2020
DOI: 10.1145/3386363
|View full text |Cite
|
Sign up to set email alerts
|

Project-based learning continues to inspire cybersecurity students

Abstract: County (UMBC) ScholarWorks@UMBC digital repository on the Maryland Shared Open Access (MD-SOAR) platform.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…This five-day UMBC case study-the fourth in a series organized by Sherman [11,35,36]-illustrates how easily shadow IT can grow and expand throughout an organization and how it can create vulnerabilities. Institutions of higher learning, with independent sources of funding available through grants and a mindset of autonomy, are especially vulnerable to the dangers of shadow IT.…”
Section: Case Study: Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…This five-day UMBC case study-the fourth in a series organized by Sherman [11,35,36]-illustrates how easily shadow IT can grow and expand throughout an organization and how it can create vulnerabilities. Institutions of higher learning, with independent sources of funding available through grants and a mindset of autonomy, are especially vulnerable to the dangers of shadow IT.…”
Section: Case Study: Overviewmentioning
confidence: 99%
“…The study also illustrates how shadow IT arises to satisfy an unmet need. This research study was the fourth in a series organized by Sherman [11,35,36] to inspire students through authentic project-based learning.…”
Section: B Case Study: Technical Detailsmentioning
confidence: 99%
“…Network security involves physical and technical security, information security, and ideological security. For a long time, the network construction of some colleges and universities generally had the phenomenon of focusing on technology but not education and focusing on application but not management, leaving hidden dangers to network security, which is not only detrimental to the growth and success of college students but also a serious threat to the stability of the campus and even the society [3][4][5]. However, with the popularity of the Internet, network security has become an important issue that cannot be ignored.…”
Section: Introductionmentioning
confidence: 99%