381 research outputs found

    Towards A Massive Open Online Course for Cybersecurity in Smart Grids – A Roadmap Strategy

    Get PDF
    The major trends and transformations in energy systems have brought many challenges, and cybersecurity and operational security are among the most important issues to consider. First, due to the criticality of the energy sector. Second, due to the lack of smart girds’ cybersecurity professionals. Previous research has highlighted skill gaps and shortage in cybersecurity training and education in this sector. Accordingly, we proceeded by crafting a roadmap strategy to foster cybersecurity education in smart grids. This paper outlines the methodology of teaching cybersecurity in smart grids to a large group of students in selected European universities via implementing a Massive Open Online Course. Unlike other solutions, this one focuses on hands-on practical skills without trading-off theoretical knowledge. Thus, flipped learning methodology and gamification practices were used to maximize retention rate. Also, a remote lab that includes a real-time simulator was established for training. Here, the process, outcome, and obstacles to overcome in future deployments, are presented.©2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.fi=vertaisarvioitu|en=peerReviewed

    Pedagogical Resources for Industrial Control Systems Security: Design, Implementation, Conveyance, and Evaluation

    Get PDF
    Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the professional development workshop to disseminate the curriculum materials, and the evaluation results pertaining to those artifacts and activities

    Using Simulations to Prepare for College and Careers in Information Technology

    Get PDF
    While simulators can be used in place of hands-on hardware, there was not a significant body of quantitative research supporting the use of simulators for college and career success at the secondary level in information technology (IT). The purpose of this quantitative, nonexperimental study was to determine if there was a significant difference in college and career readiness of New York state high school students in approved IT content cluster high school programs, between those who use simulations and those who use hands-on hardware. Kolb\u27s theory of experiential learning was the theoretical foundation for this research. The research questions examined whether there was a significant difference in the written exam grades, the hands-on exam grades, and the certification pass rates of students, based on the percentage of simulation used in their coursework. A survey was used to collect data on 60 students. A one-way Welch ANOVA indicated no significant difference in written grades between groups. A Kruskal-Wallis ANOVA showed statistical significance between groups using all simulated labs and less than 50% simulated labs, as well as between all simulated labs and 50% or greater simulated labs for hands-on grades. Fisher\u27s Exact Test indicated that the proportion of students in the less than 50% simulated labs group who earned industry-level certifications was statistically significantly higher than the 50% or greater simulated labs group or the all simulated labs group. Implications for social change are that workers with entry-level IT skills can fill jobs in the growing IT field that offers well-paying jobs with more promising futures

    A Survey on Industrial Control System Testbeds and Datasets for Security Research

    Full text link
    The increasing digitization and interconnection of legacy Industrial Control Systems (ICSs) open new vulnerability surfaces, exposing such systems to malicious attackers. Furthermore, since ICSs are often employed in critical infrastructures (e.g., nuclear plants) and manufacturing companies (e.g., chemical industries), attacks can lead to devastating physical damages. In dealing with this security requirement, the research community focuses on developing new security mechanisms such as Intrusion Detection Systems (IDSs), facilitated by leveraging modern machine learning techniques. However, these algorithms require a testing platform and a considerable amount of data to be trained and tested accurately. To satisfy this prerequisite, Academia, Industry, and Government are increasingly proposing testbed (i.e., scaled-down versions of ICSs or simulations) to test the performances of the IDSs. Furthermore, to enable researchers to cross-validate security systems (e.g., security-by-design concepts or anomaly detectors), several datasets have been collected from testbeds and shared with the community. In this paper, we provide a deep and comprehensive overview of ICSs, presenting the architecture design, the employed devices, and the security protocols implemented. We then collect, compare, and describe testbeds and datasets in the literature, highlighting key challenges and design guidelines to keep in mind in the design phases. Furthermore, we enrich our work by reporting the best performing IDS algorithms tested on every dataset to create a baseline in state of the art for this field. Finally, driven by knowledge accumulated during this survey's development, we report advice and good practices on the development, the choice, and the utilization of testbeds, datasets, and IDSs

    Cedarville Magazine, Spring 2022: Called to Excellence

    Get PDF
    https://digitalcommons.cedarville.edu/cedarvillemagazine/1025/thumbnail.jp
    • …
    corecore