A Cybersecurity Educated Community

被引:10
作者
Ahmad, Norita [1 ]
Laplante, Phillip A. [2 ]
DeFranco, Joanna F. [2 ]
Kassab, Mohamad [2 ]
机构
[1] Amer Univ Sharjah, Mkt & IS Dept, Sharjah 26666, U Arab Emirates
[2] Penn State Univ, Dept Engn, Malvern, PA 19355 USA
关键词
Computer security; Security; Education; Computer crime; Data privacy; Privacy; Computer hacking; Computers and education; cybersecurity; cyber safety; FRAMEWORK; INTERNET;
D O I
10.1109/TETC.2021.3093444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need for cybersecurity education has grown significantly for all citizens. However, cybersecurity education has not been adequately addressed in fields outside of this domain. Cybersecurity concerns increase every time a new device connects to a network. As such, we need to increase involvement and advancement of cybersecurity education at all levels and in every discipline. Education, audit, and enforcement regarding cybersecurity are critical aspects and are the responsibility of all system stakeholders. It is no longer enough to rely on the security team to be responsible for combating cyber threats. Involvement and commitment from all stakeholders are essential and universal and begins with a cross-disciplinary reform in education. In this paper, the need to deliver cybersecurity education across all disciplines and at all levels is discussed. Specifically, the focus is at the following four types of users: K-12, college, technical professionals, and all other citizens. A curriculum roadmap that integrates cybersecurity throughout technical and nontechnical curricula is proposed as a foundation for future cyber education planning. The goal is to introduce students and citizens to the concept of cybersecurity, to ensure they can apply cybersecurity concepts, and to expose them to multiple approaches to solving cybersecurity related problems.
引用
收藏
页码:1456 / 1463
页数:8
相关论文
共 50 条
[31]   Enhancing the Cybersecurity of Port Community Systems [J].
Meyer-Larsen, Nils ;
Mueller, Rainer .
DYNAMICS IN LOGISTICS, 2018, :318-323
[32]   A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks [J].
Ali, Jehad ;
Singh, Sushil Kumar ;
Jiang, Weiwei ;
Alenezi, Abdulmajeed M. ;
Islam, Muhammad ;
Daradkeh, Yousef Ibrahim ;
Mehmood, Asif .
COMPUTER COMMUNICATIONS, 2025, 229
[33]   Application of Large Language Models in Cybersecurity: A Systematic Literature Review [J].
Hasanov, Ismayil ;
Virtanen, Seppo ;
Hakkala, Antti ;
Isoaho, Jouni .
IEEE ACCESS, 2024, 12 :176751-176778
[34]   Impact of xG on Cybersecurity [J].
Rajabion, Lila ;
Unhelkar, Bhuvan .
IT PROFESSIONAL, 2023, 25 (03) :30-35
[35]   The rise of cybersecurity warriors? [J].
Weiss, Moritz .
SMALL WARS AND INSURGENCIES, 2022, 33 (1-2) :272-293
[36]   SoK: Social Cybersecurity [J].
Wu, Yuxi ;
Edwards, W. Keith ;
Das, Sauvik .
43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, :1863-1879
[37]   Recommender Systems in Cybersecurity [J].
Ferreira, Leonardo ;
Silva, Daniel Castro ;
Itzazelaia, Mikel Uriarte .
KNOWLEDGE AND INFORMATION SYSTEMS, 2023, 65 (12) :5523-5559
[38]   Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective [J].
Acharya, Samrat ;
Dvorkin, Yury ;
Pandzic, Hrvoje ;
Karri, Ramesh .
IEEE ACCESS, 2020, 8 :214434-214453
[39]   A Review on Cybersecurity of Cloud Computing for Supporting Connected Vehicle Applications [J].
Salek, M. Sabbir ;
Khan, Sakib Mahmud ;
Rahman, Mizanur ;
Deng, Hsien-Wen ;
Islam, Mhafuzul ;
Khan, Zadid ;
Chowdhury, Mahsrur ;
Shue, Mitch .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :8250-8268
[40]   Understanding the Last Line of Defense: Human Response to Cybersecurity Events [J].
Rebensky, Summer ;
Carroll, Meredith ;
Nakushian, Andrew ;
Chaparro, Maria ;
Prior, Tricia .
HCI FOR CYBERSECURITY, PRIVACY AND TRUST (HCI-CPT 2021), 2021, 12788 :353-366