Report
Cybersecurity Training for Users of Remote Computing
العنوان: | Cybersecurity Training for Users of Remote Computing |
---|---|
المؤلفون: | Ponce, Marcelo, van Zon, Ramses |
المصدر: | Journal of Computational Science Education (2023), vol. 14, issue 2, pp. 10-17 |
سنة النشر: | 2023 |
المجموعة: | Computer Science |
مصطلحات موضوعية: | Computer Science - Cryptography and Security, Computer Science - Computers and Society, Computer Science - Distributed, Parallel, and Cluster Computing |
الوصف: | End users of remote computing systems are frequently not aware of basic ways in which they could enhance protection against cyber-threats and attacks. In this paper, we discuss specific techniques to help and train users to improve cybersecurity when using such systems. To explain the rationale behind these techniques, we go into some depth explaining possible threats in the context of using remote, shared computing resources. Although some of the details of these prescriptions and recommendations apply to specific use cases when connecting to remote servers, such as a supercomputer, cluster, or Linux workstation, the main concepts and ideas can be applied to a wider spectrum of cases. Comment: To be presented at SEHET23@PEARC23 and published in the Journal of Computational Science Education. Associated repository with best practices and recommendations: https://github.com/cybersec-BestPractices/cybersec-RemoteComputing |
نوع الوثيقة: | Working Paper |
DOI: | 10.22369/issn.2153-4136/14/2/3 |
URL الوصول: | http://arxiv.org/abs/2306.07192 |
رقم الانضمام: | edsarx.2306.07192 |
قاعدة البيانات: | arXiv |
ResultId |
1 |
---|---|
Header |
edsarx arXiv edsarx.2306.07192 1065 3 Report report 1065.21752929688 |
PLink |
https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2306.07192&custid=s6537998&authtype=sso |
FullText |
Array
(
[Availability] => 0
)
Array ( [0] => Array ( [Url] => http://arxiv.org/abs/2306.07192 [Name] => EDS - Arxiv [Category] => fullText [Text] => View record in Arxiv [MouseOverText] => View record in Arxiv ) ) |
Items |
Array
(
[Name] => Title
[Label] => Title
[Group] => Ti
[Data] => Cybersecurity Training for Users of Remote Computing
)
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Ponce%2C+Marcelo%22">Ponce, Marcelo</searchLink><br /><searchLink fieldCode="AR" term="%22van+Zon%2C+Ramses%22">van Zon, Ramses</searchLink> ) Array ( [Name] => TitleSource [Label] => Source [Group] => Src [Data] => Journal of Computational Science Education (2023), vol. 14, issue 2, pp. 10-17 ) Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2023 ) Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => Computer Science ) Array ( [Name] => Subject [Label] => Subject Terms [Group] => Su [Data] => <searchLink fieldCode="DE" term="%22Computer+Science+-+Cryptography+and+Security%22">Computer Science - Cryptography and Security</searchLink><br /><searchLink fieldCode="DE" term="%22Computer+Science+-+Computers+and+Society%22">Computer Science - Computers and Society</searchLink><br /><searchLink fieldCode="DE" term="%22Computer+Science+-+Distributed%2C+Parallel%2C+and+Cluster+Computing%22">Computer Science - Distributed, Parallel, and Cluster Computing</searchLink> ) Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => End users of remote computing systems are frequently not aware of basic ways in which they could enhance protection against cyber-threats and attacks. In this paper, we discuss specific techniques to help and train users to improve cybersecurity when using such systems. To explain the rationale behind these techniques, we go into some depth explaining possible threats in the context of using remote, shared computing resources. Although some of the details of these prescriptions and recommendations apply to specific use cases when connecting to remote servers, such as a supercomputer, cluster, or Linux workstation, the main concepts and ideas can be applied to a wider spectrum of cases.<br />Comment: To be presented at SEHET23@PEARC23 and published in the Journal of Computational Science Education. Associated repository with best practices and recommendations: https://github.com/cybersec-BestPractices/cybersec-RemoteComputing ) Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => Working Paper ) Array ( [Name] => DOI [Label] => DOI [Group] => ID [Data] => 10.22369/issn.2153-4136/14/2/3 ) Array ( [Name] => URL [Label] => Access URL [Group] => URL [Data] => <link linkTarget="URL" linkTerm="http://arxiv.org/abs/2306.07192" linkWindow="_blank">http://arxiv.org/abs/2306.07192</link> ) Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsarx.2306.07192 ) |
RecordInfo |
Array
(
[BibEntity] => Array
(
[Identifiers] => Array
(
[0] => Array
(
[Type] => doi
[Value] => 10.22369/issn.2153-4136/14/2/3
)
)
[Subjects] => Array
(
[0] => Array
(
[SubjectFull] => Computer Science - Cryptography and Security
[Type] => general
)
[1] => Array
(
[SubjectFull] => Computer Science - Computers and Society
[Type] => general
)
[2] => Array
(
[SubjectFull] => Computer Science - Distributed, Parallel, and Cluster Computing
[Type] => general
)
)
[Titles] => Array
(
[0] => Array
(
[TitleFull] => Cybersecurity Training for Users of Remote Computing
[Type] => main
)
)
)
[BibRelationships] => Array
(
[HasContributorRelationships] => Array
(
[0] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Ponce, Marcelo
)
)
)
[1] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => van Zon, Ramses
)
)
)
)
[IsPartOfRelationships] => Array
(
[0] => Array
(
[BibEntity] => Array
(
[Dates] => Array
(
[0] => Array
(
[D] => 12
[M] => 06
[Type] => published
[Y] => 2023
)
)
)
)
)
)
)
|
IllustrationInfo |