skip to main content
10.1145/3368308.3415399acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

A Cybersecurity Course for Everyone

Authors Info & Claims
Published:07 October 2020Publication History

ABSTRACT

In 2003, The National Strategy to Secure Cyberspace was published with a goal to "engage and empower Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact". It called for a "coordinated and focused effort from our entire society" to secure cyberspace. Subsequent updates to this strategy continued to support this idea. This paper addresses Penn College'S effort to develop an introduction to cybersecurity course that addresses this need. Based on the content of our major specific introduction to cybersecurity course, a new course was designed to lower the barriers to entry for non-IT students while at the same time presenting cybersecurity principles in a manner that was applicable to all majors.

References

  1. Mark Dupuis. 2017. Cyber Security for Everyone: An Introductory Course for Non-Technical Majors. Journal of Cybersecurity Education, Research and Practice 2017, 1 (2017). https://digitalcommons.kennesaw.edu/jcerp/vol2017/iss1/3Google ScholarGoogle Scholar
  2. National Initiative for Cybersecurity Education Working Group. 2018. Cybersecurity is Everyone?s Job. (2018). https://www.nist.gov/system/files/documents/2018/ 10/15/cybersecurity_is_everyones_job_v1.0.pdf.Google ScholarGoogle Scholar
  3. Sandra Gorka, Alicia McNett, Jacob R. Miller, and Bradley M. Webb. 2020. Improving the Pipeline. Journal of The Colloquium for Information System Security Education 7, 1 (June 2020).Google ScholarGoogle Scholar
  4. Xenia Mountrouidou, Xiangyang Li, and Quinn Burke. 2018. Cybersecurity in Liberal Arts General Education Curriculum. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (Larnaca, Cyprus) (ITiCSE 2018). Association for Computing Machinery, New York, NY, USA, 182--187. https://doi.org/10.1145/3197091.3197110Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. United States. Department of Homeland Security. 2003. The National Strategy to Secure Cyberspace. (2003). https://www.hsdl.org/?abstract&did=1040.Google ScholarGoogle Scholar
  6. Greg Robinson. 2018. Why Cybersecurity Has Never Been More Important. Security Today (2018). https://securitytoday.com/articles/2018/02/19/whycybersecurity-has-never-been-more-important.aspx.Google ScholarGoogle Scholar
  7. Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor. 2015. Cyber Education: A Multi-Level, Multi-Discipline Approach. In Proceedings of the 16th Annual Conference on Information Technology Education (Chicago, Illinois, USA) (SIGITE '15). Association for Computing Machinery, New York, NY, USA, 43--47. https://doi.org/10.1145/2808006.2808038Google ScholarGoogle Scholar

Index Terms

  1. A Cybersecurity Course for Everyone

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGITE '20: Proceedings of the 21st Annual Conference on Information Technology Education
        October 2020
        446 pages
        ISBN:9781450370455
        DOI:10.1145/3368308

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 October 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate176of429submissions,41%
      • Article Metrics

        • Downloads (Last 12 months)44
        • Downloads (Last 6 weeks)6

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader