Evolutionary and Ideation Concepts for Cybersecurity Education

2022 ◽  
pp. 535-546
Author(s):  
David A Gould ◽  
Gregory Block ◽  
Simon Cleveland

Evolution is a well-established biological theory, but some basic concepts can be abstracted and applied to non-biological domains such as the education domain for the purposes of knowledge sharing. There is a gap in the literature regarding how evolutionary processes can be applied to cyber security education. This article presents the general evolutionary algorithm and pairs it with an ideation technique (SCAMPER) to illustrate how certain evolutionary processes can be applied to cyber security education and learning. This paper does not attempt to close the gap, but rather offer a theoretical approach to address the gap.

2020 ◽  
Vol 11 (1) ◽  
pp. 13-22
Author(s):  
David A Gould ◽  
Gregory Block ◽  
Simon Cleveland

Evolution is a well-established biological theory, but some basic concepts can be abstracted and applied to non-biological domains such as the education domain for the purposes of knowledge sharing. There is a gap in the literature regarding how evolutionary processes can be applied to cyber security education. This article presents the general evolutionary algorithm and pairs it with an ideation technique (SCAMPER) to illustrate how certain evolutionary processes can be applied to cyber security education and learning. This paper does not attempt to close the gap, but rather offer a theoretical approach to address the gap.


1993 ◽  
Vol 02 (01) ◽  
pp. 85-115 ◽  
Author(s):  
O.V. KULAGIN ◽  
G.A. PASMANIK ◽  
A.A. SHILOV

The results of the study on phase conjugation of weak optical signals with the energy of units of photons are considered. Basic concepts of a semi-classical theoretical approach to describe amplification and phase conjugation (PC) of such signals are presented. A review is given on the experimental investigations that allowed for reaching a limit (about 1 photon for a mode) sensitivity of optical systems with PC-mirrors for a large (~ 105) number of resolution elements. High-sensitivity PC-mirror optical systems are demonstrated for a variety of applications.


Heliyon ◽  
2019 ◽  
Vol 5 (12) ◽  
pp. e02855 ◽  
Author(s):  
Isabella M. Venter ◽  
Rénette J. Blignaut ◽  
Karen Renaud ◽  
M. Anja Venter

Author(s):  
Noor Afiza Mat Razali ◽  
Khairul Khalil Ishak ◽  
Muhamad Aliff Irfan Muhamad Fadzli ◽  
Nurjannatul Jannah Aqilah M. Saad

2019 ◽  
pp. 1697-1710
Author(s):  
Paul Kariuki

It is critical that cyber education curriculum considers the growing cyber technologies and which aspects of these technologies need to be aligned with the fourth industrial revolution. This chapter seeks to present a comprehensive analysis of the current level of cyber security education in South Africa. It will also track the current trends of cyber security education in the country as well as examining any challenges being experienced including any knowledge gaps. In the end, the chapter proposes recommendations for consideration in strengthening cybersecurity education in the country in to achieve advanced cyber security responses, capable of mitigating any cyber security threats. Offering quality cyber security education is important in preparing the next generation cyber security practitioners, who are highly competent and capable of developing innovative solutions in response to the growing global demand of cyber technologies. The chapter ends by proposing specific strategies that can guide towards this ideal in the context of the fourth industrial revolution.


Sign in / Sign up

Export Citation Format

Share Document