scholarly journals Penetration Testing Curriculum Development in Practice

10.28945/2189 ◽  
2015 ◽  
Vol 14 ◽  
pp. 085-099 ◽  
Author(s):  
Chengcheng Li

As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. To fill this job shortage we need a workforce with strong hands-on experience in the latest technologies and software tools to catch up with the rapid evolution of network technologies. It is vital that the IT professionals possess up-to-date technical skills and think and act one step ahead of the cyber criminals who are constantly probing and exploring system vulnerabilities. There is no perfect security mechanism that can defeat all the cyber-attacks; the traditional defensive security mechanism will eventually fail to the pervasive zero-day attacks. However, there are steps to follow to reduce an organization’s vulnerability to cyber-attacks and to mitigate damages. Active security tests of the network from a cyber-criminal’s perspective can identify system vulnerabilities that may lead to future breaches. “If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. But if you know the enemy and know yourself, you need not fear the result of hundred battles” (Sun, 2013). Penetration testing is a discipline within cybersecurity that focuses on identifying and exploiting the vulnerabilities of a network, eventually obtaining access to the critical business information. The pentesters, the security professionals who perform penetration testing, or ethical hackers, break the triad of information security - Confidentiality, Integrity, and Accountability (CIA) - as if they were a cyber-criminal. The purpose of ethical hacking or penetration testing is to know what the “enemy” can do and then generate a report for the management team to aid in strengthening the system, never to cause any real damages. This paper introduces the development of a penetration testing curriculum as a core class in an undergraduate cybersecurity track in Information Technology. The teaching modules are developed based on the professional penetration testing life cycle. The concepts taught in the class are enforced by hands-on lab exercises. This paper also shares the resources that are available to institutions looking for teaching materials and grant opportunities to support efforts when creating a similar curriculum in cybersecurity.

1960 ◽  
Vol 33 (3) ◽  
pp. 285
Author(s):  
William H. Kruskal ◽  
Lester G. Telser

2021 ◽  
Vol 21 (3) ◽  
pp. 1-22
Author(s):  
Celestine Iwendi ◽  
Saif Ur Rehman ◽  
Abdul Rehman Javed ◽  
Suleman Khan ◽  
Gautam Srivastava

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.


1915 ◽  
Author(s):  
Laura Erhard ◽  
Brett McBride ◽  
Adam safir

As part of the implementation of its strategic plan, the U.S. Bureau of Labor Statistics (BLS) has increasingly studied the issue of using alternative data to improve both the quality of its data and the process by which those data are collected. The plan includes the goal of integrating alternative data into BLS programs. This article describes the framework used by the BLS Consumer Expenditure Surveys (CE) program and the potential these data hold for complementing data collected in traditional formats. It also addresses some of the challenges BLS faces when using alternative data and the complementary role that alternative data play in improving the quality of data currently collected. Alternative data can substitute for what is presently being collected from respondents and provide additional information to supplement the variables the CE program produces or to adjust the CE program’s processing and weighting procedures.


AAOHN Journal ◽  
2002 ◽  
Vol 50 (11) ◽  
pp. 508-514 ◽  
Author(s):  
Doloris N. Higgins ◽  
Jeanette Tierney ◽  
Lawrence Hanrahan

During the period between 1992 through 1998, the Bureau of Labor Statistics identified an average of 67 work related deaths of individuals younger than 18 each year. This article describes the Fatality Assessment and Control Evaluation (FACE) program and summarizes indepth data collected on 59 young worker fatalities in 26 states. These investigations were conducted between May 1986 and February 2002. Young workers ranged in age from 9 to 17 years, with a mean age of 15.3 years: 21 were working in the agriculture, forestry, and fishing industry; 12 in construction; 10 in manufacturing; 8 in services; and 8 in the retail industry. The majority worked as laborers. Ninety-three percent were young men. Each investigation resulted in the formulation and dissemination of strategies to help prevent future similar occurrences. As an example of state FACE activities, the article describes the Wisconsin FACE program's efforts to foster collaboration between regulatory agencies, researchers, educators, and occupational safety and health professionals, and to integrate efforts aimed at improving safety for young workers.


2020 ◽  
Vol 3 (2) ◽  
pp. 17-18
Author(s):  
Luneta Fe S. David ◽  
Anabelle S. Palic

As one of the most comprehensive compensation tools for motivating employees, compensation package plans are forms of payment in an organization's compensation practices associated with performance. It is generally one of the organization’s highest costs. According to the U.S. Bureau of Labor Statistics (BLS), 69.6% of a business' employee compensation expenses comprise the salaries and wages. While some costs are controllable, most employers must bear several salary-related costs beyond the base salary (Keegan, 2020). By far, there has never been any attempt to investigate the economic implications of the compensation package in terms of savings on expenditures. Hence, this study primarily intends to determine the economic implications of the compensation package to a business process outsourcing (BPO) in Bacolod City in terms of savings on expenditures. Likewise, it examines the strengths, weaknesses, threats, and opportunities of the company.


Sign in / Sign up

Export Citation Format

Share Document