The Importance of Cybersecurity Awareness Training in the Aviation Industry for Early Detection of Cyberthreats and Vulnerabilities
Autor:
Sabillon, Regner
; Bermejo Higuera, Juan Ramón
Fecha:
2023Palabra clave:
Revista / editorial:
Springer LinkCitación:
Sabillon, R., Bermejo Higuera, J.R. (2023). The Importance of Cybersecurity Awareness Training in the Aviation Industry for Early Detection of Cyberthreats and Vulnerabilities. In: Degen, H., Ntoa, S., Moallem, A. (eds) HCI International 2023 – Late Breaking Papers. HCII 2023. Lecture Notes in Computer Science, vol 14059. Springer, Cham. https://doi.org/10.1007/978-3-031-48057-7_29Tipo de Ítem:
conferenceObjectResumen:
Nowadays, cybercriminals are targeting organizations to launch cyberattacks by exploiting cyberthreats and vulnerabilities. Hackers keep increasing the sophistication of the cyberattacks to orchestrate the different criminal hacking phases from conducting target reconnaissance to successfully achieving the desired objectives that could result in exfiltrating more than one digital asset. Many times, the targets are critical assets that organizations utilize to run their daily operations. The aviation industry is not the exception to this, and it is a matter of time before aviation companies will be dealing with imminent cyberattacks that will impact its financial operations, business reputation, legal and compliance areas, not to mention that its stakeholders can be a victim of a cyberattack at any time. Early prevention, detection and cybersecurity awareness training are key to recognize the initial stages of most common cyberattacks. From airport personnel to aviation crews, it is crucial to professionally delivering comprehensive cyber awareness training that will enforce the main of objectives of cybersecurity to protect aeronautical assets based on the CIA triad – Confidentiality, Integrity, and Availability. This article reviews existing cybersecurity awareness training policies from the industry governance agencies and proposes a customized training program based on the CATRAM. The Cybersecurity Awareness TRAining Model (CATRAM) was developed to deliver cybersecurity training to different organizational audiences, each of these groups with specific content and separate objectives. CATRAM was originally conceived to deliver awareness training for the members of the Board of Directors, Top Executives, Managers, IT (Information Technology) staff and of course, end-users.
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
Año |
2012 |
2013 |
2014 |
2015 |
2016 |
2017 |
2018 |
2019 |
2020 |
2021 |
2022 |
2023 |
2024 |
Vistas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
53 |
Descargas |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
The application of a new secure software development life cycle (S-SDLC) with agile methodologies
Vicente Mohino, Juan de ; Bermejo-Higuera, Javier ; Bermejo Higuera, Juan Ramón ; Sicilia, Juan Antonio (Electronics (Switzerland), 2019)The software development environment is focused on reaching functional products in the shortest period by making use of the least amount of resources possible. In this scenario, crucial elements such as software quality ... -
Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities
Bermejo Higuera, Juan Ramón ; Bermejo-Higuera, Javier ; Sicilia, Juan Antonio ; Cubo Villalba, Javier ; Nombela Pérez, Juan José (CMC-Computers Materials & Continua, 2020)To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities ... -
Building a dataset through attack pattern modeling and analysis system
Bermejo Higuera, Juan Ramón; Bermejo-Higuera, Javier; Tébar García, Juan Luis; Sicilia, Juan Antonio; Sánchez Rubio, Manuel (Elsevier Ltd, 2022)The different types of cyber-attacks on information and telecommunications systems are becoming increasingly sophisticated and complex, with several defined phases (attack pattern). Therefore, it is necessary to research ...