Abstract
Many organisations have reported a dramatic shortage of cybersecurity skills to counteract cyberattacks. Academia and industry should be responsible for working together to investigate possibilities in closing this cybersecurity skills gap. The IT curricula of many South African universities are based on the outdated IT2008 curricular guidelines, which make no mention of cybersecurity. In order to address this increasing cybersecurity skills gap, universities offering computer-related qualifications need to adapt their curricula accordingly. This paper proposes a framework for integrating cybersecurity into IT undergraduate curricula in South Africa. As the cybersecurity needs of industry continue to evolve, the proposed framework will provide a structure that aligns IT curricula to the cybersecurity workforce needs by considering the NIST NICE framework, CSEC2017, and IT2017. Furthermore, the proposed framework discussed in this paper will serve as an academic guide for communicating cybersecurity content to address specific industry work roles. The implementation of this IT Cybersecurity Curricular Framework aims to impact the development of the cybersecurity workforce positively and reduce the cybersecurity skills gap between academia and industry.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Burley, D., Bishop, M., Buck, S., Ekstrom, J., Futcher, L.: ACM/IEEE 2017 Cybersecurity Curricula 2017. Technical report, December 2017. https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf
Cobb, S.: Sizing the cyber security skills gap: a white paper, July 2016. https://www.researchgate.net/publication/309456549
Crick, T., Davenport, J., Irons, A., Prickett, T.: A UK case study on cybersecurity education and accreditation. In: 2019 IEEE Frontiers in Education Conference (FIE), pp. 1–9 (2019)
Dodge, R.C.: Information assurance and security in the ACM/IEEE CS2013. In: Dodge, R.C., Futcher, L. (eds.) WISE 2009/2011/2013. IAICT, vol. 406, pp. 48–57. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39377-8_6
Harris, M.A., Pattern, K.: Using Bloom’s and Webb’s taxonomies to integrate emerging cybersecurity topics into a computic curriculum. J. Inf. Syst. Educ. 26(3), 219–234 (2015)
Herjavec Group: Cybersecurity Ventures 2017 Cybersecurity Jobs Report. Technical report (2017). https://www.herjavecgroup.com/wp-content/uploads/2017/06/HG-and-CV-The-Cybersecurity-Jobs-Report-2017.pdf
IBM: Security Cost of Data Breach (2019). https://www.ibm.com/downloads/cas/ZBZLY7KL?_ga=2.70882194.329793785.1580983939-1038055541.1580983939&_gac=1.17016139.1580983939.CjwKCAiAj-_xBRBjEiwAmRbqYksOMIXk29yaRNn0LXV2mnVW16Y42yBcqpiMOc2br1AHTPZWhrqXsBoCBlUQAvD_BwE
International Telecommunication Union: Overview of Cybersecurity (2019). https://www.itu.int/rec/T-REC-X.1205-200804-I
Kabanda, S., Tanner, M., Kent, C.: Exploring SME cybersecurity practices in developing countries. J. Organ. Comput. Electron. Commer. 28(3), 269–282 (2018). https://doi.org/10.1080/10919392.2018.1484598
Lunt, B., et al.: ACM/IEEE 2008 Information Technology 2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology. Technical report, Association for Computing Machinery (ACM), IEEE Computer Society (2008). https://doi.org/10.1145/2600000
Manson, D., Pike, R.: The case for depth in cybersecurity education. ACM Inroads 5(1), 47–52 (2014)
Mbelli, T.M., Dwolatzky, B.: Cyber security, a threat to cyber banking in South Africa: an approach to network and application security. In: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 1–6. IEEE (2016)
McGettrick, A.: Toward effective cybersecurity education. IEEE Secur. Priv. 11(6), 66–68 (2013)
Newhouse, W., Keith, S., Scribner, B., Witte, G.: NIST 2017 national initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST special publication 800-181 (2017). https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf
Oltsik, J., Alexander, C.: Enterprise Strategy Group. The Life and Times of Cybersecurity Professionals. Technical report, November 2019. https://www.esg-global.com/hubfs/pdf/ESG-ISSA-Research-Report-Life-of-Cybersecurity-Professionals-Apr-2019.pdf
Parker, A., Brown, I.: Skills requirements for cyber security professionals: a content analysis of job descriptions in South Africa. In: Venter, H., Loock, M., Coetzee, M., Eloff, M., Eloff, J. (eds.) ISSA 2018. CCIS, vol. 973, pp. 176–192. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11407-7_13
Rowe, D.C., Lunt, B.M., Ekstrom, J.J.: The role of cyber-security in information technology education. In: Proceedings of the 2011 Conference on Information Technology Education, pp. 113–122 (2011)
Sabin, M., Alrumaih, H., Impagliazzo, J., Lunt, B., Zhang, M.: ACM/IEEE. 2017 Information Technology Curricula 2017: Curriculum Guidelines for Baccalaureate Degree Programs in Information Technology. Technical report (2017). https://doi.org/10.1145/3173161
South African Government News Agency: Government’s vision to address cybersecurity skills shortage. sanews.gov.za (2019). https://www.sanews.gov.za/south-africa/governments-vision-address-cybersecurity-skills-shortage
Thomson, K., Futcher, L., Gomana, L.: Towards a framework for the integration of information security into undergraduate computing curricula. S. Afr. J. High. Educ. 33(3), 155–175 (2019)
Verizon: Data breach investigations report (2019). https://enterprise.verizon.com/resources/reports/dbir/2019/summary-of-findings/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Futcher, L., Thomson, KL., Mbuqe, A. (2021). A Cybersecurity Curricular Framework for IT Undergraduates in South Africa. In: Wells, G., Nxozi, M., Tait, B. (eds) ICT Education. SACLA 2020. Communications in Computer and Information Science, vol 1518. Springer, Cham. https://doi.org/10.1007/978-3-030-92858-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-92858-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-92857-5
Online ISBN: 978-3-030-92858-2
eBook Packages: Computer ScienceComputer Science (R0)