skip to main content
10.1145/1059524.1059537acmconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
Article

Information security curriculum creation: a case study

Published:08 October 2004Publication History

ABSTRACT

Information Security is a critical part of the technology infrastructure. A survey of undergraduate degree programs in Computer Science, Information Technology, Management Information Science, and others show a lack of emphasis on security issues in their curriculum. The purpose of this paper is to present a case study on our approach to creating an undergraduate curriculum that will enhance existing degree programs in Computer Science and Information Technology to provide an increased awareness of Information Security concepts. Our rationale includes: research on existing Information Security programs, review of other Information Security curriculum development efforts, assessments and surveys of workforce needs in Information Technology pertaining to security, applying government directives, and the process of creating a curriculum to address the discovered gaps. Our approach is unique in its usage of surveys of Information Technology professionals, interviews with professionals, and a comprehensive survey of workforce needs in Information Security along with a review of other curriculum development efforts. From this case study, we will be able to suggest and define an Information Security curriculum that will best answer today's security challenges.

References

  1. Ross, Seth. (1999) Unix System Security Tools. Computer Security a Practical Definition. Available on March 12, 2004 at http://www.albion.com/security/intro-4.html]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Khosla, Pradeep. (2003) Carnegie Mellon University Announces new degrees in Information Security to address needs of Government, Industry. Available on March 12, 2004http://www.ini.cmu.edu/academics/MSISTM/msistm_curricu.htm]]Google ScholarGoogle Scholar
  3. NSTSC (2003) National Strategy to Secure Cyberspace. A National Cyberspace Security Awareness and Training Program. p. 37 Available on March. 12, 2004 at http://www.whitehouse.gov/pcipb/cyberspace_strategy.pdf]]Google ScholarGoogle Scholar
  4. Information Security (Master of Science in Information Security Technology and Management - MSISTM). 13 Jan 2003. Carnegie Mellon University. Available on March 12, 2004 at http://www.ini.cmu.edu/academics/MSISTM/index.htm]]Google ScholarGoogle Scholar
  5. Master of Science in Computer Science Concentration in Information Security. James Madison University. Available on March 12, 2004 at http://www.infosec.jmu.edu/website/overview.htm]]Google ScholarGoogle Scholar
  6. Infosec Graduate Program. Purdue University. Available on March 12, 2004 at http://www.cerias.purdue.edu/education/graduate_program/]]Google ScholarGoogle Scholar
  7. Master of Science in Security Informatics. Johns Hopkins University. Available on March 12, 2004 at http://www.jhuisi.jhu.edu/education/index.html]]Google ScholarGoogle Scholar
  8. Master of Science degree program in Information Security and Assurance. George Mason University. Available on March 12, 2004 at http://www.isse.gmu.edu/ms-isa/]]Google ScholarGoogle Scholar
  9. Crowley, Ed. "Information System Security Curricula Development." Proceeding of the 4th conference on information technology curriculum on Information technology education. Oct 2003. Available on March 12, 2004 at portal.acm.org/]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dark, Melissa. Davis, Jim. "Report on Information Assurance Curriculum Development". The Center for Education and Research in Information Assurance and Security (CERIAS). Available on March. 12, 2004 at http://www.cerias.purdue.edu/education/post_secondary_edu cation/undergrad_and_grad/curriculum_development/information_assurance/]]Google ScholarGoogle Scholar
  11. Border Ph.D., Charles. Holden, Ed. "Security Education within the IT Curriculum". Proceeding of the 4th conference on information technology curriculum on Information technology education. Oct 2003. Available on March 12, 2004 at portal.acm.org/]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Azadegan, S. Lavine, M. O'Leary, M. Wijesinha, A. Zimand, M. "An Undergraduate Track in Computer Security". ACM SIGCSE Bulletin, Proceedings of the 8th annual conference on Innovation and technology in computer science education, Volume 35 Issue 3. June 2003. Available on March 12, 2004 at portal.acm.org/]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Yang, Andrew. "Computer Security and Impact on Computer Science Education". The Journal of Computing in Small Colleges, Proceedings of the sixth annual CCSC northeastern conference on The journal of computing in small colleges, Volume 16 Issue 4. April 2001. Available on March 12, 2004 at portal.acm.org/]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Infosecurity Conference and Exhibition 2003. Available on March 12, 2004 at http://www.infosecurityevent.com/]]Google ScholarGoogle Scholar
  15. The Information Systems Security Association (ISSA)®. Available on March 12, 2004 at http://www.issa.org/]]Google ScholarGoogle Scholar
  16. The Open Web Application Security Project (OWASP). Available on March 12, 2004 at http://www.owasp.org/]]Google ScholarGoogle Scholar
  17. ICAT Metabase: A CVE Based Vulnerability Database. National Institute of Standards and Technology. Available on March 12, 2004 at http://icat.nist.gov/]]Google ScholarGoogle Scholar
  18. Information Assurance Curriculum and Certification: State of the Practice. Carnegie Mellon University. Available on March 12, 2004 at http://www.sei.cmu.edu/publications/documents/99.reports/99tr021/99tr021chap0chap02.html]]Google ScholarGoogle Scholar
  19. National Information Assurance Education and Training Program (NIETP). National Security Agency (NSA). Available on March 12, 2004 at http://www.nsa.gov/ia/academia/acade00001.cfm]]Google ScholarGoogle Scholar
  20. Awareness, Training, and Education Computer Resource Center (CSRC). National Institute for Standards and Technology (NIST). Available on March 12, 2004 at http://csrc.nist.gov/ate/]]Google ScholarGoogle Scholar

Index Terms

  1. Information security curriculum creation: a case study

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        InfoSecCD '04: Proceedings of the 1st annual conference on Information security curriculum development
        October 2004
        147 pages
        ISBN:1595930485
        DOI:10.1145/1059524

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 October 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate18of23submissions,78%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader