Cybersecurity activities for education and curriculum design: A survey

被引:1
作者
Ismail, Muhusina [1 ]
Madathil, Nisha Thorakkattu [1 ]
Alalawi, Meera [1 ]
Alrabaee, Saed [1 ]
Al Bataineh, Mohammad [2 ,3 ]
Melhem, Suhib [4 ]
Mouheb, Djedjiga [5 ]
机构
[1] United Arab Emirates Univ, Informat Syst & Secur, Al Ain, U Arab Emirates
[2] UAE Univ, Coll Engn, Elect Engn, Al Ain, U Arab Emirates
[3] Yarmouk Univ, Telecommun Engn Dept, Irbid 21163, Jordan
[4] Al Ain Univ, Coll Engn, Dept Cybersecur, Abu Dhabi, U Arab Emirates
[5] Univ Laval, Comp Sci, Laval, PQ, Canada
来源
COMPUTERS IN HUMAN BEHAVIOR REPORTS | 2024年 / 16卷
关键词
Cybersecurity; Curriculum; Threats; Design; Education; Cyber-attack;
D O I
10.1016/j.chbr.2024.100501
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of such threats. However, the world faces a workforce shortage of qualified cybersecurity professionals and practitioners. To address this dilemma, several cybersecurity educational programs have been introduced, such as specialized cybersecurity courses in computer science graduate programs. With the increasing demand, different cybersecurity courses are introduced at the high school level, undergraduate computer science and information systems programs, and even at the government level. Due to the peculiar nature of cybersecurity, educational institutions face many issues when designing a curriculum or cybersecurity activities. In this paper, we study existing cybersecurity curriculum approaches and activities. We also present case studies on cybersecurity education around the globe.
引用
收藏
页数:17
相关论文
共 118 条
[1]   Integrating Hackathons into an Online Cybersecurity Course [J].
Affia, Abasi-Amefon Obot ;
Nolte, Alexander ;
Matulevicius, Raimundas .
2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-SEET 2022), 2022, :134-145
[2]   Safe: Cryptographic Algorithms and Security Principles Gamification [J].
Al Kaabi, Latifa ;
Al Ketbi, Wadha ;
Al Khoori, Aysha ;
Al Shamsi, Maitha ;
Alrabaee, Saed .
PROCEEDINGS OF THE 2022 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON 2022), 2022, :1169-1178
[3]  
Al Obaidli H. Y., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P766
[4]  
Alhamdani W. A., 2019, Journal of Cybersecurity Education, Research and Practice, V2019
[5]   AI and Network Security Curricula: Minding the Gap [J].
Alomar, Ban ;
Trabelsi, Zouheir ;
Qayyum, Tariq ;
Parambil, Medha Mohan Ambali .
2024 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE, EDUCON 2024, 2024,
[6]  
[Anonymous], 2023, Security outcomes report
[7]  
[Anonymous], 2023, data breach investigations report
[8]  
[Anonymous], 2007, TECHNICAL WORKING GR
[9]  
[Anonymous], 2022, 15 alarming cybersecurity facts and statistics.
[10]  
[Anonymous], 2014, At the Nexus of Cybersecurity and Public Policy