Cyber Security on a Budget: Tool Identification and Constraint Considerations
2020
- 119Usage
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Usage119
- Downloads61
- Abstract Views58
Article Description
this multifaceted project has investigated a number of security-related instruments in order to build a set of recommended tools for Information Technology practitioners constrained by minimal resources. Criteria for tool selection were identified, including operational complexity and reusability, to refine the possibilities found to a workable number of options. This list was largely informed by several available well-known platforms and suites; a secondary goal was to define a toolkit suitable for classroom instruction. Initial investigation led to the identification of the Raspberry Pi and Kali Linux. This combination provided a very large range of options and a portable/mobile capability. The main challenges to this project revolved around two goals: (1) locating tools that had little to no cost, and (2) identification of tools that are both easy to learn and suitable for those looking to create more secure network and host configurations with limited time, expertise, and financial resources.
Bibliographic Details
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know