skip to main content
10.1145/1971681.1971686acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
review-article

Towards information assurance (IA) curricular guidelines

Published:28 June 2010Publication History

ABSTRACT

Information assurance and information security are serious worldwide concerns. Computer security is one of the three new focal areas of the ACM/IEEE's Computer Science Curriculum update in 2008. This ACM/IEEE report describes, as the first of its three recent trends, "the emergence of security as a major area of concern." [3]

The purpose of this working group report is to continue the work of the 2009 working group on information assurance (IA) education. The focus of the 2010 working group is to examine the curricula of existing academic programs, as well as at the key academic governmental and industry IA education standards and guidelines identified by the 2009 IA working group in order to begin defining the IA education space as a first step towards developing curricular guidelines.

References

  1. Biggs, J. 1999. Teaching for Quality Learning at University: What the Student Does. Open University Press, Buckingham, United Kingdom, second edition.Google ScholarGoogle Scholar
  2. Brynielsson, J. 2009. An information assurance curriculum for commanding officers using hands-on experiments. ACM SIGCSE Bulletin, 41(1):236--240, March 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Computer Science 2008, An Interim Revision of CS 2001 (http://www.acm.org//education/curricula/ComputerScience2008.pdf)Google ScholarGoogle Scholar
  4. Computing Curriculum 2001 (http://www.acm.org/education/curric_vols/cc2001.pdf).Google ScholarGoogle Scholar
  5. Computing Curricula 2009: ACM Guidelines for Associate-Degree Transfer Curriculum in Computer Science. http://www.acmtyc.org/WebReports/CSreport/Google ScholarGoogle Scholar
  6. Cooper, S., Nickell, C., Piotrowski, V., Oldfield, B., Abdallah, A., Bishop, M., Caelli, B., Dark, M., Hawthorne, E. K., Hoffman, L., Pérez, L. C., Pfleeger, C., Raines, R., Schou, C., and Brynielsson, J. 2010. An exploration of the current state of information assurance education. SIGCSE Bull. 41, 4 (Jan. 2010), 109--125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Information Technology 2008, Curriculum Guidelines for Undergraduate Degree Programs in Information Technology http://www.acm.org//education/curricula/IT2008%20Curriculum.pdfGoogle ScholarGoogle Scholar
  8. ISC2, The 10 Domains of CISSP, www.isc2.org/cisspGoogle ScholarGoogle Scholar
  9. Jacobson, D. 2004. Teaching information warfare with lab experiments via the Internet. In Proceedings of the 34th ASEE/IEEE Frontiers in Education Conference, pages T3C/7-12, Savannah, Georgia, October, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  10. Mullins, B.E., Lacey, T.H., Mills, R.F., Trechter, J.M., and Bass, S.D. 2007. How the cyber defense exercise shaped an information-assurance curriculum. IEEE Security & Privacy, 5(5):40--49, September-October 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. NIST publication 800-53. http://csrc.nist.gov/publications/nistpubs/800-53-Rev2/sp800-53-rev2-final.pdfGoogle ScholarGoogle Scholar
  12. NSA/DHS, 2010 Designees of the National Centers of Academic Excellence, June 21, 2010 http://www.nsa.gov/public_info/press_room/2010/academic_excellence.shtmlGoogle ScholarGoogle Scholar
  13. http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.Google ScholarGoogle Scholar
  14. http://www.nsa.gov/ia/academic_outreach/nat_cae/institutions.shtml.Google ScholarGoogle Scholar

Index Terms

  1. Towards information assurance (IA) curricular guidelines

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ITiCSE-WGR '10: Proceedings of the 2010 ITiCSE working group reports
        June 2010
        121 pages
        ISBN:9781450306775
        DOI:10.1145/1971681

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 June 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • review-article

        Acceptance Rates

        Overall Acceptance Rate552of1,613submissions,34%

        Upcoming Conference

        ITiCSE 2024

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader