Skip to main content

Education for the Multifaith Community of Cybersecurity

  • 531 Accesses

Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT,volume 579)

Abstract

The demand for cybersecurity professionals is growing. Many cybersecurity academic and training programmes exist to prepare students and professionals for these jobs. The programmes cover many areas of cybersecurity with considerable overlap, but with different emphases. Some are highly technical and cover little non-technical; others do the opposite. Cybersecurity jobs typically require some technical knowledge, an ability to place security problems in a larger context, and an ability to communicate this information effectively and convincingly. The problem with treating technical and non-technical subjects as silos rather than recognizing the two are tightly related and need to be taught together. This paper shows how seven common cybersecurity frameworks and ten masters’ courses from the UK and US cover both technical and non-technical content. It examines the balance of technical courses, non-technical courses, and courses that mix both technical and non-technical material. It argues that these topics cannot be siloed, and their balance is critical to meeting the goals of the frameworks and programmes.

Keywords

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
EUR   29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR   42.79
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR   52.74
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
EUR   52.74
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Berghel, H.: Equifax and the latest round of identity theft roulette. IEEE Comput. 50(12), 72–76 (2017). https://doi.org/10.1109/MC.2017.4451227

    Article  Google Scholar 

  2. Oltsik, J.: The life and times of cybersecurity professionals 2018. Research report. Enterprise strategy group and information systems security associate, April 2019 (2019). https://www.esg-global.com/hubfs/pdf/ESG-ISSA-Research-Report-Life-of-Cybersecurity-Professionals-Apr-2019.pdf

  3. (ISC)2. Strategies for building and growing strong cybersecurity teams: (ISC)2 cybersecurity workforce study (2019). https://www.isc2.org/-/media/ISC2/Research/2019-Cybersecurity-Workforce-Study/ISC2-Cybersecurity-Workforce-Study-2019.ashx

  4. Furnell, S., Bishop, M.: Addressing cybersecurity skills: the spectrum not the silo. Comput. Fraud Secur. 2020, 6–11 (2020)

    Google Scholar 

  5. (ISC)2. Cybersecurity professionals focus on developing new skills as workforce gap widens: (ISC)2 cybersecurity workforce study (2018). https://www.isc2.org/-/media/ISC2/Research/2018-ISC2-Cybersecurity-Workforce-Study.ashx

  6. Infosec. Top 10 skills security professionals need to have in 2018, 17 August 2018 (2018). https://resources.infosecinstitute.com/top-10-skills-security-professionals-need-to-have-in-2018/#gref

  7. ISACA (2019). State of cybersecurity 2019 - part 1: current trends in workforce development. https://cybersecurity.isaca.org/state-of-cybersecurity

  8. Symantec. High alert: tackling cyber security overload in 2019. Symantec corporation (2019). https://resource.elq.symantec.com/LP=7421

  9. Dawson, J., Thomson, R.: The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Front. Psychol. 9, 744 (2018). https://www.frontiersin.org/articles/10.3389/fpsyg.2018.00744/full

  10. CSEC2017 joint task force. Cybersecurity curricula 2017–curriculum guidelines for post-secondary degree programs in cybersecurity. Version 1.0 Report 31 December 2017. Association for Computing Machinery (ACM), IEEE Computer Society (IEEE-CS), Association for Information Systems Special Interest Group on Information Security and Privacy (AIS SIGSEC) and International Federation for Information Processing Technical Committee on Information Security Education (IFIP WG 11.8) (2017). https://cybered.hosting.acm.org/wp-content/uploads/2018/02/newcover_csec2017.pdf

  11. CIISec. CIISec skills framework, version 2.4, chartered institute of information security, November 2019 (2019). https://www.ciisec.org/CIISEC/Resources/Capability_Methodology/Skills_Framework/CIISEC/Resources/Skills_Framework.aspx

  12. Rashid, A., Chivers, H., Danezis, G., Lupu, E., Martin, A.: The cyber security body of knowledge. Version 1.0, 31 October 2019 (2019). https://www.cybok.org/media/downloads/cybok_version_1.0.pdf

  13. (ISC)2. The (ISC)2 CBK (2019). https://www.isc2.org/Certifications/CBK. Accessed 1 Apr 2020

  14. ISO/IEC. Information technology—Security techniques—Code of practice for information security controls. International Standard ISO/IEC 27002. Second edition 2013-10-01. International Organization for Standardization and International Electrotechnical Commission (2013)

    Google Scholar 

  15. Newhouse, B., Keith, S., Scriber, B., Witte, G.: National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Special Publication 800–181, August 2017 (2017). https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf

  16. NSA. CAE-CD 2020 knowledge units. CAE requirements and resources (2019). http://www.iad.gov/NIETP/documents/Requirements/CAE-CD_2020_Knowledge_Units.pdf. Accessed 1 Apr 2020

  17. Hallett, J., Larson, R., Rashid, A.: Mirror, mirror, on the wall: what are we teaching them all? Characterising the focus of cybersecurity curricular frameworks. In: 2018 USENIX Workshop on Advances in Security Education (2018)

    Google Scholar 

  18. Furnell, S., Michael, K., Piper, F., Chris, E., Catherine, H., Ensor, C.: A national certification programme for academic degrees in cyber security. In: Drevin, L., Theocharidou, M. (eds.) WISE 2018. IAICT, vol. 531, pp. 133–145. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99734-6_11

    Chapter  Google Scholar 

  19. The CAE in cybersecurity community (2020). CAE Institution Map. https://www.caecommunity.org/content/cae-institution-map. Accessed 1 Apr 2020

  20. Indiana University Center for Postsecondary Research. (2018). The Carnegie classification of institutions of higher education. https://carnegieclassifications.iu.edu/index.php. Accessed 1 Apr 2020

Download references

Acknowledgements

Matt Bishop gratefully acknowledges the support of grants DGE-1303211 and DGE-1934279 from the National Science Foundation to the University of California at Davis. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Steven Furnell .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Furnell, S., Bishop, M. (2020). Education for the Multifaith Community of Cybersecurity. In: Drevin, L., Von Solms, S., Theocharidou, M. (eds) Information Security Education. Information Security in Action. WISE 2020. IFIP Advances in Information and Communication Technology, vol 579. Springer, Cham. https://doi.org/10.1007/978-3-030-59291-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59291-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59290-5

  • Online ISBN: 978-3-030-59291-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics