Please use this identifier to cite or link to this item:
http://hdl.handle.net/10790/7108
Integration of Malware Analysis Concepts, Techniques, and Tools in Undergraduate Cybersecurity Programs
File | Size | Format | ||
---|---|---|---|---|
chapman.m.2022-0001_ada.pdf | 394.18 kB | Adobe PDF | View/Open |
Item Summary
Title: | Integration of Malware Analysis Concepts, Techniques, and Tools in Undergraduate Cybersecurity Programs |
Authors: | Chapman, Matthew A. |
Keywords: | Computer security Malware (Computer software) Sociology Culture Cloud computing show 1 moreEducation show less |
Date Issued: | Jun 2022 |
Publisher: | IJERT |
Citation: | Chapman, M. A. (2022). Integration of Malware Analysis Concepts, Techniques, and Tools in Undergraduate Cybersecurity Programs. International Journal of Engineering Research & Technology (IJERT), 11(6). https://doi.org/10.17577/IJERTV11IS060073 |
Relation: | https://doi.org/10.17577/IJERTV11IS060073 |
Abstract: | Cybersecurity is one of the fastest growing technical career fields in the country. Due to the increasing threat to both government and industry information systems, it is necessary for cybersecurity programs to produce graduates that can react to the increasingly complex attempts by hostile actors to exploit computer networks. To respond to these growing threats, it is critical for graduates of cybersecurity undergraduate programs to have knowledge of the concepts, techniques, and tools to break down and analyze malicious software used by hostile actors, and understand evolving cyber- attack tactics, techniques, and procedures. Malware analysis is typically an advanced cyber security topic covered in cybersecurity graduate degree programs or specialized training; however, with the rapidly evolving threat, malware analysis must be incorporated into undergraduate cybersecurity degree programs in a significant level of detail. A curriculum is necessary that includes a survey of the socio-cultural aspects impacting the cyber threat landscape, fundamentals of traditional and cloud network architecture and services, and a detailed study into the fundamentals of both static and dynamic malware analysis. |
Pages/Duration: | 8 pages |
URI: | http://hdl.handle.net/10790/7108 |
DOI: | 10.17577/IJERTV11IS060073 |
Rights: | Attribution-NonCommercial-NoDerivs 3.0 United States http://creativecommons.org/licenses/by-nc-nd/3.0/us/ |
Journal: | International Journal of Engineering Research & Technology |
Volume: | 11 |
Issue/Number: | 6 |
Appears in Collections: |
Chapman, Matthew A. |
Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.
This item is licensed under a Creative Commons License