenges of cyber security.

  20. CyberMedVPS: visual programming for development of simulators.

    PubMed

    Morais, Aline M; Machado, Liliane S

    2011-01-01

    Computer applications based on Virtual Reality (VR) has been outstanding in training and teaching in the medical filed due to their ability to simulate realistic in which users can practice skills and decision making in different situations. But was realized in these frameworks a hard interaction of non-programmers users. Based on this problematic will be shown the CyberMedVPS, a graphical module which implement Visual Programming concepts to solve an interaction trouble. Frameworks to develop such simulators are available but their use demands knowledge of programming. Based on this problematic will be shown the CyberMedVPS, a graphical module for the CyberMed framework, which implements Visual Programming concepts to allow the development of simulators by non-programmers professionals of the medical field.

  1. Longitudinal predictors of cyber and traditional bullying perpetration in Australian secondary school students

    PubMed Central

    Hemphill, Sheryl A.; Kotevski, Aneta; Tollit, Michelle; Smith, Rachel; Herrenkohl, Todd I.; Toumbourou, John W.; Catalano, Richard F.

    2013-01-01

    Purpose Cyber bullying perpetration (using communication technology to engage in bullying) is a recent phenomenon that has generated much concern. There are few prospective longitudinal studies of cyber bullying. The current paper examines the individual, peer, family and school risk factors for both cyber and traditional bullying (the latter is bullying that does not utilize technology) in adolescents. Methods This paper draws on a rich data set from the International Youth Development Study, a longitudinal study of students in Victoria, Australia and Washington State, United States, which began in 2002. In this paper, data from almost 700 Victorian students recruited in Grade 5 is analyzed to examine Grade 7 (aged 12-13 years) predictors of traditional and cyber bullying perpetration in Grade 9 (aged 14-15 years). Results Fifteen per cent of students engaged in cyber bullying, 21% in traditional bullying and 7% in both. There are similarities and important differences in the predictors of cyber and traditional bullying. In the fully adjusted model, only prior engagement in relational aggression (a covert form of bullying such as spreading rumors about another student) predicted cyber bullying perpetration. For traditional bullying, previous relational aggression was also predictive, as was having been a victim and perpetrator of traditional bullying, family conflict, and academic failure. Conclusions The use of evidence-based bullying prevention programs is supported to reduce experiences of all forms of bullying perpetration(cyber, traditional, and relational aggression). In addition, for traditional bullying perpetration, addressing family conflict and student academic support are also important. PMID:22727078

  2. Teaching Baroreflex Physiology to Medical Students: A Comparison of Quiz-Based and Conventional Teaching Strategies in a Laboratory Exercise

    ERIC Educational Resources Information Center

    Berg, Ronan M. G.; Plovsing, Ronni R.; Damgaard, Morten

    2012-01-01

    Quiz-based and collaborative teaching strategies have previously been found to be efficient for the improving meaningful learning of physiology during lectures. These approaches have, however, not been investigated during laboratory exercises. In the present study, we compared the impact of solving quizzes individually and in groups with…

  3. Ever-present threats from information technology: the Cyber-Paranoia and Fear Scale

    PubMed Central

    Mason, Oliver J.; Stevenson, Caroline; Freedman, Fleur

    2014-01-01

    Delusions involving technology, and specifically the internet, are increasingly common, and fear-reality statistics suggest computer-related fears are very widespread. These fears form a continuum from the widely understandable and realistic to the unrealistic, and frankly paranoid. The present study investigated the validity of this construct in a non-clinical population by constructing a novel self-report measure. The new Cyber-Paranoia and Fear Scale aims to measure the perception of information technology-related threats originating from or enabled by computers, smartphones, social networks, and digital surveillance. Psychometric properties of the new Cyber-Paranoia and Fear Scale are reported alongside an established measure of suspiciousness and paranoia in 181 participants including a sub-group of fifty information technology professionals. Exploratory factor analysis suggested the presence of two, related, dimensions that we term cyber-paranoia and cyber-fear. Both sub-scales were internally consistent and produced a normal distribution of scores. The relationships of the sub-scales with age, gender, trait paranoia, digital literacy, and digital inclusion are supportive of construct validity. The distinctiveness of ‘cyber-paranoia’ from general trait paranoia appears to mirror the clinical distinctiveness of ‘internet’ and other technology-fuelled delusions. Knowledge provision to increase technological proficiency and awareness may bring about a reduction in cyber-paranoia. PMID:25505431

  4. Ever-present threats from information technology: the Cyber-Paranoia and Fear Scale.

    PubMed

    Mason, Oliver J; Stevenson, Caroline; Freedman, Fleur

    2014-01-01

    Delusions involving technology, and specifically the internet, are increasingly common, and fear-reality statistics suggest computer-related fears are very widespread. These fears form a continuum from the widely understandable and realistic to the unrealistic, and frankly paranoid. The present study investigated the validity of this construct in a non-clinical population by constructing a novel self-report measure. The new Cyber-Paranoia and Fear Scale aims to measure the perception of information technology-related threats originating from or enabled by computers, smartphones, social networks, and digital surveillance. Psychometric properties of the new Cyber-Paranoia and Fear Scale are reported alongside an established measure of suspiciousness and paranoia in 181 participants including a sub-group of fifty information technology professionals. Exploratory factor analysis suggested the presence of two, related, dimensions that we term cyber-paranoia and cyber-fear. Both sub-scales were internally consistent and produced a normal distribution of scores. The relationships of the sub-scales with age, gender, trait paranoia, digital literacy, and digital inclusion are supportive of construct validity. The distinctiveness of 'cyber-paranoia' from general trait paranoia appears to mirror the clinical distinctiveness of 'internet' and other technology-fuelled delusions. Knowledge provision to increase technological proficiency and awareness may bring about a reduction in cyber-paranoia.

  5. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    NASA Astrophysics Data System (ADS)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  6. Evaluation of the SPAR thermal analyzer on the CYBER-203 computer

    NASA Technical Reports Server (NTRS)

    Robinson, J. C.; Riley, K. M.; Haftka, R. T.

    1982-01-01

    The use of the CYBER 203 vector computer for thermal analysis is investigated. Strengths of the CYBER 203 include the ability to perform, in vector mode using a 64 bit word, 50 million floating point operations per second (MFLOPS) for addition and subtraction, 25 MFLOPS for multiplication and 12.5 MFLOPS for division. The speed of scalar operation is comparable to that of a CDC 7600 and is some 2 to 3 times faster than Langley's CYBER 175s. The CYBER 203 has 1,048,576 64-bit words of real memory with an 80 nanosecond (nsec) access time. Memory is bit addressable and provides single error correction, double error detection (SECDED) capability. The virtual memory capability handles data in either 512 or 65,536 word pages. The machine has 256 registers with a 40 nsec access time. The weaknesses of the CYBER 203 include the amount of vector operation overhead and some data storage limitations. In vector operations there is a considerable amount of time before a single result is produced so that vector calculation speed is slower than scalar operation for short vectors.

  7. Kinetics and Photochemistry of Ruthenium Bisbipyridine Diacetonitrile Complexes: An Interdisciplinary Inorganic and Physical Chemistry Laboratory Exercise.

    PubMed

    Rapp, Teresa L; Phillips, Susan R; Dmochowski, Ivan J

    2016-12-13

    The study of ruthenium polypyridyl complexes can be widely applied across disciplines in the undergraduate curriculum. Ruthenium photochemistry has advanced many fields including dye-sensitized solar cells, photoredox catalysis, light-driven water oxidation, and biological electron transfer. Equally promising are ruthenium polypyridyl complexes that provide a sterically bulky, photolabile moiety for transiently "caging" biologically active molecules. Photouncaging involves the use of visible (1-photon) or near-IR (2-photon) light to break one or more bonds between ruthenium and coordinated ligand(s), which can occur on short time scales and in high quantum yields. In this work we demonstrate the use of a model "caged" acetonitrile complex, Ru(2,2'-bipyridine) 2 (acetonitrile) 2 , or RuMeCN in an advanced synthesis and physical chemistry laboratory. Students made RuMeCN in an advanced synthesis laboratory course and performed UV-vis spectroscopy and electrochemistry. The following semester students investigated RuMeCN photolysis kinetics in a physical chemistry laboratory. These two exercises may also be combined to create a 2-week module in an advanced undergraduate laboratory course.

