The Impact of Changing Technology on International Cybersecurity Curricula

  • Huw Read
  • Iain Sutherland
  • Konstantinos Xynos
  • Tom Drange
  • Ernst Sundt
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10292)

Abstract

Cyber Security degree programs vary in scope; from those that are constructed around traditional computer science degrees with some additional security content, to those that are strongly focused on the need to develop a dedicated cyber security professional. The latter programs typically include a grounding in computer science concepts such as programming, operating systems and networks to specialised security content covering such disparate areas as digital forensics, information assurance, penetration testing and cryptography. The cyber security discipline as a whole faces new challenges as technology continues to evolve, and therefore significant changes are being faced by educators trying to incorporate the latest technological concepts into courses. This presents cybersecurity educators with a number of related challenges to ensure that changes to degree programs reflect not only the educational needs of students, but of the needs of industry and government. The evolving use of technology therefore presents both opportunities and problems, in how these changes are demonstrated in the curriculum. This paper highlights the accreditation, standards and guidelines (from three of the countries where the authors of this paper have sought accreditation) that shape the way educators are encouraged to develop and structure degree courses and considers these in lieu of factors relating to incorporating new technology in cybersecurity curriculum, particularly in the presentation of technical exercises to students.

Keywords

Standards Education Curriculum 

References

  1. ACM: Cybersecurity Curricula 2017, Curriculum Guidelines for Undergraduate Degree Programs in Cybersecurity (2017). http://www.csec2017.org/csec2017-v-0-5
  2. Amazon: Smart Home (2017). https://www.amazon.com/smart-home/b?node=6563140011. Accessed 18 Apr 2017
  3. Chartered Society of Forensic Sciences: Component Standards (2016). http://www.csofs.org/Digital-Forensics. Accessed 10 Nov 2016
  4. Conklin, A.: The design of an information security practicum course. In: Proceedings of the AIS SIG-ED IAIM 2007 Conference (2007)Google Scholar
  5. Disney Food Blog: Disney Refillable Mugs (2016). http://www.disneyfoodblog.com/disney-refillable-mugs/. Accessed 12 Nov 2016
  6. Dopplick, R.: Experiential cybersecurity learning. ACM Inroads 6(2), 84 (2015). http://dx.doi.org/10.1145/2743024 CrossRefGoogle Scholar
  7. GCHQ: Scheme to Recognise Academic Centres of Excellence in Cyber Security Research (2011). https://www.epsrc.ac.uk/files/funding/calls/2011/scheme-to-recognise-academic-centres-of-excellence-in-cyber-security-research/. Accessed 15 Nov 2016
  8. GCHQ: Can you crack it (2011b). http://www.canyoucrackit.co.uk/. Accessed 15 Nov 2016
  9. GCHQ: Working with academic to increase the UK’s capability in cyber security (2014). http://www.nationalarchives.gov.uk/documents/information-management/cesg-aces-partnerships.pdf. Accessed 31 Jan 2017
  10. GCHQ: GCHQ certifies six more Masters’ degrees in Cyber Security (2016). https://www.gchq.gov.uk/news-article/gchq-certifies-six-more-masters-degrees-cyber-security. Accessed 15 Nov 2016
  11. GCHQ: New call to certify Cyber Security Degrees (2016b). https://www.gchq.gov.uk/news-article/new-call-certify-cyber-security-degrees. Accessed 31 Jan 2017
  12. GCHQ: Certification of Bachelor’s and Master’s Degrees in Cyber Security… is your degree in scope? (2016c). https://www.ncsc.gov.uk/content/files/protected_files/article_files/degrees-at-a-glance.pdf
  13. Glassify: The Smart Glass (2016). http://www.glassify.me/. Accessed 12 Nov 2016
  14. Hexoskin Wearable Body Metrics (2016). http://www.hexoskin.com/collections/all. Accessed 13 Nov 2016
  15. Kessler, G.C., Ramsay, J.: Paradigms for cybersecurity education in a homeland security program. J. Homel. Secur. Educ. 2, 35–44 (2013). http://www.journalhse.org/v2-kesslerramsay.html Google Scholar
  16. Keystone Academic Solutions (2017). https://www.bachelorstudies.com/BSc/IT/Cyber-Security/. Accessed 18 Apr 2017
  17. Malmedal, B., Røislien, H.E.: The Norwegian Cyber Security Culture, Norsk senter for informasjonssikring (Norsis) (2016). https://norsis.no/wp-content/uploads/2016/09/The-Norwegian-Cybersecurity-culture-web.pdf
  18. Morgan, S.: One Million Cybersecurity Job Openings in 2016, Forbes (2016). http://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/#209e17d77d27. Accessed 11 Nov 2016
  19. National Science Foundation: https://www.nsf.gov/statistics/seind14/index.cfm/chapter-2/c2s1.htm. Accessed 11 Nov 2016
  20. NCSC: GCHQ Degree Certification - Call for New Applications (2016). https://www.ncsc.gov.uk/articles/gchq-degree-certification-call-new-applicants. Accessed 31 Jan 2017
  21. NIETP: Current CAE Designated Institutions (2017a). https://www.iad.gov/nietp/reports/current_cae_designated_institutions. Accessed 11 Nov 2016
  22. NIETP: NSA/DHS National Centers of Academic Excellence for Cyber Defense (2017b). https://www.iad.gov/NIETP/documents/Requirements/CAE-CD_Focus_Areas.pdf. Accessed 11 Nov 2016
  23. NIST: DRAFT NICE Cybersecurity Workforce Framework (NCWF): National Initiative for Cybersecurity Education, SP 800-181 (2016). http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-181
  24. NSA: National Centers of Academic Excellence in Cyber Defense (2016). https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/. Accessed 10 Nov 2016
  25. NSA: 2016 NSA Codebreaker Challenge (2016b). https://codebreaker.ltsnet.net/home. Accessed 10 Nov 2016
  26. Rege, A.: Multidisciplinary experiential learning for holistic cybersecurity education, research and evaluation. In: Proceedings of the 2015 USENIX Summit on Gaming, Games and Gamification in Security Education, Washington DC, 11 August 2015 (2015)Google Scholar
  27. Rodgers, M., Siegfried, K.: The future of computer forensics: a needs analysis survey. Comput. Secur. 23(1), 12–16 (2004). http://www.sciencedirect.com/science/article/pii/S0167404804000100 CrossRefGoogle Scholar
  28. Sitnikova, E., Foo, E., Vaughn, R.B.: The power of hands-on exercises in SCADA cyber security education. In: Dodge, R.C., Futcher, L. (eds.) WISE 2009. IAICT, vol. 406, pp. 83–94. Springer, Heidelberg (2013). doi:10.1007/978-3-642-39377-8_9 CrossRefGoogle Scholar
  29. Stranden, R.: Sikkerhet – en profesjon? Næringslivets Sikkerhetsråd (NSR) (Norwegian Business and Industry Security Council (2010). https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/
  30. The Telegraph: GCHQ spy recruitment code solved (2011). http://www.telegraph.co.uk/news/uknews/defence/8928088/GCHQ-spy-recruitment-code-solved.html. Accessed 11 Nov 2016
  31. University of Abertay: Ethical Hacking Degree (2017). http://www.abertay.ac.uk/studying/undergraduate/bsc-ethical-hacking/
  32. Verisure: 2016. https://www.verisure.no/. Accessed 11 Nov 2016
  33. Willems, C., Meinel, C.: Online assessment for hands-on cybersecurity training in a virtual lab. In: Proceedings of the 3rd IEEE Global Engineering Education Conference (EDUCON 2012).
 IEEE Press, Marrakesh, Morocco (2012)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Huw Read
    • 1
    • 2
  • Iain Sutherland
    • 1
    • 4
  • Konstantinos Xynos
    • 5
  • Tom Drange
    • 1
    • 3
  • Ernst Sundt
    • 1
  1. 1.Noroff University CollegeKristiansandNorway
  2. 2.Norwich UniversityNorthfieldUSA
  3. 3.University of SunderlandSunderlandUK
  4. 4.Edith Cowen UniversityPerthAustralia
  5. 5.Darkmatter LLCDubaiUnited Arab Emirates

Personalised recommendations