Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research 2011
DOI: 10.1145/2179298.2179312
|View full text |Cite
|
Sign up to set email alerts
|

NSF investments in cybersecurity research and education

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The infrastructure required to stage an educational setting for students may run in direct contravention with those of information technology (IT) requirements in an educational setup [3]. To accommodate different nuances in cybersecurity education the IT framework for setting up cyber-security education has to adapt such that it forms an experimental and learning platform.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The infrastructure required to stage an educational setting for students may run in direct contravention with those of information technology (IT) requirements in an educational setup [3]. To accommodate different nuances in cybersecurity education the IT framework for setting up cyber-security education has to adapt such that it forms an experimental and learning platform.…”
Section: Introductionmentioning
confidence: 99%
“…An attack on the cyber-infrastructure requires a. Cybersecurity encompasses protection of digital assets, preserving user privacy and counteracting threats to digital assets in an ethical and legal way. Digital Assets in this context refers to: The primary objectives of cybersecurity education encompass [2], [3]: To accomplish these objectives of a cybersecurity education an infrastructure to support networking concepts, software development framework, a staging area to understand attacks in a computing system and hardware. Classification of different types attack scenarios are required to chalk up the IT based education for a cyber-infrastructure.…”
Section: Introductionmentioning
confidence: 99%