{"title":"Endpoint cybersecurity: When smart devices turn stupid","authors":"Thomas Acton, P. Datta","doi":"10.1177/20438869241242142","DOIUrl":null,"url":null,"abstract":"With the proliferation of ever-cheaper IoTs (or smart devices) from smart doorbells to WiFi security cameras and baby monitors and hybrid work arrangements involving relaxed BYOD (Bring Your Own Device) policies, cybersecurity education must build awareness on the threats that endpoints pose. While securing corporate networks from cyberattack gains much attention, there is a dearth of educational material that exemplifies the processes by which endpoints are used in hacks, and how to build defenses against endpoint vulnerabilities. This teaching case provides a Defense in Depth (DiD) learning framework on how to defend industrial cyber-physical systems, digital infrastructure and assets. The case illustrates the applicability of a DiD framework independent of attack vector yet particular to endpoint vulnerabilities and shows how lessons from the past can help defend and mitigate future cyberattacks.","PeriodicalId":37921,"journal":{"name":"Journal of Information Technology Teaching Cases","volume":"8 3","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Technology Teaching Cases","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/20438869241242142","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
With the proliferation of ever-cheaper IoTs (or smart devices) from smart doorbells to WiFi security cameras and baby monitors and hybrid work arrangements involving relaxed BYOD (Bring Your Own Device) policies, cybersecurity education must build awareness on the threats that endpoints pose. While securing corporate networks from cyberattack gains much attention, there is a dearth of educational material that exemplifies the processes by which endpoints are used in hacks, and how to build defenses against endpoint vulnerabilities. This teaching case provides a Defense in Depth (DiD) learning framework on how to defend industrial cyber-physical systems, digital infrastructure and assets. The case illustrates the applicability of a DiD framework independent of attack vector yet particular to endpoint vulnerabilities and shows how lessons from the past can help defend and mitigate future cyberattacks.
期刊介绍:
The Journal of Information Technology Teaching Cases (JITTC) provides contemporary practical case materials for teaching topics in business and government about uses and effectiveness of technology, the organisation and management of information systems and the impacts and consequences of information technology. JITTC is designed to assist academics, scholars, and teachers in universities and other institutions of executive education, as well as instructors of organizational training courses. Case topics include but are not restricted to: alignment with the organization, innovative uses of technology, emerging technologies, the management of IT, including strategy, business models, change, infrastructure, organization, human resources, sourcing, system development and implementation, communications, technology developments, technology impacts and outcomes, technology futures, national policies and standards.