  8. Kinetics and Photochemistry of Ruthenium Bisbipyridine Diacetonitrile Complexes: An Interdisciplinary Inorganic and Physical Chemistry Laboratory Exercise

    PubMed Central

    2016-01-01

    The study of ruthenium polypyridyl complexes can be widely applied across disciplines in the undergraduate curriculum. Ruthenium photochemistry has advanced many fields including dye-sensitized solar cells, photoredox catalysis, light-driven water oxidation, and biological electron transfer. Equally promising are ruthenium polypyridyl complexes that provide a sterically bulky, photolabile moiety for transiently “caging” biologically active molecules. Photouncaging involves the use of visible (1-photon) or near-IR (2-photon) light to break one or more bonds between ruthenium and coordinated ligand(s), which can occur on short time scales and in high quantum yields. In this work we demonstrate the use of a model “caged” acetonitrile complex, Ru(2,2′-bipyridine)2(acetonitrile)2, or RuMeCN in an advanced synthesis and physical chemistry laboratory. Students made RuMeCN in an advanced synthesis laboratory course and performed UV–vis spectroscopy and electrochemistry. The following semester students investigated RuMeCN photolysis kinetics in a physical chemistry laboratory. These two exercises may also be combined to create a 2-week module in an advanced undergraduate laboratory course. PMID:28649139

  9. Associations Between Internet Attachment, Cyber Victimization, and Internalizing Symptoms Among Adolescents.

    PubMed

    Holfeld, Brett; Sukhawathanakul, Paweena

    2017-02-01

    With increasing frequency of Internet use among adolescents, there are growing concerns about their risk for becoming attached to these forms of communication and increased vulnerability for negative online experiences, including cyber victimization. The effect of these experiences on adolescent mental health is not well understood. In this study, we examine how Internet attachment is related to anxiety and depression and assess the mediating effect of cyber victimization on these associations. Participants included 1,151 middle school students (51.4 percent males) aged 10 to 16 (M = 12.7, SD = 0.93). Structural equation models show that greater Internet attachment was associated with more cyber victimization and greater symptoms of anxiety and depression. Cyber victimization mediated the associations between Internet attachment and anxiety and between Internet attachment and depression. Implications for online awareness efforts are discussed.

  10. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  11. CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical Systems

    DTIC Science & Technology

    2018-04-19

    AFRL-AFOSR-JP-TR-2018-0035 CORESAFE:A Formal Approach against Code Replacement Attacks on Cyber Physical Systems Sandeep Shukla INDIAN INSTITUTE OF...Formal Approach against Code Replacement Attacks on Cyber Physical Systems 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA2386-16-1-4099 5c.  PROGRAM ELEMENT...Institute of Technology Kanpur India Final Report for AOARD Grant “CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical

  12. Phylogenetics Exercise Using Inherited Human Traits

    ERIC Educational Resources Information Center

    Tuimala, Jarno

    2006-01-01

    A bioinformatics laboratory exercise based on inherited human morphological traits is presented. It teaches how morphological characters can be used to study the evolutionary history of humans using parsimony. The exercise can easily be used in a pen-and-paper laboratory, but if computers are available, a more versatile analysis can be carried…

  13. Creating Cyber Libraries: An Instructional Guide for School Library Media Specialists. School Librarianship Series.

    ERIC Educational Resources Information Center

    Craver, Kathleen W.

    This book provides school library media specialists (SLMSs) with practical guidelines and suggested Internet sites for designing cyber libraries that are reflective of their school's research, curriculum, and recreational reading needs. An introduction provides SLMSs with a rationale for designing cyber libraries. Chapter 1, Cyber Library…

  14. Reliable Assessment with CyberTutor, a Web-Based Homework Tutor.

    ERIC Educational Resources Information Center

    Pritchard, David E.; Morote, Elsa-Sofia

    This paper demonstrates that an electronic tutoring program can collect data that enables a far more reliable assessment of students' skills than a standard examination. Socratic electronic homework tutor, CyberTutor can integrate effectively instruction and assessment. CyberTutor assessment has about 62 times less variance due to random test…

  15. Cyber Threat Assessment of Uplink and Commanding System for Mission Operation

    NASA Technical Reports Server (NTRS)

    Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant

    2014-01-01

    Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.

  16. The Question-Driven Laboratory Exercise: A New Pedagogy Applied to a Green Modification of Grignard Reagent Formation and Reaction

    ERIC Educational Resources Information Center

    Teixeira, Jennifer M.; Byers, Jessie Nedrow; Perez, Marilu G.; Holman, R. W.

    2010-01-01

    Experimental exercises within second-year-level organic laboratory manuals typically involve a statement of a principle that is then validated by student generation of data in a single experiment. These experiments are structured in the exact opposite order of the scientific method, in which data interpretation, typically from multiple related…

  17. Game Theory and Uncertainty Quantification for Cyber Defense Applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna

    Cyber-system defenders face the challenging task of protecting critical assets and information continually against multiple types of malicious attackers. Defenders typically operate within resource constraints while attackers operate at relatively low costs. As a result, design and development of resilient cyber-systems that can support mission goals under attack while accounting for the dynamics between attackers and defenders is an important research problem.

  18. Expanding the Department of Defense’s Role in Cyber Civil Support

    DTIC Science & Technology

    2011-06-17

    vulnerability of this very crucial domain. They include the Y2K problem, the Estonia cyber-attacks in 2007, and the role of cyber in the Russian-Georgia...cyber security vulnerabilities associated with critical infrastructure. The Year 2000 Challenge The Year 2000 ( Y2K ) problem was the result of...and microprocessors failed to make the correct transition from 1999 to 2000.19 One of the most critical concerns with Y2K was the potential cascading

  19. Cyber security best practices for the nuclear industry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  20. Modernisation of the intermediate physics laboratory

    NASA Astrophysics Data System (ADS)

    Kontro, Inkeri; Heino, Olga; Hendolin, Ilkka; Galambosi, Szabolcs

    2018-03-01

    The intermediate laboratory courses at the Department of Physics, University of Helsinki, were reformed using desired learning outcomes as the basis for design. The reformed laboratory courses consist of weekly workshops and small-group laboratory sessions. Many of the laboratory exercises are open-ended and have several possible ways of execution. They were designed around affordable devices, to allow for the purchase of multiple sets of laboratory equipment. This allowed students to work on the same problems simultaneously. Thus, it was possible to set learning goals which build on each other. Workshop sessions supported the course by letting the students solve problems related to conceptual and technical aspects of each laboratory exercise. The laboratory exercises progressed biweekly to allow for iterative problem solving. Students reached the learning goals well and the reform improved student experiences. Neither positive or negative changes in expert-like attitudes towards experimental physics (measured by E-CLASS questionnaire) were observed.

  1. Exercise and Cognitive Functioning in People With Chronic Whiplash-Associated Disorders: A Controlled Laboratory Study.

    PubMed

    Ickmans, Kelly; Meeus, Mira; De Kooning, Margot; De Backer, Annabelle; Kooremans, Daniëlle; Hubloue, Ives; Schmitz, Tom; Van Loo, Michel; Nijs, Jo

    2016-02-01

    Controlled laboratory study. In addition to persistent pain, people with chronic whiplash-associated disorders (WAD) commonly deal with cognitive dysfunctions. In healthy individuals, aerobic exercise has a positive effect on cognitive performance, and preliminary evidence in other chronic pain conditions reveals promising results as well. However, there is evidence that people with chronic WAD may show a worsening of the symptom complex following physical exertion. To examine postexercise cognitive performance in people with chronic WAD. People with chronic WAD (n = 27) and healthy, inactive, sex- and age-matched controls (n = 27) performed a single bout of an incremental submaximal cycling exercise. Before and after the exercise, participants completed 2 performance-based cognitive tests assessing selective and sustained attention, cognitive inhibition, and simple and choice reaction time. At baseline, people with chronic WAD displayed significantly lower scores on sustained attention and simple reaction time (P<.001), but not on selective attention, cognitive inhibition, and choice reaction time (P>.05), compared with healthy controls. Postexercise, both groups showed significantly improved selective attention and choice reaction time (chronic WAD, P = .001; control, P<.001), while simple reaction time significantly increased (P = .037) only in the control group. In both groups, no other significant changes in sustained attention, cognitive inhibition, pain, and fatigue were observed (P>.05). In the short term, postexercise cognitive functioning, pain, and fatigue were not aggravated in people with chronic WAD. However, randomized controlled trials are required to study the longer-term and isolated effects of exercise on cognitive functioning.

