2010
DOI: 10.1145/1709424.1709457
|View full text |Cite
|
Sign up to set email alerts
|

An exploration of the current state of information assurance education

Abstract: Information Assurance and computer security are serious worldwide concerns of governments, industry, and academia. Computer security is one of the three new focal areas of the ACM/IEEE's Computer Science Curriculum update in 2008. This ACM/IEEE report describes, as the first of its three recent trends, "the emergence of security as a major area of concern." The importance of Information Assurance and Information Assurance education is not limited to the United States. Other nations, including the United Kingdo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
2

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(24 citation statements)
references
References 2 publications
0
22
0
2
Order By: Relevance
“…The former can be used in cyber security for the evaluation of educational interventions [5], [10], while the latter mostly provides an understanding on how attackers compromise systems [11]. Academic accreditations and professional certifications are an important part of such competency frameworks [12], and several guidelines and educational standards were proposed to facilitate the process of defining the field of cyber security [13].…”
Section: Related Workmentioning
confidence: 99%
“…The former can be used in cyber security for the evaluation of educational interventions [5], [10], while the latter mostly provides an understanding on how attackers compromise systems [11]. Academic accreditations and professional certifications are an important part of such competency frameworks [12], and several guidelines and educational standards were proposed to facilitate the process of defining the field of cyber security [13].…”
Section: Related Workmentioning
confidence: 99%
“…Instead, existing data sources such as taxonomies, profiling and knowledge elicitation workshops about the targeted group of users can act as an alternative. Considering IT security from an attack versus defend viewpoint is a common way to study threats [16], [17], and can provide insightful information about the attackers such as how they carry out attacks, which weaknesses they target the most, the skill of the attacker in terms of the way an attack is carried out, etc. Such data concerning different categories of attackers can be acquired from IT security professionals using quantitative and/or qualitative means.…”
Section: A Assumption and Attacker Personasmentioning
confidence: 99%
“…As Steven Cooper et al well expressed the historical context of such efforts, [3] cybersecurity training and education evolved through a wealth of sectorspecific training that has matured over the last 40 years, including the CISOstyle training that matured into SANS; the information security education programs that perhaps started as early as Queensland Institute of Technology in Australia offered a Master's level research degree in computer security 1986. Cyber security forces capabilities in departments of defense around the world began to mature as evidenced by the expansion of the U.S. Air Force Mission to incl ude cyberspace in 2005.…”
Section: Introductionmentioning
confidence: 99%