Preface |
|
xi | |
Acknowledgements |
|
xiii | |
Author |
|
xv | |
|
|
1 | (6) |
|
1.1 Extent of Cyberattacks |
|
|
1 | (1) |
|
1.2 Review of the Literature |
|
|
2 | (3) |
|
1.2.1 Cybersecurity Awareness of College Students |
|
|
2 | (1) |
|
1.2.2 Privacy and Self-Disclosure |
|
|
3 | (1) |
|
1.2.3 Cybersecurity Awareness among College Students and Faculty |
|
|
4 | (1) |
|
|
5 | (2) |
|
2 Students Cybersecurity Awareness |
|
|
7 | (10) |
|
2.1 Online Cybersecurity Survey |
|
|
7 | (1) |
|
|
8 | (7) |
|
2.2.1 Knowledge of Cybersecurity |
|
|
8 | (1) |
|
|
9 | (2) |
|
|
11 | (1) |
|
|
12 | (1) |
|
2.2.5 Trust of University Data Security |
|
|
12 | (3) |
|
|
15 | (2) |
|
3 Students' Secured and Unsecured Behaviours: Follow-Up Studies |
|
|
17 | (36) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (3) |
|
3.3.1 Results and Explanation |
|
|
19 | (2) |
|
3.4 Two-Factor Authentication |
|
|
21 | (2) |
|
3.4.1 Results and Explanation |
|
|
22 | (1) |
|
|
23 | (1) |
|
3.5.1 Results and Explanation |
|
|
24 | (1) |
|
|
24 | (2) |
|
3.6.1 Results and Explanation |
|
|
25 | (1) |
|
|
26 | (2) |
|
3.7.1 Results and Explanation |
|
|
27 | (1) |
|
3.8 Mobile Phone Protection |
|
|
28 | (1) |
|
3.8.1 Results and Explanation |
|
|
28 | (1) |
|
|
29 | (3) |
|
|
29 | (1) |
|
3.9.2 Cookies and Privacy |
|
|
30 | (1) |
|
3.9.3 Cookies, Privacy, and Regulations |
|
|
31 | (1) |
|
|
32 | (1) |
|
3.9.5 Results and Explanation |
|
|
32 | (1) |
|
|
32 | (2) |
|
|
34 | (4) |
|
3.11.1 Students' Behaviour |
|
|
37 | (1) |
|
3.11.2 Security Practices |
|
|
37 | (1) |
|
|
37 | (1) |
|
3.12 Social Networking---Results and Explanation |
|
|
38 | (13) |
|
3.12.1 Students' Behaviour |
|
|
38 | (2) |
|
|
40 | (4) |
|
3.12.3 Security Practices |
|
|
44 | (7) |
|
|
51 | (2) |
|
4 Faculty Cybersecurity Awareness |
|
|
53 | (6) |
|
|
53 | (1) |
|
4.2 Knowledge of Security |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
4.6 Trust of University Data Security |
|
|
56 | (1) |
|
|
56 | (3) |
|
5 How to Improve Awareness |
|
|
59 | (10) |
|
|
59 | (1) |
|
5.2 Training and Education |
|
|
60 | (2) |
|
5.2.1 Formal Educational Programmes |
|
|
60 | (1) |
|
5.2.2 Training Programme for IT Professionals in the Industry |
|
|
61 | (1) |
|
|
61 | (1) |
|
5.2.3.1 Security Education, Training, and Awareness programmes |
|
|
61 | (1) |
|
5.2.3.2 Cybersecurity countermeasures awareness |
|
|
61 | (1) |
|
5.2.3.3 Cybersecurity skill |
|
|
62 | (1) |
|
5.3 Security Training Content |
|
|
62 | (1) |
|
|
62 | (1) |
|
5.5 Training and Awareness Programme Effectiveness |
|
|
63 | (1) |
|
5.6 End Users' Training and Awareness |
|
|
63 | (1) |
|
5.7 A New Approach to Awareness Programmes: Issues and Challenges |
|
|
64 | (3) |
|
5.7.1 Cost of Security Awareness Training Programmes |
|
|
64 | (1) |
|
5.7.2 Changing People's Behaviour |
|
|
64 | (1) |
|
5.7.3 Cybersecurity 101: A Solution |
|
|
65 | (1) |
|
5.7.4 Cybersecurity Games: Another Solution |
|
|
66 | (1) |
|
5.7.5 Cybersecurity Culture |
|
|
66 | (1) |
|
|
67 | (2) |
|
|
69 | (10) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
6.6 Usernames and Passwords |
|
|
71 | (1) |
|
6.7 Two-Factor Authentication |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
6.15 Protection against Ransomware |
|
|
75 | (1) |
|
6.16 Deleting Data from Social Networking Sites |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
6.19 Updating Apps or Operating Systems and Deleting Unused Apps |
|
|
76 | (3) |
References |
|
79 | (6) |
Glossary |
|
85 | |