skip to main content
research-article

Application of pedagogical fundamentals for the holistic development of cybersecurity professionals

Published:01 March 2014Publication History
Skip Abstract Section

Abstract

Nowhere is the problem of lack of human capital more keenly felt than in the field of cybersecurity where the numbers and quality of well-trained graduates are woefully lacking [10]. In 2005, the National Academy of Sciences indicted the US education system as the culprit contributing to deficiencies in our technical workforce, sounding the alarm that we are at risk of losing our competitive edge [14]. While the government has made cybersecurity education a national priority, seeking to stimulate university and community college production of information assurance (IA) expertise, they still have thousands of IA jobs going unfilled. The big question for the last decade [17] has been 'where will we find the talent we need?' In this article, we describe one university's approach to begin addressing this problem and discuss an innovative curricular model that holistically develops future cybersecurity professionals.

References

  1. Bespalko, V. Fundamentals of Theory of Pedagogical Systems. (Vorenege, RU: Voronege State University Press, 1977).Google ScholarGoogle Scholar
  2. Bloom, B., Mesia, B. and Krathwohl, D. Taxonomy of Educational Objectives. (New York: David McKay Company, 1964).Google ScholarGoogle Scholar
  3. Chabrow, E. "Placing in Context the Infosec Skills Gap: NASCIO's Chad Grant Analyzes Challenges." GovInfoSecurity.com, Princeton, NJ. http://www.govinfosecurity.com/interviews/placing-in-context-infosec-skills-gap-i-986. Accessed 2013 June 30.Google ScholarGoogle Scholar
  4. Chief Information Officer, US Department of Defense. "Information Assurance Scholarship Program: Are You Ready?" US Department of Defense, Washington, D.C. http://dodcio.defense.gov/Home/Initiatives/InformationAssuranceScholarshipProgram(IASP).aspx. Accessed 2013 June 30.Google ScholarGoogle Scholar
  5. Endicott-Popovsky, B., Frincke, D., Popovsky, V. "Designing a Computer Forensics Course for an Information Assurance Track." in Proceedings of the Eighth Colloquium for Information Systems Security Education. (West Point, NY: Colloquium for Information Systems Security Education, 2004): 59--64.Google ScholarGoogle Scholar
  6. Endicott-Popovsky, B., Frincke, D., Popovsky, V. "Secure Code: The Capstone Class in an IA Track." in Proceedings of the Ninth Colloquium for Information Systems Security Education. (Atlanta, GA: Colloquium for Information Systems Security Education, 2005). The Printing House, Inc., Stoughton, WI.: 100--108.Google ScholarGoogle Scholar
  7. Endicott-Popovsky, B., Seifert, C. Frincke, D. "Adopting Extreme Programming on a Graduate Student Project." in Proceedings of the Sixth IEEE Systems, Man and Cybernetics Information Assurance and Security Workshop. (West Point, NY: 2005) IEEE Publishing, Los Alamitos, CA. ©2005: 454--455.Google ScholarGoogle Scholar
  8. Fitzpatrick, A. "For Job Security, Try Cybersecurity, Experts Say." Mashable.com, Mashable, Inc., New York. http://mashable.com/2012/05/29/cybersecurity-career/. Accessed 2013 June 30.Google ScholarGoogle Scholar
  9. Gates, W. "Trustworthy Computing." January 15, 2002 Memo. Microsoft Corporation, Seattle, WA.Google ScholarGoogle Scholar
  10. Goldman, A. (2009). "Feds Need 10,000 Cyber Security Experts." Internet News.com, Quin-Street Enterprise, Louisville, KY. http://www.internetnews.com/security/article.php/3823806. Accessed 2013 June 30.Google ScholarGoogle Scholar
  11. Hansel, L., Chung, S. and Endicott-Popovsky, B. "Software Reengineering Approach to Teaching Secure Coding Practices. in Proceedings of the Fifteenth Colloquium for Information Systems Security Education. (Fairborn, OH: Colloquium for Information Systems Security Education, 2011). The Printing House, Inc., Stoughton, WI: 29--36.Google ScholarGoogle Scholar
