

Others use tools such as Second Life to create virtual classes and laboratories. Some institutions have the resources and expertise to set up physical laboratories for this purpose. This inclusion of hands-on activities can be achieved in various forms. Without doubt, cybersecurity education would be more effective, if we include hands-on activities to the relevant courses. In the past few years, researchers and educators have developed various approaches and tools to implement laboratory projects for cybersecurity courses. The draft ACM Computer Science Curricula 2013 recommends cybersecurity as a required body of knowledge for a typical computer science program. Ĭybersecurity education is an integral part of many undergraduate computer science curriculums. (PDF) The Human Interface Device Attack from the Perspective of the Attacker and the Forensic Analyst. The work examinesthe defense strategy against HID attack and prevention beforelosing data in buffers.Keywords-Android debug bridge, linux, human interfacedevice, logs, mobile forensics This work describes a way to effectively detect the HIDattack, whether attack was executed successful or failed,determines its time frame and compares the outputs of severaldevices from different manufacturers and points out theconnections and differences between them.


The Human Interface Device (HID) attack is apromising method to break the Android lock screen protection.An attacker can use a smartphone as an attack device.Therefore, this attack can be carried out unnoticed in somecases. Abstract-The main prerequisite to extract data from asmartphone or exploit the device is to bypass its lock screenprotection.
