Cybersecurity Training for Users of Remote Computing

التفاصيل البيبلوغرافية
العنوان: Cybersecurity Training for Users of Remote Computing
المؤلفون: Ponce, Marcelo, van Zon, Ramses
المصدر: Journal of Computational Science Education (2023), vol. 14, issue 2, pp. 10-17
سنة النشر: 2023
المجموعة: Computer Science
مصطلحات موضوعية: Computer Science - Cryptography and Security, Computer Science - Computers and Society, Computer Science - Distributed, Parallel, and Cluster Computing
الوصف: End users of remote computing systems are frequently not aware of basic ways in which they could enhance protection against cyber-threats and attacks. In this paper, we discuss specific techniques to help and train users to improve cybersecurity when using such systems. To explain the rationale behind these techniques, we go into some depth explaining possible threats in the context of using remote, shared computing resources. Although some of the details of these prescriptions and recommendations apply to specific use cases when connecting to remote servers, such as a supercomputer, cluster, or Linux workstation, the main concepts and ideas can be applied to a wider spectrum of cases.
Comment: To be presented at SEHET23@PEARC23 and published in the Journal of Computational Science Education. Associated repository with best practices and recommendations: https://github.com/cybersec-BestPractices/cybersec-RemoteComputing
نوع الوثيقة: Working Paper
DOI: 10.22369/issn.2153-4136/14/2/3
URL الوصول: http://arxiv.org/abs/2306.07192
رقم الانضمام: edsarx.2306.07192
قاعدة البيانات: arXiv
ResultId 1
Header edsarx
arXiv
edsarx.2306.07192
1065
3
Report
report
1065.21752929688
PLink https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2306.07192&custid=s6537998&authtype=sso
FullText Array ( [Availability] => 0 )
Array ( [0] => Array ( [Url] => http://arxiv.org/abs/2306.07192 [Name] => EDS - Arxiv [Category] => fullText [Text] => View record in Arxiv [MouseOverText] => View record in Arxiv ) )
Items Array ( [Name] => Title [Label] => Title [Group] => Ti [Data] => Cybersecurity Training for Users of Remote Computing )
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Ponce%2C+Marcelo%22">Ponce, Marcelo</searchLink><br /><searchLink fieldCode="AR" term="%22van+Zon%2C+Ramses%22">van Zon, Ramses</searchLink> )
Array ( [Name] => TitleSource [Label] => Source [Group] => Src [Data] => Journal of Computational Science Education (2023), vol. 14, issue 2, pp. 10-17 )
Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2023 )
Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => Computer Science )
Array ( [Name] => Subject [Label] => Subject Terms [Group] => Su [Data] => <searchLink fieldCode="DE" term="%22Computer+Science+-+Cryptography+and+Security%22">Computer Science - Cryptography and Security</searchLink><br /><searchLink fieldCode="DE" term="%22Computer+Science+-+Computers+and+Society%22">Computer Science - Computers and Society</searchLink><br /><searchLink fieldCode="DE" term="%22Computer+Science+-+Distributed%2C+Parallel%2C+and+Cluster+Computing%22">Computer Science - Distributed, Parallel, and Cluster Computing</searchLink> )
Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => End users of remote computing systems are frequently not aware of basic ways in which they could enhance protection against cyber-threats and attacks. In this paper, we discuss specific techniques to help and train users to improve cybersecurity when using such systems. To explain the rationale behind these techniques, we go into some depth explaining possible threats in the context of using remote, shared computing resources. Although some of the details of these prescriptions and recommendations apply to specific use cases when connecting to remote servers, such as a supercomputer, cluster, or Linux workstation, the main concepts and ideas can be applied to a wider spectrum of cases.<br />Comment: To be presented at SEHET23@PEARC23 and published in the Journal of Computational Science Education. Associated repository with best practices and recommendations: https://github.com/cybersec-BestPractices/cybersec-RemoteComputing )
Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => Working Paper )
Array ( [Name] => DOI [Label] => DOI [Group] => ID [Data] => 10.22369/issn.2153-4136/14/2/3 )
Array ( [Name] => URL [Label] => Access URL [Group] => URL [Data] => <link linkTarget="URL" linkTerm="http://arxiv.org/abs/2306.07192" linkWindow="_blank">http://arxiv.org/abs/2306.07192</link> )
Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsarx.2306.07192 )
RecordInfo Array ( [BibEntity] => Array ( [Identifiers] => Array ( [0] => Array ( [Type] => doi [Value] => 10.22369/issn.2153-4136/14/2/3 ) ) [Subjects] => Array ( [0] => Array ( [SubjectFull] => Computer Science - Cryptography and Security [Type] => general ) [1] => Array ( [SubjectFull] => Computer Science - Computers and Society [Type] => general ) [2] => Array ( [SubjectFull] => Computer Science - Distributed, Parallel, and Cluster Computing [Type] => general ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => Cybersecurity Training for Users of Remote Computing [Type] => main ) ) ) [BibRelationships] => Array ( [HasContributorRelationships] => Array ( [0] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Ponce, Marcelo ) ) ) [1] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => van Zon, Ramses ) ) ) ) [IsPartOfRelationships] => Array ( [0] => Array ( [BibEntity] => Array ( [Dates] => Array ( [0] => Array ( [D] => 12 [M] => 06 [Type] => published [Y] => 2023 ) ) ) ) ) ) )
IllustrationInfo