{"title":"Computers and Networks","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-1","DOIUrl":"https://doi.org/10.1201/9781003035626-1","url":null,"abstract":"","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114963019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Network Security","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-9","DOIUrl":"https://doi.org/10.1201/9781003035626-9","url":null,"abstract":"With the penetration of mobile device use as well as embedded and cyber-physical systems deployment, the underlying wireless communication and network systems have become critical society infrastructures, and thus their security and privacy are critical to the wellbeing of our society. This course will exam the challenges in providing secure communication and network services in a variety of wireless systems, as well as the existing and emerging approaches to managing these challenges. Focus will be placed on securing the operation and performance of wireless networks, with less emphasis on information security. Topics to be covered include vulnerabilities, attacks, security mechanisms, and trade-offs at various layers of the network protocol stack, from aspects of physical communication to application and service security issues; examples include jamming, MAC-layer misbehavior, selective packet dropping, decentralized trust and reputation, and crosslayer holistic attacks. Systems of interest include, but are not limited to, personal devices, connected vehicles, IoT and cyber-physical systems, wireless infrastructure, and ad hoc networks.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Device Security","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/b18165-21","DOIUrl":"https://doi.org/10.1201/b18165-21","url":null,"abstract":"Concerns for Rapid Mobile Adoption The use of mobile technology is a cornerstone of the White House’s Digital Government Strategy aimed at increasing the productivity within the federal government and delivering mobile-enabled services to citizens. However, gaps in mobile security have been identified as major barriers to expanding the use of mobile technology. A 2013 report indicated that 38 percent of smartphone users have been victims of cyber crime. This rate is expected to grow with mobile threats on the rise. For instance, 3.5 million unique malware and high-risk apps were seen in 2014, 10 times more than reported in 2012. Without a radical change, current and future investments in mobile technology will succumb to unmanageable risk that attenuates the benefits afforded by mobile technology.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"44 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141209849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Password Management","authors":"Kutub Thakur, A. Pathan","doi":"10.1201/9781003035626-7","DOIUrl":"https://doi.org/10.1201/9781003035626-7","url":null,"abstract":"New! Self-service password reset Starting Sept. 23 Systems Administration employees can now reset their CU account passwords themselves. With this new service, you will be able to reset your own password if it is expired or forgotten from anywhere, 24/7 rather than contacting the Service Desk after you enroll in this new service. Once you have enrolled, use our How to Guide [3] for step-by-step instructions or head to the password reset page [4]. Enrollment To participate in self-service password, System Administration employees must opt-in to the service. This allows us to authenticate your back-up email to reset your password with a personal account from anywhere, 24/7. Haven’t enrolled yet? An email will be sent to all System Administration staff Monday, Sept. 23 from noreplyauthmanager@cu.edu [5]. Can’t find the enrollment email? Manage your enrollment [6]or Contact the Service Desk [7]. We also have a How to Guide [8] to help.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127759532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Device Security","authors":"Fei Yu","doi":"10.1201/9781003035626-11","DOIUrl":"https://doi.org/10.1201/9781003035626-11","url":null,"abstract":"Concerns for Rapid Mobile Adoption The use of mobile technology is a cornerstone of the White House’s Digital Government Strategy aimed at increasing the productivity within the federal government and delivering mobile-enabled services to citizens. However, gaps in mobile security have been identified as major barriers to expanding the use of mobile technology. A 2013 report indicated that 38 percent of smartphone users have been victims of cyber crime. This rate is expected to grow with mobile threats on the rise. For instance, 3.5 million unique malware and high-risk apps were seen in 2014, 10 times more than reported in 2012. Without a radical change, current and future investments in mobile technology will succumb to unmanageable risk that attenuates the benefits afforded by mobile technology.","PeriodicalId":127635,"journal":{"name":"Cybersecurity Fundamentals","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122316553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}