Insights into organizational security readiness: Lessons learned from cyber-attack case studies

F Quader, VP Janeja - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
This paper focuses on understanding the characteristics of multiple types of cyber-attacks
through a comprehensive evaluation of case studies of real-world cyber-attacks. For each …

Cyber ranges and testbeds for education, training, and research

N Chouliaras, G Kittes, I Kantzavelou, L Maglaras… - Applied Sciences, 2021 - mdpi.com
In recent years, there has been a growing demand for cybersecurity experts, and, according
to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by …

[PDF][PDF] The Root Causes of Compromised Accounts at the University.

P Nyblom, G Wangen, M Kianpour, G Østby - ICISSP, 2020 - pdfs.semanticscholar.org
Compromised usernames and passwords are a continuous problem that several
organizations struggle with even though this is a known problem with known solutions …

EXCON teams in cyber security training

G Østby, KN Lovell, B Katt - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
A cyber range is an arena where exercise will be used to expose individuals, public and
private organizations, and government agencies to simulate socio-technical cyber security …

Preparing for cyber crisis management exercises

G Østby, SJ Kowalski - International Conference on Human-Computer …, 2020 - Springer
In this paper the authors discuss how to create a preparation schedule for exercises (PSE) to
support EXCON-teams and instructors for full-scaled combined crisis management and …

Ethical Hacking for a Good Cause: Finding Missing People using Crowdsourcing and Open-Source Intelligence (OSINT) Tools

E Dincelli, C Van Slyke, A Yayla - Communications of the …, 2023 - aisel.aisnet.org
Over 600,000 people go missing every year in the US alone. Despite the extensive
resources allocated to investigating these cases, the high volume of missing person cases …

Social aspects in organisational cyber-security effectiveness-Of British coal mines, resilience and emergence

TF Hofmann - 2023 - aisel.aisnet.org
Cyber-security, which plays a key role in all areas of the digital world, from the power grid to
healthcare, is mainly addressed from an analytical, engineering perspective. This research …

Responding cyber-attacks and managing cyber security crises in critical infrastructures: A sociotechnical perspective

S Bıçakcı, AG Evren - Management and Engineering of Critical …, 2024 - Elsevier
With the increasing use of digital assets, Critical Infrastructures (CIs) become more
vulnerable to cyber threats. From cyber-attacks targeting Industrial Control Systems (ICS) to …

Combating insider threat with proper training

A Carlson - 2020 - search.proquest.com
Combating Insider Threat With Proper Training by Adam Carlson A Capstone Project Submitted
to the Faculty of Utica College Page 1 Combating Insider Threat With Proper Training by Adam …

Beyond a Techno-Centric Vision of Cybersecurity

A Cortina - Available at SSRN 4659650 - papers.ssrn.com
Abstract Recent European Union regulations on cybersecurity have expanded their focus
beyond just technical issues. They explicitly recognize the need for affected stakeholders to …