  12. Kuzmina, U. Fundamentals of Pedagogy of Higher Education. (Leningrad, RU: Lenizdat, 1972).Google ScholarGoogle Scholar
  13. Michailova, A. "Establishing a System of Professional--Practical Activity." Messenger of Higher Education, Moscow, RU, 11, (1985): 31--33.Google ScholarGoogle Scholar
  14. National Academies of Science. Rising above the Gathering Storm: Energizing and Employing America for a Brighter Economic Future. (Washington, D.C.: The National Academies Press, 2005).Google ScholarGoogle Scholar
  15. National Security Agency Central Security Service. "National Centers of Academic Excellence." National Security Agency, Washington, D.C. http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml. Accessed 2013 June 30.Google ScholarGoogle Scholar
  16. NIST/NICE framework. http://csrc.nist.gov/nice/framework/. Accessed 2014 January 6.Google ScholarGoogle Scholar
  17. Pecinovsky, E. "A Human Capital Crisis in Cybersecurity." ClearanceJobs.com. Dice, Inc., Urbandale, IA; http://www.clearancejobs.com/cleared-news/152/a-human-capital-crisis-in-cybersecurity. Accessed 2013 June 30.Google ScholarGoogle Scholar
  18. Popovsky, V. and Endicott-Popovsky, B. "Integrating Academics, the Community and Industry." in Proceedings of the Physical Culture and Sports: Analysis of Social Processes '08. (St. Petersburg, RU: 2008), Lesgaft National State University Press, St. Petersburg, RU: 239--243.Google ScholarGoogle Scholar
  19. Popovsky, V. "Coaching Volleyball with Unleashing Personal Potential in Mind." in Proceedings of the Int'l Conference Honoring 70th Anniversary Sports Games Dept. Lesgaft State Academy of Physical Education '04, (St. Petersburg, RU 2004), Lesgaft National State University Press, St. Petersburg, RU: 136--140.Google ScholarGoogle Scholar
  20. Popovsky, V., Endicott-Popovsky, B., "Physical Culture Pedagogy: Coaching by Design." in Methods for Modernizing Physical Culture: Selection of Scientific and Methodological Works, edited by V.E. Grigoriev, (St. Petersburg, Russia, 2005): 176--187.Google ScholarGoogle Scholar
  21. Roginsky, V. Alphabet of Pedagogical Work. (Moscow, RU: Higher Education, 1990).Google ScholarGoogle Scholar
  22. Simpson, J. and Endicott-Popovsky, B. "A Systematic Approach to Information Systems Security Education." in Proceedings of the Fourteenth Colloquium for Information Systems Security Education, (Baltimore, MD: Colloquium for Information Systems Security Education, 2010). The Printing House Inc., Stoughton, WI: 173--179.Google ScholarGoogle Scholar
  23. Simpson, J., et al. Secure software education: A contextual model-based approach. International Journal of Secure Software Engineering, (2010). 1(4). pp. 35--61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Talizina, N. Activity approach to the development of the model specialist. Messenger of Higher Education, Moscow, RU, 11, (1986): 10--13.Google ScholarGoogle Scholar
  25. Talizina, N. Management of the Learning Process. (Moscow, RU. Higher Education, 1975).Google ScholarGoogle Scholar
  26. US Office of Personnel Management. "Cybercorps: Scholarship for Service." https://www.sfs.opm.gov/. Accessed 2013 June 30.Google ScholarGoogle Scholar
  27. Wiggins, G. and McTighe, J. Understanding by Design, 2nd ed. (Alexandria, VA: Association for Supervision and Curriculum Development, 2005).Google ScholarGoogle Scholar

Index Terms

  1. Application of pedagogical fundamentals for the holistic development of cybersecurity professionals

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Inroads
        ACM Inroads  Volume 5, Issue 1
        March 2014
        74 pages
        ISSN:2153-2184
        EISSN:2153-2192
        DOI:10.1145/2568195
        Issue’s Table of Contents

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 March 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format