The impact of changing technology on international cybersecurity curricula
Document Type
Conference Proceeding
Publication Title
Human Aspects of Information Security, Privacy and Trust
Publisher
Springer Verlag
Place of Publication
Berlin, Heidelberg
School
School of Education
RAS ID
26526
Abstract
Cyber Security degree programs vary in scope; from those that are constructed around traditional computer science degrees with some additional security content, to those that are strongly focused on the need to develop a dedicated cyber security professional. The latter programs typically include a grounding in computer science concepts such as programming, operating systems and networks to specialised security content covering such disparate areas as digital forensics, information assurance, penetration testing and cryptography. The cyber security discipline as a whole faces new challenges as technology continues to evolve, and therefore significant changes are being faced by educators trying to incorporate the latest technological concepts into courses. This presents cybersecurity educators with a number of related challenges to ensure that changes to degree programs reflect not only the educational needs of students, but of the needs of industry and government. The evolving use of technology therefore presents both opportunities and problems, in how these changes are demonstrated in the curriculum. This paper highlights the accreditation, standards and guidelines (from three of the countries where the authors of this paper have sought accreditation) that shape the way educators are encouraged to develop and structure degree courses and considers these in lieu of factors relating to incorporating new technology in cybersecurity curriculum, particularly in the presentation of technical exercises to students.
DOI
10.1007/978-3-319-58460-7_36
Access Rights
free_to_read
Comments
Read, H., Sutherland, I., Xynos, K., Drange, T., & Sundt, E. (2017). The impact of changing technology on international cybersecurity curricula. In International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 518-528). Springer, Cham. Available here.