  2. Functional Mission Analysis (FMA) for the Air Force Cyber Squadron Initiative (CS I)

    DTIC Science & Technology

    2017-03-17

    Analysis for the Air Force Cyber Squadron Initiative DESIGN PROJECT CONDUCTED 13 FEB – 17 FEB 17 Produced with input from numerous units...Success The Air Force’s base-level Communications Squadrons are engaged in a cultural and technological transformation through the Cyber Squadron...sharpening their focus to include active cyber defense and mission assurance as core competencies to enable operational advantages and out-maneuver our

  3. The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law Enforcement’s Role?

    DTIC Science & Technology

    2001-04-01

    defined as cyber crime or —hacker“. Although this category of hacker includes many kinds of cyber criminals , from a DOD perspective, the motivation of a...perpetrator. 6 In his book, —Fighting Computer Crime“, Wiley identifies several types of cyber criminals . They range from pranksters who perpetrate...usually financial11 This first group of cyber criminals or —hackers“ can be categorized as Unintentional Cyber actors. Although they have a variety of

  4. DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT

    DTIC Science & Technology

    2016-08-01

    AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY DETERMINING ELECTRONIC AND CYBER ATTACK RISK LEVEL FOR UNMANNED AIRCRAFT IN A CONTESTED ENVIRONMENT...iii ABSTRACT During operations in a contested air environment, adversary electronic warfare (EW) and cyber-attack capability will pose a high...10 Russian Federation Electronic Warfare Systems ...................................................12 Chinese Cyber Warfare Program

  5. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may helpmore » address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-system’s state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.« less

  6. Time-Centric Models For Designing Embedded Cyber-physical Systems

    DTIC Science & Technology

    2009-10-09

    Time -centric Models For Designing Embedded Cyber- physical Systems John C. Eidson Edward A. Lee Slobodan Matic Sanjit A. Seshia Jia Zou Electrical... Time -centric Models For Designing Embedded Cyber-physical Systems ∗ John C. Eidson , Edward A. Lee, Slobodan Matic, Sanjit A. Seshia, Jia Zou...implementations, such a uniform notion of time cannot be precisely realized. Time triggered networks [10] and time synchronization [9] can be used to

  7. Cyber-workstation for computational neuroscience.

    PubMed

    Digiovanna, Jack; Rattanatamrong, Prapaporn; Zhao, Ming; Mahmoudi, Babak; Hermer, Linda; Figueiredo, Renato; Principe, Jose C; Fortes, Jose; Sanchez, Justin C

    2010-01-01

    A Cyber-Workstation (CW) to study in vivo, real-time interactions between computational models and large-scale brain subsystems during behavioral experiments has been designed and implemented. The design philosophy seeks to directly link the in vivo neurophysiology laboratory with scalable computing resources to enable more sophisticated computational neuroscience investigation. The architecture designed here allows scientists to develop new models and integrate them with existing models (e.g. recursive least-squares regressor) by specifying appropriate connections in a block-diagram. Then, adaptive middleware transparently implements these user specifications using the full power of remote grid-computing hardware. In effect, the middleware deploys an on-demand and flexible neuroscience research test-bed to provide the neurophysiology laboratory extensive computational power from an outside source. The CW consolidates distributed software and hardware resources to support time-critical and/or resource-demanding computing during data collection from behaving animals. This power and flexibility is important as experimental and theoretical neuroscience evolves based on insights gained from data-intensive experiments, new technologies and engineering methodologies. This paper describes briefly the computational infrastructure and its most relevant components. Each component is discussed within a systematic process of setting up an in vivo, neuroscience experiment. Furthermore, a co-adaptive brain machine interface is implemented on the CW to illustrate how this integrated computational and experimental platform can be used to study systems neurophysiology and learning in a behavior task. We believe this implementation is also the first remote execution and adaptation of a brain-machine interface.

  8. Cyber-Workstation for Computational Neuroscience

    PubMed Central

    DiGiovanna, Jack; Rattanatamrong, Prapaporn; Zhao, Ming; Mahmoudi, Babak; Hermer, Linda; Figueiredo, Renato; Principe, Jose C.; Fortes, Jose; Sanchez, Justin C.

