Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2020.10.05.016

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region  

Hong, Jin-Keun (Division of Information Communication Technology, Baekseok University)
Publication Information
Journal of Convergence for Information Technology / v.10, no.5, 2020 , pp. 16-22 More about this Journal
Abstract
In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.
Keywords
Cyber Security; Security Education; Security Workforce; Curriculum; Security Competency;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Conklin Wm Arthur, Cline Raymond E, Roosa Tiffany. (2014). Re engineering cyberseucirty educationin the US : An analysis of the critical factors. System Sciences (HICCS) 47th Hawaii International Conference 2014 (pp. 2006-2014). IEEE
2 I. Alsmadi & M. Zarour. (2018). Cybersecurity programs in Saudi Arabia: Issues and Recommendations. In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-5). IEEE.
3 B. D. Caulkins, K. Badillo-Urquiola, P. Bockelman & R. Leis. (2016). Cyber workforce development using a behavioral cybersecurity paradigm. In 2016 International Conference on Cyber Conflict (CyCon US) (pp. 1-6). IEEE.
4 C. Curricula. (2017). Curriculum guidelines for post-secondary degree programs in cybersecurity. New York : IEEE Computer Society. https://cybered.hosting.acm.org/wp/wp-content/uploads/2018/02/csec2017_web.pdf
5 W. Park & S. Ahn. (2017). Enhancing Education Curriculum of cybersecurity Based on NICE. KIPS Trans. on Comp. and Comm. Sys., 6(1), 321-328. DOI : 10.3745/KTCCS.2017.6.7.321
6 S. Hong. (2018). A Study on the Framework of Comparing New Cybersecurity Workforce Development Policy Based on the ATE Programs of U.S. Journal of the Korea Institute of Information Security and Cryptology, 28(1), 249-267. DOI : 10.13089/JKIISC.2018. 28.1.249   DOI
7 NICE Webinar Series. (n.d.). How You can influence an updates to the NICE framework(Oline). https://www.nist.gov/system/files/documents/201 9/12/04/NICEFramework_Webinar_FINAL.pdf
8 Competency Model Clearinghouse. (n.d.). Cybersecurity Competency Model (Online). https://www.careeronestop.org/CompetencyModel/competency-models/pyramid-download.aspx?industry=cybersecurity
9 https://dodcio.defense.gov/Cyber-Workforce/DCWF.aspx
10 William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte. NICE Cybersecurity Workforce Framework. NIST SP 800-181.
11 S. Azadegan & M. O'Leary. (2016) An undergraduate Cyber Operations curriculum in the making: A 10+ year report. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI) (pp. 251-254). IEEE. DOI : 10.1109/ISI.2016.7745484
12 D. Yuan. (2017). Design and develop hands on cyber-security curriculum and laboratory. Computing Conference 2017 (pp. 1176-1179). IEEE. DOI : 10.1109/SAI.2017.8252239
13 A. Lodgher, J. Yang & U. Bulut. (2018). An Innovative Modular Approach of Teaching cybersecurityacross Computing Curricula. In 2018 IEEE Frontiers in Education Conference (FIE) (pp. 1-5). IEEE. DOI : 10.1109/FIE.2018.8659040
14 S. Naqvi, P. Sommer & M. Josephs. (2019). A Research-Led Practice-Driven Digital Forensic Curriculum to Train Next Generation of Cyber Firefighters. In 2019 IEEE Global Engineering Education Conference (EDUCON) (pp. 1204-1211). IEEE. DOI: 10.1109/EDUCON.2019.8725129
15 K. Kim, J. Smith, T. A. Yang & D. J. Kim, (2018). An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE Framework. In 2018 National Cyber Summit (NCS) (pp. 1-7). IEEE.
16 N. Miloslavskaya & A. Tolstoy. (2016). State level views on professional competencies in the field of IoT and cloud information security. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (pp. 83-90). IEEE.