Skip to main content

Implementation of Active Cybersecurity Education in Ukrainian Higher School

  • Conference paper
  • First Online:
Information Technology for Education, Science, and Technics (ITEST 2022)

Abstract

Cybersecurity as a part of information technology requires constant professional development for teachers. Therefore it is indicative of the study of the implementation of active learning methods. The experience of higher technical educational institutions in the countries of the European Union (Germany, France, Sweden, etc.) shows that the introduction of active learning elements and Conceive-Design-Implement-Operate (CDIO) methods dramatically increases student engagement and improves their learning outcomes. The article considers the stages of formation of the process of training specialists in cybersecurity. In addition, the experience of introducing active learning methods into the educational process is presented, and its results are analyzed. The technology of implementation of active learning and the results obtained have been presented concerning training professionals of the 2nd (Master’s) degree for the specialty 125 “Cybersecurity” in Borys Grinchenko Kyiv University. These actions are confirmed by the study results of the average score of graduate students, which has increased by three points from 76.3 to 79.3.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cohen, F.: Computer viruses theory and experiments. Comput. Secur. 6(1), 22–35 (1987)

    Article  MathSciNet  Google Scholar 

  2. Alizar, A.: HP Information Security Report 2013. http://xakep.ru/2014/02/04/61990/

  3. McAfee LLC. McAfee Labs Threats Report. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-dec-2018.pdf

  4. International Telecommunication Union: Security in Telecommunications and Information Technology. https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-SEC-2015-PDF-E.pdf

  5. CyberEdge Group LLC: Report Defense Cyberthreat (2018). https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf

  6. World Economic Forum: The Global Risks Report. http://www3.weforum.org/docs/WEF_GRR18_Report.pdf

  7. R-Vision: Information Security Projections for 2018. https://rvision.pro/en/blog-posts/prognozy-po-informatsionnoj-bezopasnosti-na-2018-god/

  8. Euronews: Davos 2018: A Joint Response to Global Threats. https://en.euronews.com/2018/01/24/davos-2018-what-are-humanitarian-organisations-bringing-to-the-world-economic

  9. Zakhmatov, V.D.: Multifaceted Protection Technique (1991)

    Google Scholar 

  10. Manachinsky, A.Y.: Iraq: At the Epicenter of the Wars (2015)

    Google Scholar 

  11. Kessler, B.: The vulnerability of nuclear facilities to cyber attack. Strateg. Insights 10, 15–25 (2011)

    Google Scholar 

  12. North Atlantic Alliance: NATO-Ukraine Expert Consultations on Cyber Security. https://www.nato.int/cps/en/natohq/news_61562.htm?selectedLocale=en

  13. Ukrainian News: The Undeclared War in Cyberspace (2010). http://economica.com.ua/tele/article/625008.html

  14. BiZUA: The 20 Biggest Cybercrimes of the 21st Century (2015). https://bizua.org/351/20-najguchnishix-kiberzlochiniv-xxi-stolittya

  15. MITRE: Software: NetTraveler—ATT & CK for Enterprise. https://attack.mitre.org/software/S0033

  16. GReAT: Operation Red October as an Extensive Network of Cyber Espionage against Diplomatic and Governmental Structures. https://securelist.com/the-red-october-campaign-an-advanced-cyber-espionage-network-targeting-diplomatic-and-government-agencies/3632/

  17. Media-DC: The largest Cyber-Attacks against Ukraine Since 2014. Infographics. https://nv.ua/eng/ukraine/events/najbilshi-kiberataki-proti-ukrajini-z-2014-roku-infografika-1438924.html

  18. Unian: Mass Attack of Petya A Virus: Suspected Hackers Made First Statement. https://www.unian.net/science/2013686-massovaya-ataka-petyaa-yakobyi-stoyaschie-za-virusom-hakeryi-sdelali-pervoe-zayavlenie.html

  19. Today: WannaCry Attack: How to Protect Your Computer from a Dangerous Virus. https://www.segodnya.ua/lifestyle/science/ataka-wannacry-kak-zashchitit-kompyuter-ot-opasnogo-virusa-1020872.html

  20. Burov, O., et al.: Cybersecurity in educational networks. In: Ahram, T., Karwowski, W., Vergnano, A., Leali, F., Taiar, R. (eds.) IHSI 2020. AISC, vol. 1131, pp. 359–364. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-39512-4_56

    Chapter  Google Scholar 

  21. Poroshenko, P.: The Law of Ukraine on Basic Principles of Cyber Security of Ukraine. https://zakon.rada.gov.ua/laws/show/2163-19/print

