10
Int Cont. Frontier in Education: CS and CE | FECS'9 |
An Introductory Visualization Aid for Cybersecurity Education
riel Castro Aguayo!, Ulises Morales!, Xisoyu Long!, Quamar Niyaz', Xisoli Yang’, Ahmad Y Javaid”
ECE Department, College of Engineering and Sciences, Purdue Universit
Northwest, USA,
FEECS Department, College OF Engineering, The University of Toledo, USA
{geastoa, umorales, long312, qniyaz, yangx} @paviedu, ahmad
[email protected]
Abstrac—As the technology keeps overgowing. the Internet
uring becomes more popular A a consequence, es tend 10
tse i for social media shopping. banking or anyother online
senc in which they need to put hir personal information.
These online aces eect mals computer ers o apply
(benamack telniques to steal other ers information. The
ters become ack victims due 10 limited understanding of
(Oberatacks and safety practices In ths paper we propose à
Framework development for interactive and engaing eer
‘iy educan. Wh the Delp a the fameork the wer wl be
able to Tear diferent pes of exbertacks and defenses along
Ith he safe ebersecury practices. We als discuss the euren!
"eof the framework and conclue the paper with discusion
on miras and future work."
Keywords
1. Introduction
With Wis technology boom, most people end o be on their
smariphoe or computer surfing online nowadays. Even though
the Imeret makes cur lives easy by providing online services
uch as allowing customers to make puestas online Fer
‘han actully going lo the sores, some misfortunes can oscar
en we are wing thos series, As more people rely on
the computers, the more vulnerable they become o ay stack
Mais computer wer can find ways to sal cet card or
personal information by using malware or backdoor. According 10
Symantec 2018 report [1], 27% mobile app in Weste category
ere malicious. That is no Uh end, the number of non malware
variant for smartphones ha increased, According o an al
im DI e cyber victims los around $1.5 billion in 2017
nd more an 300K Internet rime complaints were reported to
the ner Crime Complains Center in ne sme year. The same
asilo mentioned la 23% of Americans in a conducted survey
‘Spore that credit card infomation of thee family members
ere stolen by the hackers.
"There re some god paces that one can use Wen these
Indus atacks and be properly secured. One good practice
is hy being observant of any changes on he device or have
scary software o asst wil some automated sean. Another
opera con, visualizan ameno. Unity 3D
Ser ie, pe en er
Re Ta ce Sa D e po
practice is wo observe for any unusual cv in a smanphone.
Sch as obsesine data wage or cven overeating Besides,
Smarphones oso evens such as installation and data usage
that can help nro down the aplication responsible for any
malcious scies Practicing yborccuiy methods can hoj
reduce ie potential of having information Solen from atackers-
However the is ack of eyhersecury safety practices among
the wens, Therefore, i imperativo 1 spread the eybesccun
ares trough ire channels and educate he uses how
to avoid cyber, Having users practice visually can be
Benfica to teach them safe practices of using technology and
Being online. As eybenccurty visualization can be effective for
security analysts lo preven a malicious tack, ican ako be
tpl wo engage ases in the Iain process of berry
heats and defenses (3).
Wi this motion, we propose a visualization based ber
secu cation framework that wil help users especially the
teenagers in middle and igh school, understand the cyber
cary ies ey may run ino. I will allow them to leary
about the aci that they are exposed o when navigaing
Online, so they can present thee misfortunes. Thee are two
main reasons to focus on users from carly ages. Fs they
tend to be the fue of our socia. so they migh be the next
generation of eybercunty specialists who might he able to
Prevent more adtancod eyberatacks, Second, the increased usage
Of smaripones and the Internet by lenges his brought several
Security concerns for them and their ame. With the increas
time spen online, tens frequently encounter cyberbullying or
unpesant experiences. Accoig lo a survey conducted by
Me, 34% tens acknowledged that hy have experien
Syberbuling. The same study mentioned that 39% teens do
not adequately set her privacy stings 4) for different online
applications. The developed framework consis of serie
heal inertes wit diferent cavironments vo pode cyber
“ocur hnowleige and safety practices to mile and high chal
Students. As the primary target is teenagers fo this framework,
the development of the personal computer (PC) a well asthe
Iahesmariphone versions will be aalable 1 fll every wer
neat.
“Tae es ofthe paper is stud as Falls. In Scion 2, we
ri discuss the related work Section 3 discuss the applica
thm design ofthe framework, In Section 4, we disse vaio
visulizaon based eyberecunity education topics implemented
at inrdctory Teel the Framework, Finally we conclad our
paper in Section 8
ISBN: 1-60132-498-7, CSREA Press ©