Advertisement

Toward a Holistic Approach of Cybersecurity Capacity Building Through an Innovative Transversal Sandwich Training

  • Jessica El MelhemEmail author
  • Abdelaziz Bouras
  • Yacine Ouzrout
Chapter

Abstract

This paper aims at proposing an original curriculum of sandwich training in cybersecurity in France responding to the context of the European shuffle on cybersecurity enforcement. Indeed, May of this year sets the milestone of the cybersecurity process in Europe and especially in France as it is the deadline for the transposition of the Network and Information Security (NIS) European Directive on cybersecurity. This European Directive is in line with the global crucial transition operating at all scales in the world. As a global concern, the cybersecurity capacity building of the next generations is at stakes. In order to formulate a viable and efficient training that meets real needs and challenges, we first analyze the current strategic and policy frameworks at many scales concerning the cybersecurity enforcement and awareness development. Once the best practices are outlined, we would then analyze the current trainings provided in France in that field. Noting the lack of transversality of most of the existing trainings, we formulate an innovative proposition of training including a holistic approach by including a larger range of skills thus better in line to the international overhaul and contributing to the effective capacity building in cybersecurity.

Keywords

Cybersecurity  Capacity building  Soft skills  Transversal curriculum 

Notes

Acknowledgment

This publication was made possible by NPRP grant # NPRP 7-1883-5-289 from the Qatar National Research Fund (a member of Qatar Foundation) toward which the authors would like to express their gratitude. The statements made herein are solely the responsibility of the authors.

References

  1. Ali, B., Lu, M. X., & Diane, M. (2015). Cybersecurity curriculum development: Introducing specialties in a graduate program. Information Systems Education Journal, 13(3), 99–110.Google Scholar
  2. Australian Government. (2016). Australia’s cyber security strategy.Google Scholar
  3. Brave, S., & Nass, C. (2002). Emotion in human–computer interaction . no. Cmc (pp. 53–68).Google Scholar
  4. Cabinet, E. Y. (2017). Les formations et les compétences en France sur la cybersecurité.Google Scholar
  5. Cyber Security Agency of Singapore. (2016). Simgapore’s Cyber Security Strategy, no. 12, p. 27.Google Scholar
  6. European Parliament and Council of the European Union. (2016, July). Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union, vol. 2014, pp. 1–30.Google Scholar
  7. European Parliament; Council of the European Union. (2013). Proposal for a Directive of the european Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union, Brussels.Google Scholar
  8. French Network and Information Security Agency. (s.d.). “Glossaire.” [Online]. Available: https://www.ssi.gouv.fr/entreprise/glossaire/c/. Accessed 20 Aug 2003.
  9. House of representative of the U.S. Congress. (2017). Cybersecurity and Infrastructure Security Agency Act of 2017.Google Scholar
  10. Institut des Hautes Etudes de la Securité et de la Justice. (2015). “La Loi de Programmation Militaire appliquée à la Cybersécurité.Google Scholar
  11. International Telecomunication Union. (2014). Resolution 130 (Rev . BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies, Busan.Google Scholar
  12. International Telecomunication Union, Global cybersecurity index & cyberwellness profiles-Global Cybersecurity Index (GCI) 2017. 2015.Google Scholar
  13. Journal Official. (2018). LOI n° 2018–133 du 26 février 2018 portant diverses dispositions d’adaptation au droit de l’Union européenne dans le domaine de la sécurité (1).Google Scholar
  14. Minister of Information and Communications Technology. (2014). Qatar National Cyber Security Strategy.Google Scholar
  15. National Information Systems Security Agency of the Secretary General for Defence and National Security. (2018). Formations labellisées SecNumedu, [Online]. Available: https://www.ssi.gouv.fr/particulier/formations/secnumedu/formations-labellisees-secnumedu/.
  16. Patrick, H., & Fields, Z. (2017). A need for cyber security creativity (pp. 42–61). Pennsylvania, USA: IGI Global.Google Scholar
  17. Republic of Mauritius. (2014). National cyber security strategy 2014–2019: For resilent and secure Mauritius.Google Scholar
  18. The White House and Office of the Press secretary. (2016). Facts sheets: Cybersecurity national action plan. [Online]. Available: https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan.
  19. Willemant, R., & Foulgoc, S. (2016). Aspects Juridiques de la Cyber-sécurité. Action Canada Fr., 25, 18–19.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Jessica El Melhem
    • 1
    • 2
    Email author
  • Abdelaziz Bouras
    • 3
  • Yacine Ouzrout
    • 4
    • 5
  1. 1.Université Lumière Lyon 2LyonFrance
  2. 2.National Human Rights Committee of QatarDohaQatar
  3. 3.College of Engineering & Office of Research Support, Qatar UniversityDohaQatar
  4. 4.Université Lumière Lyon 2LyonFrance
  5. 5.University Institute of Technology Lumière Lyon 2, Transfer and Innovation Research PoleBronFrance

Personalised recommendations