Devising a cyber security management module through integrated course design

被引:0
|
作者
Allison, Jordan [1 ]
机构
[1] Univ Gloucestershire, Sch Comp & Engn, Cheltenham, England
关键词
Cyber security management; integrated course design; cyber security education; curriculum design; Cyber Security;
D O I
10.1080/0309877X.2023.2250729
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills and business acumen. However, cyber security management is a topic area where students can develop such skills. This paper presents the pedagogical and assessment approaches used for cyber security management education, and presents a case study of developing a 'Cyber Security Management' module of study through utilising Finks' Integrated Course Design. This paper presents the findings that active learning approaches are effective methods for teaching this subject area, which include the use of decision-making scenario tasks, group projects, and tasking students with conducting a management report for a real company, where they should conduct interviews with the organisation.
引用
收藏
页码:1389 / 1403
页数:15
相关论文
共 50 条
  • [31] Effective Measurement Design for Cyber Security
    Gol, Murat
    Abur, Ali
    [J]. 2014 POWER SYSTEMS COMPUTATION CONFERENCE (PSCC), 2014,
  • [32] Systems and Software Assurance - A Model Cyber Security Course
    Jovanovic, V.
    Harris, J. K.
    [J]. 2016 39TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2016, : 923 - 927
  • [33] Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education
    Frank, Maximilian
    Leitner, Maria
    Pahi, Timea
    [J]. 2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 38 - 46
  • [34] Cyber range design framework for cyber security education and training
    Katsantonis, M. N.
    Manikas, A.
    Mavridis, I.
    Gritzalis, D.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 1005 - 1027
  • [35] Cyber range design framework for cyber security education and training
    M. N. Katsantonis
    A. Manikas
    I. Mavridis
    D. Gritzalis
    [J]. International Journal of Information Security, 2023, 22 : 1005 - 1027
  • [36] An Integrated Simulation Module for Cyber-Physical Automation Systems
    Ferracuti, Francesco
    Freddi, Alessandro
    Monteriu, Andrea
    Prist, Mariorosario
    [J]. SENSORS, 2016, 16 (05):
  • [37] An Integrated Simulation Module for Wireless Cyber-Physical System
    Prist, Mariorosario
    Freddi, Alessandro
    Longhi, Sauro
    Monteriu, Andrea
    [J]. 2015 IEEE 15TH INTERNATIONAL CONFERENCE ON ENVIRONMENT AND ELECTRICAL ENGINEERING (IEEE EEEIC 2015), 2015, : 1397 - 1402
  • [38] Mitigating Security Threats through the use of Security Tactics to Design Secure Cyber-Physical Systems (CPS)
    Orellana, Cristian
    Villegas, Monica M.
    Astudillo, Hernan
    [J]. 13TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2019), VOL 2, 2019, : 109 - 115
  • [39] INFORMATION SECURITY MANAGEMENT SYSTEM AND CYBER SECURITY IN THE CZECH REPUBLIC
    Drastich, Martin
    [J]. ZNALOSTI PRO TRZNI PRAXI 2015: ZENY - PODNIKATELKY V MINULOSTI A SOUCASNOSTI, 2015, : 85 - 90
  • [40] Integrated framework for information security investment and cyber insurance
    Wang, Shaun S.
    [J]. PACIFIC-BASIN FINANCE JOURNAL, 2019, 57