  22. Danik, Y.G., Suprunov, Y.M.: Some approaches to formation of the training system for the cyber security system of Ukraine. Collect. Sci. Pap. Sci. Inf. Inst. Inf. Sci. Ukr. 5, 5–22 (2011)

    Google Scholar 

  23. Minochkin, A.I.: Information struggle: Current state and expertise of expert training. Def. Bull. 2, 12–14 (2011)

    Google Scholar 

  24. Sysoev, V.: Analysis of the level of education and training of IT and information security professionals in Ukraine, CISM (2011)

    Google Scholar 

  25. Buriachok, V.L., Bogush, V.M.: Recommendations for the development and implementation of a cyber security training profile in Ukraine. Ukr. Sci. J. Inf. Secur. 20, 126–131 (2014)

    Google Scholar 

  26. Hu, Z., Buriachok, V., Sokolov, V.: Implementation of social engineering attack at institution of higher education. In: International Workshop on Cyber Hygiene, pp. 155–164 (2020)

    Google Scholar 

  27. Buriachok, V., et al.: Model of training specialists in the field of information and cyber security in higher education institutions of Ukraine. Inf. Technol. Teach. Aids. 5, 277–291 (2018)

    Google Scholar 

  28. Costigan, S.S., Hennessy, M.A.: Cybersecurity: A Generic Reference Curriculum. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2016_10/20161025_1610-cybersecurity-curriculum.pdf

  29. National Research Council, National Science Education Standards. The National Academies Press, Washington (1996)

    Google Scholar 

  30. Dori, Y.J., et al.: Technology for active learning. Mater. Today 6(12), 44–49 (2003)

    Article  Google Scholar 

  31. Martin, J., Wackerlin, D.: CDIO as a cross-discipline academic model. In: Proceedings of the 12th International CDIO Conference, pp. 986–1003 (2016)

    Google Scholar 

  32. Buriachok, V.L., Sokolov, V.Y.: CDIO Initiative. Kyiv (2019)

    Google Scholar 

  33. Sokolov, V., Taj Dini, M., Buriachok, V.: Wireless and Mobile Security: Laboratory Workshop. Kyiv (2017)

    Google Scholar 

  34. Buriachok, V., Sokolov, V.: Implementation of active learning in the master’s program on cybersecurity. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds.) ICCSEEA 2019. AISC, vol. 938, pp. 610–624. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-16621-2_57

    Chapter  Google Scholar 

  35. Sokolov, V.: Implementation of Global Active Learning Techniques in the Master’s Degree Program in Cyber Security 125. http://kubg.edu.ua/prouniversitet/news/podiji/5698-vprovadzhennia-innovatsiinykh-tekhnolohii-kiberbezpeky-v-universyteti.html

  36. Buriachok, V.L.: Introduction to Active Learning Technologies in Borys Grinchenko Kyiv University Educational Process. http://www.yuanshihui.cn/detail/8e6847e3bb1000fa66141bb2

  37. Babich, O.M.: Student Action: A Student Leadership Competence Development Program. http://www.britishcouncil.org.ua/programmes/education/student-action-2018

  38. Buriachok, V.L.: Introduction of Practice Oriented Learning Technology in Specialty 125 “Cybersecurity” into the University’s Educational Process. http://ij.kubg.edu.ua/pro-instytut/news/podiji/943-forum-ynformatsyjna-bezpeka.html

  39. Hu, Z., Buriachok, V., Bogachuk, I., Sokolov, V., Ageyev, D.: Development and operation analysis of spectrum monitoring subsystem 2.4–2.5 GHz range. In: Radivilova, T., Ageyev, D., Kryvinska, N. (eds.) Data-Centric Business and Applications. LNDECT, vol. 48, pp. 675–709. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-43070-2_29

    Chapter  Google Scholar 

  40. Carlsson, A., et al.: Remote security labs in the cloud ReSeLa. In: IEEE Global Engineering Education Conference, pp. 1–8 (2015). https://doi.org/10.1109/educon.2015.7095971

Download references

Acknowledgments

The authors are grateful to EU ENGENSEC Project Manager Anders Carlson from the Chair of Computer Science and Engineering (Department of Technology of Institute of Technology in Blekinge, Karlskrona, Sweden) for the assistance in developing the Master’s Program in Cyber Security [40].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Volodymyr Sokolov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Buriachok, V., Korshun, N., Zhyltsov, O., Sokolov, V., Skladannyi, P. (2023). Implementation of Active Cybersecurity Education in Ukrainian Higher School. In: Faure, E., Danchenko, O., Bondarenko, M., Tryus, Y., Bazilo, C., Zaspa, G. (eds) Information Technology for Education, Science, and Technics. ITEST 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-031-35467-0_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-35467-0_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-35466-3

  • Online ISBN: 978-3-031-35467-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics