Cybersecurity Training for Users of Remote Computing
Abstract: End users of remote computing systems are frequently not aware of basic ways in which they could enhance protection against cyber-threats and attacks. In this paper, we discuss specific techniques to help and train users to improve cybersecurity when using such systems. To explain the rationale behind these techniques, we go into some depth explaining possible threats in the context of using remote, shared computing resources. Although some of the details of these prescriptions and recommendations apply to specific use cases when connecting to remote servers, such as a supercomputer, cluster, or Linux workstation, the main concepts and ideas can be applied to a wider spectrum of cases.
- Elaine Barker. 2020. Recommendation for key management: Part 1 - General. National Institute of Standards and Technology, U.S. Department of Commerce. https://doi.org/10.6028/NIST.SP.800-57pt1r5
- Recommendation for Cryptographic Key Generation. (June 2020). https://doi.org/10.6028/NIST.SP.800-133r2
- bbc. 2020. Europe’s supercomputers hijacked by attackers for crypto mining. (2020). https://www.bbc.com/news/technology-52709660
- Mcafee labs threats report: August 2019. McAfee Labs (2019).
- Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. (September 2022). https://doi.org/doi.org/10.6028/NIST.IR.8413-upd1
- Y. et al. Guo. 2023. High-Performance Computing (HPC) Security: Architecture, Threat Analysis, and Security Posture. (February 2023). https://doi.org/doi.org/10.6028/NIST.SP.800-223.ipd
- ICLG. 2023. Cybersecurity Laws and Regulations 2023. (2023). https://iclg.com/practice-areas/cybersecurity-laws-and-regulations
- Martin Jartelius. 2020. The 2020 Data Breach Investigations Report – a CSO’s perspective. Network Security 2020, 7 (2020), 9–12. https://doi.org/10.1016/S1353-4858(20)30079-9
- U.S. Department of Defense. 2023. Cybersecurity Maturity Model Certification. (2023). https://dodcio.defense.gov/CMMC
- Jeff Petters. 2021. What is a Brute Force Attack? https://www.varonis.com/blog/brute-force-attack Accessed Feb. 15, 2022.
- Bridging the Educational Gap between Emerging and Established Scientific Computing Disciplines. The Journal of Computational Science Education 10, 1 (Jan 2019), 4–11. https://doi.org/10.22369/issn.2153-4136/10/1/1
- Deploying a Top-100 Supercomputer for Large Parallel Workloads: the Niagara Supercomputer. In PEARC 1́9: Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning). 1–8. https://doi.org/10.22369/issn.2153-4136/10/1/1
- Danielle Smalls and Greg Wilson. 2021. Ten quick tips for staying safe online. PLOS Computational Biology 17, 3 (03 2021), 1–6. https://doi.org/10.1371/journal.pcbi.1008563
- Internet Society. 2018. Cyber incident & breach trends report. (2018).
- Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-Strength, Minimum-Length, and Blocklist Requirements. Association for Computing Machinery, New York, NY, USA, 1407–1426. https://doi.org/10.1145/3372297.3417882
- Trends in Demand, Growth, and Breadth in Scientific Computing Training Delivered by a High-Performance Computing Center. The Journal of Computational Science Education 10, 1 (Jan 2019), 53–60. https://doi.org/10.22369/issn.2153-4136/10/1/9
- Verizon. 2021. Verizon 2021 Data Breach Investigations Report. (2021). https://www.verizon.com/business/resources/reports/dbir/2021/masters-guide/
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.