Papers
Topics
Authors
Recent
Search
2000 character limit reached

Cybersecurity Training for Users of Remote Computing

Published 12 Jun 2023 in cs.CR, cs.CY, and cs.DC | (2306.07192v1)

Abstract: End users of remote computing systems are frequently not aware of basic ways in which they could enhance protection against cyber-threats and attacks. In this paper, we discuss specific techniques to help and train users to improve cybersecurity when using such systems. To explain the rationale behind these techniques, we go into some depth explaining possible threats in the context of using remote, shared computing resources. Although some of the details of these prescriptions and recommendations apply to specific use cases when connecting to remote servers, such as a supercomputer, cluster, or Linux workstation, the main concepts and ideas can be applied to a wider spectrum of cases.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (17)
  1. Elaine Barker. 2020. Recommendation for key management: Part 1 - General. National Institute of Standards and Technology, U.S. Department of Commerce. https://doi.org/10.6028/NIST.SP.800-57pt1r5
  2. Recommendation for Cryptographic Key Generation. (June 2020). https://doi.org/10.6028/NIST.SP.800-133r2
  3. bbc. 2020. Europe’s supercomputers hijacked by attackers for crypto mining. (2020). https://www.bbc.com/news/technology-52709660
  4. Mcafee labs threats report: August 2019. McAfee Labs (2019).
  5. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. (September 2022). https://doi.org/doi.org/10.6028/NIST.IR.8413-upd1
  6. Y. et al. Guo. 2023. High-Performance Computing (HPC) Security: Architecture, Threat Analysis, and Security Posture. (February 2023). https://doi.org/doi.org/10.6028/NIST.SP.800-223.ipd
  7. ICLG. 2023. Cybersecurity Laws and Regulations 2023. (2023). https://iclg.com/practice-areas/cybersecurity-laws-and-regulations
  8. Martin Jartelius. 2020. The 2020 Data Breach Investigations Report – a CSO’s perspective. Network Security 2020, 7 (2020), 9–12. https://doi.org/10.1016/S1353-4858(20)30079-9
  9. U.S. Department of Defense. 2023. Cybersecurity Maturity Model Certification. (2023). https://dodcio.defense.gov/CMMC
  10. Jeff Petters. 2021. What is a Brute Force Attack? https://www.varonis.com/blog/brute-force-attack Accessed Feb. 15, 2022.
  11. Bridging the Educational Gap between Emerging and Established Scientific Computing Disciplines. The Journal of Computational Science Education 10, 1 (Jan 2019), 4–11. https://doi.org/10.22369/issn.2153-4136/10/1/1
  12. Deploying a Top-100 Supercomputer for Large Parallel Workloads: the Niagara Supercomputer. In PEARC 1́9: Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning). 1–8. https://doi.org/10.22369/issn.2153-4136/10/1/1
  13. Danielle Smalls and Greg Wilson. 2021. Ten quick tips for staying safe online. PLOS Computational Biology 17, 3 (03 2021), 1–6. https://doi.org/10.1371/journal.pcbi.1008563
  14. Internet Society. 2018. Cyber incident & breach trends report. (2018).
  15. Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-Strength, Minimum-Length, and Blocklist Requirements. Association for Computing Machinery, New York, NY, USA, 1407–1426. https://doi.org/10.1145/3372297.3417882
  16. Trends in Demand, Growth, and Breadth in Scientific Computing Training Delivered by a High-Performance Computing Center. The Journal of Computational Science Education 10, 1 (Jan 2019), 53–60. https://doi.org/10.22369/issn.2153-4136/10/1/9
  17. Verizon. 2021. Verizon 2021 Data Breach Investigations Report. (2021). https://www.verizon.com/business/resources/reports/dbir/2021/masters-guide/

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (2)

Collections

Sign up for free to add this paper to one or more collections.