    2009-01-01

    A Cyber-Workstation (CW) to study in vivo, real-time interactions between computational models and large-scale brain subsystems during behavioral experiments has been designed and implemented. The design philosophy seeks to directly link the in vivo neurophysiology laboratory with scalable computing resources to enable more sophisticated computational neuroscience investigation. The architecture designed here allows scientists to develop new models and integrate them with existing models (e.g. recursive least-squares regressor) by specifying appropriate connections in a block-diagram. Then, adaptive middleware transparently implements these user specifications using the full power of remote grid-computing hardware. In effect, the middleware deploys an on-demand and flexible neuroscience research test-bed to provide the neurophysiology laboratory extensive computational power from an outside source. The CW consolidates distributed software and hardware resources to support time-critical and/or resource-demanding computing during data collection from behaving animals. This power and flexibility is important as experimental and theoretical neuroscience evolves based on insights gained from data-intensive experiments, new technologies and engineering methodologies. This paper describes briefly the computational infrastructure and its most relevant components. Each component is discussed within a systematic process of setting up an in vivo, neuroscience experiment. Furthermore, a co-adaptive brain machine interface is implemented on the CW to illustrate how this integrated computational and experimental platform can be used to study systems neurophysiology and learning in a behavior task. We believe this implementation is also the first remote execution and adaptation of a brain-machine interface. PMID:20126436

  9. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics

    ERIC Educational Resources Information Center

    Sontag, Lisa M.; Clemans, Katherine H.; Graber, Julia A.; Lyndon, Sarah T.

    2011-01-01

    To date, relatively little is known about differences between perpetrators and victims of cyber and traditional forms of aggression. Hence, this study investigated differences among traditional and cyber aggressors and victims on psychosocial characteristics typically examined in research on traditional aggression and victimization, specifically…

  10. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    ERIC Educational Resources Information Center

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  11. The Cyber Aggression in Relationships Scale: A New Multidimensional Measure of Technology-Based Intimate Partner Aggression.

    PubMed

    Watkins, Laura E; Maldonado, Rosalita C; DiLillo, David

    2018-07-01

    The purpose of this study was to develop and provide initial validation for a measure of adult cyber intimate partner aggression (IPA): the Cyber Aggression in Relationships Scale (CARS). Drawing on recent conceptual models of cyber IPA, items from previous research exploring general cyber aggression and cyber IPA were modified and new items were generated for inclusion in the CARS. Two samples of adults 18 years or older were recruited online. We used item factor analysis to test the factor structure, model fit, and invariance of the measure structure across women and men. Results confirmed that three-factor models for both perpetration and victimization demonstrated good model fit, and that, in general, the CARS measures partner cyber aggression similarly for women and men. The CARS also demonstrated validity through significant associations with in-person IPA, trait anger, and jealousy. Findings suggest the CARS is a useful tool for assessing cyber IPA in both research and clinical settings.

  12. Meta II: Multi-Model Language Suite for Cyber Physical Systems

    DTIC Science & Technology

    2013-03-01

    AVM META) projects have developed tools for designing cyber physical (or Mechatronic ) Systems . These systems are increasingly complex, take much...projects have developed tools for designing cyber physical (CPS) (or Mechatronic ) systems . Exemplified by modern amphibious and ground military...and parametric interface of Simulink models and defines associations with CyPhy components and component interfaces. 2. Embedded Systems Modeling

  13. Towards the cyber security paradigm of ehealth: Resilience and design aspects

    NASA Astrophysics Data System (ADS)

    Rajamäki, Jyri; Pirinen, Rauno

    2017-06-01

    Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

  14. Security and Privacy in Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.

    As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them acrossmore » application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.« less

  15. Cyber-physical networking for wireless mesh infrastructures

    NASA Astrophysics Data System (ADS)

    Mannweiler, C.; Lottermann, C.; Klein, A.; Schneider, J.; Schotten, H. D.

