Please use this identifier to cite or link to this item: http://hdl.handle.net/10790/7108

Integration of Malware Analysis Concepts, Techniques, and Tools in Undergraduate Cybersecurity Programs

File Size Format  
chapman.m.2022-0001_ada.pdf 394.18 kB Adobe PDF View/Open

Item Summary

Title:Integration of Malware Analysis Concepts, Techniques, and Tools in Undergraduate Cybersecurity Programs
Authors:Chapman, Matthew A.
Keywords:Computer security
Malware (Computer software)
Sociology
Culture
Cloud computing
show 1 moreEducation
show less
Date Issued:Jun 2022
Publisher:IJERT
Citation:Chapman, M. A. (2022). Integration of Malware Analysis Concepts, Techniques, and Tools in Undergraduate Cybersecurity Programs. International Journal of Engineering Research & Technology (IJERT), 11(6). https://doi.org/10.17577/IJERTV11IS060073
Relation:https://doi.org/10.17577/IJERTV11IS060073
Abstract:Cybersecurity is one of the fastest growing technical career fields in the country. Due to the increasing threat to both government and industry information systems, it is necessary for cybersecurity programs to produce graduates that can react to the increasingly complex attempts by hostile actors to exploit computer networks. To respond to these growing threats, it is critical for graduates of cybersecurity undergraduate programs to have knowledge of the concepts, techniques, and tools to break down and analyze malicious software used by hostile actors, and understand evolving cyber- attack tactics, techniques, and procedures. Malware analysis is typically an advanced cyber security topic covered in cybersecurity graduate degree programs or specialized training; however, with the rapidly evolving threat, malware analysis must be incorporated into undergraduate cybersecurity degree programs in a significant level of detail. A curriculum is necessary that includes a survey of the socio-cultural aspects impacting the cyber threat landscape, fundamentals of traditional and cloud network architecture and services, and a detailed study into the fundamentals of both static and dynamic malware analysis.
Pages/Duration:8 pages
URI:http://hdl.handle.net/10790/7108
DOI:10.17577/IJERTV11IS060073
Rights:Attribution-NonCommercial-NoDerivs 3.0 United States
http://creativecommons.org/licenses/by-nc-nd/3.0/us/
Journal:International Journal of Engineering Research & Technology
Volume:11
Issue/Number:6
Appears in Collections: Chapman, Matthew A.


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons