Mathematics For Cyber Security Pdf
Abstract
The original purpose of this research project was to clarify what math topics and courses would be most helpful in preparing students for a program of study in cybersecurity and eventually for success in that professional environment. After that research question was generally solved in this study, more pertinent issues became apparent, namely, the need for seamless integration of cybersecurity practices into all computing courses and topics, and the urgency to promote the need for cyber professionals so as to motivate students to pursue degrees in all types of cybersecurity. This paper is a report of both what specific math topics are needed for success in various aspects of cybersecurity and possible ways to integrate cybersecurity content into many or most of the courses of an academic computing program. The daunting problem of recruiting more students into cybersecurity degree programs still remains, but maybe its mere awareness will focus more attention toward it.
Get full access to this article
Purchase, subscribe or recommend this article to your librarian.
Already a Subscriber?Sign In
References
- http://www.24af.af.mil/About-Us/, 11-1-2017. Google Scholar
- http://www.24af.af.mil/Portals/11/documents/About_Us/AFD-111003-050.pdf?ver=2016-04-26-113014-917, 11-1-2017. Google Scholar
- http://www.24af.af.mil/Portals/11/documents/About_Us/AFD-111003-057.pdf?ver=2016-04-26-113009-917, 11-1-2017. Google Scholar
- http://www.24af.af.mil/Portals/11/documents/About_Us/AFD-140429-035.pdf?ver=2016-04-26-113101-810, 11-1-2017. Google Scholar
- http://www.abet.org/abet-news/updates/, 10-14-2017. Google Scholar
- https://www.acm.org/binaries/content/assets/education/cs2013_web_final.pdf, 2017. Google Scholar
- https://www.cisco.com/c/dam/en/us/products/collateral/security/cybersecurity-talent.pdf, 11-1-2017. Google Scholar
- https://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/#1fb097927ea2, 11-1-2017. Google Scholar
- https://www.isc2.org/Certifications/CISSP, 10-14-2017. Google Scholar
- https://downloads.isc2.org/exam-outlines/CISSP-Exam-Outline.pdf, 2017. Google Scholar
- https://niccs.us-cert.gov/formal-education/national-centers-academic-excellence-cae, 11-1-2017. Google Scholar
- https://www.huffingtonpost.com/entry/toaster-weather-forecast-toasteroid_us_57b30217e4b0a8e1502526a4, 9-12-2017. Google Scholar
- Bier, V., Azaiez, M. (Eds). Game Theoretic Risk Analysis of Security Threats. New York: Springer, 2009. Google Scholar
- Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Information Security Analysts, https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm, 9-12-2017. Google Scholar
- Catlett, C. (Ed.). A scientific research and development approach to cyber security. Report submitted to the U.S. Department of Energy, 2008. Google Scholar
- Dickman, D., Locaria, D., Wool, J., Reducing cyber risk. Coast Guard Journal of Safety & Security at Sea, Proceedings of the Marine Safety & Security Council, 71(4), 15--17, 2014. Google Scholar
- Do, V., Fillatre, L., Nikiforov, I., Willett, P., Feature article: security of SCADA systems against cyber-physical attacks, Aerospace and Electronic Systems Magazine IEEE, 32(1), 28--45, 2017. Google Scholar
- Dunlavy, D., Hendrickson, B., Kolda. T., Mathematical challenges in cybersecurity. Technical Report SAND2009-0805, Sandia National Laboratories, 2009. Google Scholar
- Floyd, S., Paxson. V., Difficulties in simulating the internet. IEEE/ACM Transactions on Networking, 9(4), 392--403, 2001. Google Scholar
- Gai, K., Qiu, M., Hassan, H. Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing. Concurrency Computation: Practical Experiences, 29: e3856. 2017. Google Scholar
- Hausken, K., Levitin, G., Review of systems defense and attack models. International Journal of Performability Engineering, 8(4), 355--366, 2012. Google Scholar
- Lewis, T., Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition, Wiley Publications, 2014. Google Scholar
- Ma, C., Rao, N, Yau, D., A game-theoretic study of attack and defense in cyber-physical systems. In Proceedings of International Workshop on Cyber-Physical Networking Systems, 2011. Google Scholar
- Newhouse, W., Keith, S., Scribner, B., Witte, G., National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, NIST Special Publication 800-181, 2017. Google Scholar
- Pal, R., Hui, P., Cyberinsurance for cybersecurity a topological take on modulating insurance premiums. ACM SIGMETRICS Performance Evaluation Review, 40(3), 86--88, 2012. Google Scholar
- Parnell, G., Butler, R., Wichmann, S., Tedeschi, M., Merritt, D., Air Force Cyberspace Investment Analysis. Decision Analysis 12(2),81--95, 2015. Google Scholar
- Pasqualetti, F., Dörfler, F., Bullo, F., Attack Detection and Identification in Cyber-Physical Systems, IEEE Transactions on Automatic Control, 58(11), pp. 2715--2729, Nov. 2013. Google Scholar
- Rao, N., Poole, S., Ma, C., He, F., Zhuang, J., Yau, D., Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models, 2015. Google Scholar
- Schramm, H., Gaver, D., Lanchester for cyber: The mixed epidemic-combat model. Naval Research Logistics, 60, 599--605. 2013. Google Scholar
- Sha, W., Zhu, Y., Huang, T., Qiu, M., Zhu, Y., Zhang, Q., A multi-order markov chain based scheme for anomaly detection. IEEE 37th Annual Computer Software and Applications Conference Workshops, IEEE: Japan, 83--88, 2013. Google Scholar
- Simon, S., Devlin, K., Math's Role in Internet Security, National Public Radio: The Weekend Edition, Interview, April 8, 2006. https://www.npr.org/templates/story/story.php?storyId=5331973, 9-12-2017 Google Scholar
- Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q., A survey of game theory as applied to network security. Proceedings of the 43rd Hawaii International Conference on System Sciences, 1--10, 2010. Google Scholar
Index Terms
(auto-classified)
-
Cybersecurity: 1) what math is necessary and 2) developing ubiquitous cybersecurity in current computing programs
-
Comments
Mathematics For Cyber Security Pdf
Source: https://dl.acm.org/doi/pdf/10.5555/3199572.3199580
Posted by: moakcamagirse.blogspot.com

0 Response to "Mathematics For Cyber Security Pdf"
Post a Comment