6 research outputs found
Recommended from our members
Ethical Hacking Pedagogy: An Analysis and Overview of Teaching Students to Hack
An area that is being scrutinized as a more effective method of educating and preparing security professionals is that of ethical hacking. The purpose of this research is to examine a more proactive approach to adequately prepare future information security professionals. Future careers in security may require that professionals be equipped with the necessary skill sets to combat an ever-growing presence of unwanted activity throughout the Internet. Many argue that future information security professionals need to have the same skill sets as attackers in order to adequately recognize and defend networks from intrusion. This research defines ethical hacking and examines the pros and cons of ethical hacking pedagogy as a viable approach for teaching network security to future professionals. The analysis includes the concept of ethical hacking education with an emphasis on ethical and legal concerns associated with ethical hacking pedagogy. The research concludes with an overview of existing best practices in ethical hacking education highlighting a hands-on approach as well as the inclusion of soft skills needed to complement the technical hard skills for future information security professionals
Issues of Implied Trust in Ethical Hacking
Crowdwork involves paid work organised through online platforms. As a relatively new form of employment, a range of issues have emerged around work practices and contractual arrangements between the three parties: task requesters, crowdworkers, and platform owners. In this paper we examine some of the issues associated with workers’ experience of crowdwork that have been raised in recent years. We then outline how the affordances offered by another emerging technology, blockchain, could be used to address some of those issues. Based on a conceptual, scenario-based exercise, we argue that there is considerable potential for blockchain technology to manage the transaction-based aspects of crowdwork processes and contractual arrangements to make them fairer and more transparent, but without necessarily incurring excessive overhead costs. However, despite the claimed “democratizing” effect of blockchain, some structural issues associated with managing work are not likely to be improved by blockchain-based solutions
Pengembangan Laboratorium Virtual untuk Simulasi Uji Penetrasi Sistem Keamanan Jaringan
Penelitian ini bertujuan untuk mengembangkan sebuah laboratorium berbasis virtualisasi untuk simulasi uji penetrasi dan membandingkan tingkat performa antara server fisik dan server virtual. Tipe Pengembangan laboratorium virtual menggunakan hypervisor Vmware Wokstation. Pengujian simulasi Penetrasi menggunakan pedoman Information System Security Assessment Framework (ISSAF) sedangkan Tools yang digunakan untuk pengujian simulasi penetrasi menggunakan tools yang disediakan pada Kali Linux. Penelitian ini menunjukan jika tahapan-tahapan pengujian penetrasi dapat dilakukan pada lingkungan virtual. Berdasarkan hasil pengujian tingkat performa menunjukkan perbandingan tingkat respon time kedua server cukup signifikan sedangkan untuk throughput server fisik 10 kali lebih cepat dibandingkan server virtual. Perbandingan peningkatan CPU pada kedua server juga cukup signifikan berbanding terbalik dengan Perbandingan penggunaan memory pada server virtual 2 kali lebih besar dari server fisik
Business students\u27 personal branding: An empirical investigation
Personal branding is the process by which an individual actively tries to manage others’ impression of their skills, abilities and experiences (Johnson, 2017). It is the marketing of oneself to society (Lair, Sullivan, & Cheney, 2005; Peters, 1997; Shepherd, 2005). While the current job market is touted as being the best in years, employment opportunities for business aspirants in the U.S. economy changed little from 2017 to 2016 when comparing a United States Department of Labor annual report (“United States Department of Labor,” 2018). This suggests that new business graduates continue to face the harsh reality of a challenging environment in terms of future employment prospects. This accentuates a great need for business schools to arm students with the personal branding skills requisite for today’s competitive employment landscape
Tecnología didáctica sobre seguridad informática en Formación Profesional
Actualmente una de las mayores preocupaciones en el campo de las nuevas tecnologías de la información y las comunicaciones (TIC) es la seguridad, esto es debido al aumento de los ataques por parte de hackers informáticos, que cada vez usan técnicas y herramientas más avanzadas. Con motivo de ésta preocupación y con el aumento de los ataques informáticos, cada vez son demandados más perfiles de profesionales de las TIC formados en Seguridad Informática, además, se requiere una mejor y más específica formación en este campo.
Es por ello que se hace necesaria la revisión de los currículos y las programaciones didácticas de los ciclos formativos de la Formación Profesional que están relacionados con la Seguridad Informática, con el objetivo de formar profesionales que cumplan las necesidades actuales del mercado laboral, con la utilización de metodologías y herramientas específicas para este campo.
Este documento pretende recoger una revisión en cuanto a objetivos y contenidos de un posible currículo para formación profesional en Seguridad Informática, así como una propuesta coherente y meditada sobre las metodologías y herramientas para utilizar en el aula o en los laboratorios de estos estudios.Departamento de Informática (Arquitectura y Tecnología de Computadores, Ciencias de la Computación e Inteligencia Artificial, Lenguajes y Sistemas Informáticos)Máster en Profesor de Educación Secundaria Obligatoria y Bachillerato, Formación Profesional y Enseñanzas de Idioma