Threat actors' tenacity to disrupt: Examination of major cybersecurity incidents

OI Falowo, S Popoola, J Riep, VA Adewopo… - IEEE Access, 2022 - ieeexplore.ieee.org
The exponential growth in the interconnectedness of people and devices, as well as the
upward trend in cyberspace usage will continue to lead to a greater reliance on the internet …

Human errors: A cybersecurity concern and the weakest link to small businesses

T Ncubukezi - Proceedings of the 17th International Conference …, 2022 - books.google.com
Cybersecurity is essential for all organizations, especially during this menacing Covid-19
global pandemic. The sudden transition of leaving the offices to work from home–the'new …

Scenario-based incident response training: lessons learnt from conducting an experiential learning virtual incident response tabletop exercise

GN Angafor, I Yevseyeva, L Maglaras - Information & Computer …, 2023 - emerald.com
Purpose This paper aims to discuss the experiences designing and conducting an
experiential learning virtual incident response tabletop exercise (VIRTTX) to review a …

Bridging the cyber security skills gap: Using tabletop exercises to solve the CSSG crisis

GN Angafor, I Yevseyeva, Y He - Joint International Conference on …, 2020 - Springer
Recent breaches like the WannaCry ransomware attack in 2017 are evidence of the rapidly
evolving cyber security threat landscape. They demonstrate the ability of cybercriminals to …

[HTML][HTML] Towards an Innovative Model for Cybersecurity Awareness Training

H Taherdoost - Information, 2024 - mdpi.com
The rapid evolution of cybersecurity threats poses a significant challenge to organizations
and individuals, necessitating strengthening defense mechanisms against malicious …

A novel autonomous container-based platform for cybersecurity training and research

N Chouliaras, I Kantzavelou, L Maglaras… - PeerJ Computer …, 2023 - peerj.com
Cyberattacks, particularly those targeting systems that store or handle sensitive data, have
become more sophisticated in recent years. To face increasing threats, continuous capacity …

Success factors for designing a cybersecurity exercise on the example of incident response

S Mäses, K Maennel, M Toussaint… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Exercises are a resource intensive form of providing participants learning, capability testing
and validation of plans and procedures. As exercises commonly are used in the field of …

[DOC][DOC] Cyber Security Education: Enhancing Cyber Security Capabilities, Navigating Trends and Challenges in a Dynamic Landscape

SM Hussain, SRK Tummalapalli… - Advances in Cyber …, 2024 - iipseries.org
In the rapidly evolving landscape of cyber security, education stands at the forefront,
adapting to meet the demands of an increasingly sophisticated digital realm. This chapter …

[PDF][PDF] Exploring the effectiveness of cybersecurity training programs: factors, best practices, and future directions

S Nasir - Proceedings of the Cyber Secure Nigeria Conference, 2023 - researchgate.net
Cybersecurity education is essential in equipping individuals with the proper knowledge and
skill sets to protect devices, computers, networks and data from cybersecurity risk. This …

A personalized learning theory-based cyber-security training exercise

N Chowdhury, V Gkioulos - International Journal of Information Security, 2023 - Springer
Current enterprises' needs for skilled cyber-security (CS) professionals have prompted the
development of diverse CS training programs and offerings. It has been noted that even …