    2012-09-01

    This paper presents a novel approach for cyber-physical network control. "Cyber-physical" refers to the inclusion of different parameters and information sources, ranging from physical sensors (e.g. energy, temperature, light) to conventional network information (bandwidth, delay, jitter, etc.) to logical data providers (inference systems, user profiles, spectrum usage databases). For a consistent processing, collected data is represented in a uniform way, analyzed, and provided to dedicated network management functions and network services, both internally and, through an according API, to third party services. Specifically, in this work, we outline the design of sophisticated energy management functionalities for a hybrid wireless mesh network (WLAN for both backhaul traffic and access, GSM for access only), disposing of autonomous energy supply, in this case solar power. Energy consumption is optimized under the presumption of fluctuating power availability and considerable storage constraints, thus influencing, among others, handover and routing decisions. Moreover, advanced situation-aware auto-configuration and self-adaptation mechanisms are introduced for an autonomous operation of the network. The overall objective is to deploy a robust wireless access and backbone infrastructure with minimal operational cost and effective, cyber-physical control mechanisms, especially dedicated for rural or developing regions.

  16. Inter-laboratory consistency and variability in the buccal micronucleus cytome assay depends on biomarker scored and laboratory experience: results from the HUMNxl international inter-laboratory scoring exercise.

    PubMed

    Bolognesi, Claudia; Knasmueller, Siegfried; Nersesyan, Armen; Roggieri, Paola; Ceppi, Marcello; Bruzzone, Marco; Blaszczyk, Ewa; Mielzynska-Svach, Danuta; Milic, Mirta; Bonassi, Stefano; Benedetti, Danieli; Da Silva, Juliana; Toledo, Raphael; Salvadori, Daisy Maria Fávero; Groot de Restrepo, Helena; Filipic, Metka; Hercog, Klara; Aktas, Ayça; Burgaz, Sema; Kundi, Michael; Grummt, Tamara; Thomas, Philip; Hor, Maryam; Escudero-Fung, Maria; Holland, Nina; Fenech, Michael

    2017-03-01

    The buccal micronucleus cytome (BMNcyt) assay in uncultured exfoliated epithelial cells from oral mucosa is widely applied in biomonitoring human exposures to genotoxic agents and is also proposed as a suitable test for prescreening and follow-up of precancerous oral lesions. The main limitation of the assay is the large variability observed in the baseline values of micronuclei (MNi) and other nuclear anomalies mainly related to different scoring criteria. The aim of this international collaborative study, involving laboratories with different level of experience, was to evaluate the inter- and intra-laboratory variations in the BMNcyt parameters, using recently implemented guidelines, in scoring cells from the same pooled samples obtained from healthy subjects (control group) and from cancer patients undergoing radiotherapy (treated group). The results indicate that all laboratories correctly discriminated samples from the two groups by a significant increase of micronucleus (MN) and nuclear bud (NBUD) frequencies and differentiated binucleated (BN) cells, associated with the exposure to ionizing radiation. The experience of the laboratories was shown to play an important role in the identification of the different cell types and nuclear anomalies. MN frequency in differentiated mononucleated (MONO) and BN cells showed the greatest consistency among the laboratories and low variability was also detected in the frequencies of MONO and BN cells. A larger variability was observed in classifying the different cell types, indicating the subjectivity in the interpretation of some of the scoring criteria while reproducibility of the results between scoring sessions was very good. An inter-laboratory calibration exercise is strongly recommended before starting studies with BMNcyt assay involving multiple research centers. © The Author 2016. Published by Oxford University Press on behalf of the UK Environmental Mutagen Society. All rights reserved. For permissions

  17. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    PubMed

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  18. Cyber Aggression: The Relation between Online Offenders and Offline Social Competence

    ERIC Educational Resources Information Center

    Schoffstall, Corrie L.; Cohen, Robert

    2011-01-01

    Children are increasingly using computer technologies to engage in acts of aggression against peers, often termed "cyber aggression". Media reports have sensationalized instances of cyber aggression, and social scientists have begun to examine its characteristics and consequences. Using a younger sample of children than most previous research (192…

  19. Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study

    ERIC Educational Resources Information Center

    Beyer, Dawn M.

    2014-01-01

    The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve…

  20. Virtual Voices with Real-Life Consequences: Teaching Students about Cyber-Vetting

    ERIC Educational Resources Information Center

    Hanasono, Lisa Kiyomi

    2013-01-01

    Despite its pervasiveness, many students do not realize how online communication can impact their careers and relationships. Cyber-vetting occurs when people use online search engines, social networking sites, and other Internet tools to uncover information about others. Because cyber-vetting is a relatively new concept, most communication…