An exploration of the current state of information assurance education

Author:

Cooper Stephen1,Nickell Christine2,Piotrowski Victor3,Oldfield Brenda4,Abdallah Ali5,Bishop Matt6,Caelli Bill7,Dark Melissa1,Hawthorne E. K.8,Hoffman Lance9,Pérez Lance C.10,Pfleeger Charles11,Raines Richard12,Schou Corey13,Brynielsson Joel14

Affiliation:

1. Purdue University, West Lafayette, IN

2. Department of Defense, Ft. Meade, MD

3. National Science Foundation, Arlington, VA

4. Department of Homeland Security, NCSD, Washington DC

5. London South Bank University, London, England

6. University of California, Davis, Davis, CA

7. Queensland University of Tech., Brisbane Qld 4001 Australia

8. Union County College, Cranford, NJ

9. George Washington University, Washington, DC

10. University of Nebraska, Lincoln, Lincoln, NE

11. Pfleeger Consulting Group, Washington, DC

12. Air Force Institute of Technology, Wright Patterson AFB, OH

13. Idaho State University, Pocatello, ID

14. Royal Inst. of Technology, Stockholm, Sweden

Abstract

Information Assurance and computer security are serious worldwide concerns of governments, industry, and academia. Computer security is one of the three new focal areas of the ACM/IEEE's Computer Science Curriculum update in 2008. This ACM/IEEE report describes, as the first of its three recent trends, "the emergence of security as a major area of concern." The importance of Information Assurance and Information Assurance education is not limited to the United States. Other nations, including the United Kingdom, Australia, New Zealand, Canada, and other members from NATO countries and the EU, have inquired as to how they may be able to establish Information Assurance education programs in their own country. The goal of this document is to explore the space of various existing Information Assurance educational standards and guidelines, and how they may serve as a basis for helping to define the field of Information Assurance. It was necessary for this working group to study what has been done for other areas of computing. For example, computer science (CS 2008 and associate-degree CS 2009), information technology (IT 2008), and software engineering (SE 2004), all have available curricular guidelines. In its exploration of existing government, industry, and academic Information Assurance guidelines and standards, as well as in its discovery of what guidance is being provided for other areas of computing, the working group has developed this paper as a foundation, or a starting point, for creating an appropriate set of guidelines for Information Assurance education. In researching the space of existing guidelines and standards, several challenges and opportunities to Information Assurance education were discovered. These are briefly described and discussed, and some next steps suggested.

Publisher

Association for Computing Machinery (ACM)

Reference40 articles.

1. Computing Curricula 2005 The Overview Report (http://www.acm.org/education/education/curric_vols/CC2005-March06Final.pdf) Computing Curricula 2005 The Overview Report (http://www.acm.org/education/education/curric_vols/CC2005-March06Final.pdf)

2. Information Technology 2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology (http://www.acm.org//education/curricula/IT2008%20Curriculum.pdf) Information Technology 2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology (http://www.acm.org//education/curricula/IT2008%20Curriculum.pdf)

3. Software Engineering 2004 Curriculum Guidelines of Undergraduate Degree Programs in Software Engineering (http://sites.computer.org/ccse) Software Engineering 2004 Curriculum Guidelines of Undergraduate Degree Programs in Software Engineering (http://sites.computer.org/ccse)

4. Computing Curriculum 2001 (http://www.acm.org/education/curric_vols/cc2001.pdf). Computing Curriculum 2001 (http://www.acm.org/education/curric_vols/cc2001.pdf).

Cited by 12 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Creating Defensive Programmers : Evaluating the Impact of Adding Cybesecurity Topics to Core Computer Science Courses;Proceedings of the 2023 ACM Conference on International Computing Education Research - Volume 2;2023-08-07

2. Impact of Articulation Agreements on Student Transfer between Higher Education Institutions: A Case Study of a Cybersecurity Program;Community College Journal of Research and Practice;2021-02-17

3. On the Modeling of Automotive Security: A Survey of Methods and Perspectives;Future Internet;2020-11-16

4. A Case Study of a Cybersecurity Programme;Proceedings of the 51st ACM Technical Symposium on Computer Science Education;2020-02-26

5. Vulnerability in Information Technology and Computing- A Study in Technological Information Assurance;International Journal of Management, Technology, and Social Sciences;2019-11-19

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3