Abstract
Cybersecurity as a part of information technology requires constant professional development for teachers. Therefore it is indicative of the study of the implementation of active learning methods. The experience of higher technical educational institutions in the countries of the European Union (Germany, France, Sweden, etc.) shows that the introduction of active learning elements and Conceive-Design-Implement-Operate (CDIO) methods dramatically increases student engagement and improves their learning outcomes. The article considers the stages of formation of the process of training specialists in cybersecurity. In addition, the experience of introducing active learning methods into the educational process is presented, and its results are analyzed. The technology of implementation of active learning and the results obtained have been presented concerning training professionals of the 2nd (Master’s) degree for the specialty 125 “Cybersecurity” in Borys Grinchenko Kyiv University. These actions are confirmed by the study results of the average score of graduate students, which has increased by three points from 76.3 to 79.3.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cohen, F.: Computer viruses theory and experiments. Comput. Secur. 6(1), 22–35 (1987)
Alizar, A.: HP Information Security Report 2013. http://xakep.ru/2014/02/04/61990/
McAfee LLC. McAfee Labs Threats Report. https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-dec-2018.pdf
International Telecommunication Union: Security in Telecommunications and Information Technology. https://www.itu.int/dms_pub/itu-t/opb/tut/T-TUT-SEC-2015-PDF-E.pdf
CyberEdge Group LLC: Report Defense Cyberthreat (2018). https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf
World Economic Forum: The Global Risks Report. http://www3.weforum.org/docs/WEF_GRR18_Report.pdf
R-Vision: Information Security Projections for 2018. https://rvision.pro/en/blog-posts/prognozy-po-informatsionnoj-bezopasnosti-na-2018-god/
Euronews: Davos 2018: A Joint Response to Global Threats. https://en.euronews.com/2018/01/24/davos-2018-what-are-humanitarian-organisations-bringing-to-the-world-economic
Zakhmatov, V.D.: Multifaceted Protection Technique (1991)
Manachinsky, A.Y.: Iraq: At the Epicenter of the Wars (2015)
Kessler, B.: The vulnerability of nuclear facilities to cyber attack. Strateg. Insights 10, 15–25 (2011)
North Atlantic Alliance: NATO-Ukraine Expert Consultations on Cyber Security. https://www.nato.int/cps/en/natohq/news_61562.htm?selectedLocale=en
Ukrainian News: The Undeclared War in Cyberspace (2010). http://economica.com.ua/tele/article/625008.html
BiZUA: The 20 Biggest Cybercrimes of the 21st Century (2015). https://bizua.org/351/20-najguchnishix-kiberzlochiniv-xxi-stolittya
MITRE: Software: NetTraveler—ATT & CK for Enterprise. https://attack.mitre.org/software/S0033
GReAT: Operation Red October as an Extensive Network of Cyber Espionage against Diplomatic and Governmental Structures. https://securelist.com/the-red-october-campaign-an-advanced-cyber-espionage-network-targeting-diplomatic-and-government-agencies/3632/
Media-DC: The largest Cyber-Attacks against Ukraine Since 2014. Infographics. https://nv.ua/eng/ukraine/events/najbilshi-kiberataki-proti-ukrajini-z-2014-roku-infografika-1438924.html
Unian: Mass Attack of Petya A Virus: Suspected Hackers Made First Statement. https://www.unian.net/science/2013686-massovaya-ataka-petyaa-yakobyi-stoyaschie-za-virusom-hakeryi-sdelali-pervoe-zayavlenie.html
Today: WannaCry Attack: How to Protect Your Computer from a Dangerous Virus. https://www.segodnya.ua/lifestyle/science/ataka-wannacry-kak-zashchitit-kompyuter-ot-opasnogo-virusa-1020872.html
Burov, O., et al.: Cybersecurity in educational networks. In: Ahram, T., Karwowski, W., Vergnano, A., Leali, F., Taiar, R. (eds.) IHSI 2020. AISC, vol. 1131, pp. 359–364. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-39512-4_56
Poroshenko, P.: The Law of Ukraine on Basic Principles of Cyber Security of Ukraine. https://zakon.rada.gov.ua/laws/show/2163-19/print
Danik, Y.G., Suprunov, Y.M.: Some approaches to formation of the training system for the cyber security system of Ukraine. Collect. Sci. Pap. Sci. Inf. Inst. Inf. Sci. Ukr. 5, 5–22 (2011)
Minochkin, A.I.: Information struggle: Current state and expertise of expert training. Def. Bull. 2, 12–14 (2011)
Sysoev, V.: Analysis of the level of education and training of IT and information security professionals in Ukraine, CISM (2011)
Buriachok, V.L., Bogush, V.M.: Recommendations for the development and implementation of a cyber security training profile in Ukraine. Ukr. Sci. J. Inf. Secur. 20, 126–131 (2014)
Hu, Z., Buriachok, V., Sokolov, V.: Implementation of social engineering attack at institution of higher education. In: International Workshop on Cyber Hygiene, pp. 155–164 (2020)
Buriachok, V., et al.: Model of training specialists in the field of information and cyber security in higher education institutions of Ukraine. Inf. Technol. Teach. Aids. 5, 277–291 (2018)
Costigan, S.S., Hennessy, M.A.: Cybersecurity: A Generic Reference Curriculum. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2016_10/20161025_1610-cybersecurity-curriculum.pdf
National Research Council, National Science Education Standards. The National Academies Press, Washington (1996)
Dori, Y.J., et al.: Technology for active learning. Mater. Today 6(12), 44–49 (2003)
Martin, J., Wackerlin, D.: CDIO as a cross-discipline academic model. In: Proceedings of the 12th International CDIO Conference, pp. 986–1003 (2016)
Buriachok, V.L., Sokolov, V.Y.: CDIO Initiative. Kyiv (2019)
Sokolov, V., Taj Dini, M., Buriachok, V.: Wireless and Mobile Security: Laboratory Workshop. Kyiv (2017)
Buriachok, V., Sokolov, V.: Implementation of active learning in the master’s program on cybersecurity. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds.) ICCSEEA 2019. AISC, vol. 938, pp. 610–624. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-16621-2_57
Sokolov, V.: Implementation of Global Active Learning Techniques in the Master’s Degree Program in Cyber Security 125. http://kubg.edu.ua/prouniversitet/news/podiji/5698-vprovadzhennia-innovatsiinykh-tekhnolohii-kiberbezpeky-v-universyteti.html
Buriachok, V.L.: Introduction to Active Learning Technologies in Borys Grinchenko Kyiv University Educational Process. http://www.yuanshihui.cn/detail/8e6847e3bb1000fa66141bb2
Babich, O.M.: Student Action: A Student Leadership Competence Development Program. http://www.britishcouncil.org.ua/programmes/education/student-action-2018
Buriachok, V.L.: Introduction of Practice Oriented Learning Technology in Specialty 125 “Cybersecurity” into the University’s Educational Process. http://ij.kubg.edu.ua/pro-instytut/news/podiji/943-forum-ynformatsyjna-bezpeka.html
Hu, Z., Buriachok, V., Bogachuk, I., Sokolov, V., Ageyev, D.: Development and operation analysis of spectrum monitoring subsystem 2.4–2.5 GHz range. In: Radivilova, T., Ageyev, D., Kryvinska, N. (eds.) Data-Centric Business and Applications. LNDECT, vol. 48, pp. 675–709. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-43070-2_29
Carlsson, A., et al.: Remote security labs in the cloud ReSeLa. In: IEEE Global Engineering Education Conference, pp. 1–8 (2015). https://doi.org/10.1109/educon.2015.7095971
Acknowledgments
The authors are grateful to EU ENGENSEC Project Manager Anders Carlson from the Chair of Computer Science and Engineering (Department of Technology of Institute of Technology in Blekinge, Karlskrona, Sweden) for the assistance in developing the Master’s Program in Cyber Security [40].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Buriachok, V., Korshun, N., Zhyltsov, O., Sokolov, V., Skladannyi, P. (2023). Implementation of Active Cybersecurity Education in Ukrainian Higher School. In: Faure, E., Danchenko, O., Bondarenko, M., Tryus, Y., Bazilo, C., Zaspa, G. (eds) Information Technology for Education, Science, and Technics. ITEST 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-031-35467-0_32
Download citation
DOI: https://doi.org/10.1007/978-3-031-35467-0_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35466-3
Online ISBN: 978-3-031-35467-0
eBook Packages: EngineeringEngineering (R0)