Font Size: a A A

The study of cybersecurity algorithms from traditional computing to the Internet of Things

Posted on:2017-04-20Degree:M.SType:Thesis
University:The University of Alabama in HuntsvilleCandidate:Davis, DanielFull Text:PDF
GTID:2458390008493064Subject:Computer Science
Abstract/Summary:
A progressive approach to teach students how to develop and deploy cybersecurity algorithms across a wide range of heterogeneous computing devices is proposed. Data confidentiality and data integrity can be ensured when sensitive information is transferred between various types of devices over insecure communication channels by using cybersecurity algorithms. A step-by-step procedure to teach students cybersecurity algorithms on devices ranging from personal computers to devices deployed in the Internet of Things ecosystem is needed. We develop four learning modules that offer students the opportunity to explore commonly utilized cybersecurity algorithms across several heterogeneous devices. Students are able to utilize our learning modules in hands-on projects to develop their own applications that utilizes cybersecurity algorithms to protect their sensitive information. Improvements to our learning modules is possible with eye tracking technology.
Keywords/Search Tags:Cybersecurity algorithms, Learning modules, Teach students, Sensitive information
Related items