Volume 6, 2018: Issue 1

 PDFDownload the article (Free)

Title:

Validation of a vignettes-based, hands-on cybersecurity threats situational assessment tool

Author(s):

Melissa Carlton, Nova Southeastern University, USA

Yair Levy, Nova Southeastern University, USA

Michelle M. Ramim, Middle Georgia State University, USA

Abstract:

Advanced Persistent Threats (APTs) have been growing with social engineering and corporate e-mail compromise reported as the two most penetration vectors to organizational networks. Historically, users (i.e., office assistants, managers, executives) have access to sensitive data and represent up to 95% of cybersecurity threats to organizations. This study addressed the problem of threats to organizational information systems (IS) due to vulnerabilities and breaches caused by employees. While in the past, only selected employees at the organization had access to the computer networks, with the proliferation of mobile devices almost all employees and vendors/contractors have access to the organizational networks. Computer and mobile device users are one of the weakest links in the cybersecurity chain, due to their limited cybersecurity skills (CySs). Over the years, the measures of CySs of computer users were based on selfreported surveys or measured knowledge only. Prior IS and medical research found participants view scenarios as nonintrusive and unintimidating, while providing a realistic way to assess various situations from sexual harassment to chemical hazards. Therefore, this paper discusses the validation stage of a cybersecurity threats situational assessment tool that utilizes vignettes with observable hands-on tasks to measure and quantify CySs. Discussions and future research are also presented.

Keywords:

Cybersecurity skills, cybersecurity knowledge, cybersecurity experience, cybersecurity threats situational assessment tool, and advanced persistent threats mitigation

Type:

Research paper

Journal:

The Online Journal of Applied Knowledge Management (OJAKM), ISSN: 2325-4688

Publisher:

International Institute for Applied Knowledge Management (IIAKM)

Accepted:

12 May 2018

Pages:

107-118