skip to main content
10.1145/3600160.3605008acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Dynamic Cybersecurity Curriculum Optimization Method (DyCSCOM)

Authors Info & Claims
Published:29 August 2023Publication History

ABSTRACT

Demand for cybersecurity experts is high, driven by the increasing digitization of society and increasing number of sophisticated, targeted cyber attacks. Despite this pressing need, a significant shortfall in the number of cybersecurity experts remains due to very diverse landscape of knowledge and complex curriculum accreditation process. In this paper, we present a new model for curriculum analysis and adjustment that addresses entire curricula or course material. It employs machine learning and text-mining techniques for keyword extraction and further comparison with reference skills frameworks. The analysis illustrates a new measurement that quantifies coverage of cybersecurity role and its importance within curriculum based on keyword matching. The case study was conducted with university curricula from Europe and North America. The results illustrate curriculum coverage according to the ENISA's European Cybersecurity Skills Framework (ECSF) roles and optimization progress after our method application.

References

  1. CheckPoint Corporation, https://resources.checkpoint.com/cyber-security-resources/2022-cyber-security-report(accessed 04.05.2023)Google ScholarGoogle Scholar
  2. (ISC)2. 2021. (ISC)2 Cybersecurity Workforce Study, https://www.isc2.org/-/media/ISC2/Research/2021/ISC2-Cybersecurity-Workforce-Study-2021.ashx (accessed 04.05.2023)Google ScholarGoogle Scholar
  3. Europe council decision 765/2008, setting out the requirements for accreditation and market surveillance relating to the marketing of products and repealing Regulation (EEC) No 339/93Google ScholarGoogle Scholar
  4. Computer Science Curricula 2013, Association for Computing Machinery (ACM) IEEE Computer Society https://www.acm.org/binaries/content/assets/education/cs2013_web_final.pdf (accessed 04.05.2023)Google ScholarGoogle Scholar
  5. ACM Curriculum Guidelines for Undergraduate Degree Programs in Computer Science CC2001 https://www.acm.org/binaries/content/assets/education/curricula-recommendations/cc2001.pdf (accessed 04.05.2023)Google ScholarGoogle Scholar
  6. ACM Computing Curricula Computer Science Volume CS2008 https://www.acm.org/binaries/content/assets/education/curricula-recommendations/cc2001.pdf (accessed 04.05.2023)Google ScholarGoogle Scholar
  7. Yoshitatsu Matsuda, 2018, “Curriculum Analysis of Computer Science Departments by Simplified, Supervised LDA“, Journal of information processingGoogle ScholarGoogle ScholarCross RefCross Ref
  8. Kornraphop Kawintiranon, Peerapon Vateekul and Proadpran Punyabukkana, 2016, “Understanding knowledge areas in curriculum through text mining from course materials”, TALEGoogle ScholarGoogle Scholar
  9. Cyber security certification, https://www.cybersecurityeducation.org/certifications/ (accessed 17.04.2023)Google ScholarGoogle Scholar
  10. ACM cyber security curricula 2017, https://www.acm.org/binaries/content/assets/education/curricula-recommendations/csec2017.pdf (accessed 04.05.2023)Google ScholarGoogle Scholar
  11. Andrea Danyluk and Scott Buck, 2019, “Artificial Intelligence Competencies for Data Science Undergraduate Curricula”, The Ninth AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-19)Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Diana Burley and Alfred H. Lewis Jr, 2019, “Cybersecurity Curricula 2017 and Boeing: Linking Curricular Guidance to Professional Practice”, IEEEGoogle ScholarGoogle Scholar
  13. Gary L. Wallace, 2021, “The Need for Certification-Based Security Curriculum: A Matter of National Security”, IEEEGoogle ScholarGoogle Scholar
  14. Akhtar Lodgher, Jeong Yang and Ummugul Bulut, 2018, “An Innovative Modular Approach of Teaching CyberSecurity across Computing Curricula”, IEEEGoogle ScholarGoogle Scholar
  15. Jan Hajny, Sara Ricci, Edmundas Piesarskas, Olivier Levillain, Letterio Galletta and Rocco De Nicola, 2021, “Framework, Tools and Good Practices for Cybersecurity Curricula”, IEEEGoogle ScholarGoogle Scholar
  16. Concordia courses database for cyber security professionals https://www.concordia-h2020.eu/map-courses-cyber-professionals/ (accessed 04.05.2023)Google ScholarGoogle Scholar
  17. Cyberseek framework, https://www.cyberseek.org/pathway.html (accessed 04.05.2023)Google ScholarGoogle Scholar
  18. ENISA European Cybersecurity Skills Framework2022, https://www.enisa.europa.eu/publications/european-cybersecurity-skills-framework-role-profiles/download/fullReport, (accessed 04.05.2023)Google ScholarGoogle Scholar
  19. Tomáš Brychcín and Miloslav Konopík, 2015, “HPS: High precision stemmer”, Information Processing & ManagementGoogle ScholarGoogle Scholar
  20. Robert Ramirez and Nazli Choucri, 2016, “Improving Interdisciplinary Communication With Standardized Cyber Security Terminology: A Literature Review”, IEEEGoogle ScholarGoogle Scholar
  21. Cyber security academic programs database https://www.enisa.europa.eu/topics/education/cyberhead #Google ScholarGoogle Scholar
  22. KU Leuven Cyber Security curriculum https://wms.cs.kuleuven.be/cs/studeren/master-of-cybersecurity/cybersecurity-programme (accessed 04.05.2023)Google ScholarGoogle Scholar
  23. University of Agder Cyber Security curriculum https://www.uia.no/en/studieplaner/programme/M-SEC (accessed 04.05.2023)Google ScholarGoogle Scholar
  24. Masaryk University Brno Cyber Security curriculum, https://www.fi.muni.cz/catalogue-current/?program=nmgr_pskb_en (accessed 04.05.2023)Google ScholarGoogle Scholar
  25. KTH Royal Institute of Technology Cyber Security curriculum https://www.kth.se/en/studies/master/cybersecurity/courses-cybersecurity-1.1076018 (accessed 04.05.2023)Google ScholarGoogle Scholar
  26. St. Pölten University of Applied Sciences Cyber Security curriculum https://www.fhstp.ac.at/en/academic-studies-continuing-education/computer-science-security/cyber-security-and-resilience/course-contents#/ (accessed 04.05.2023)Google ScholarGoogle Scholar
  27. Berkeley School of Information Cyber Security curriculum https://ischoolonline.berkeley.edu/cybersecurity/curriculum/ (accessed 04.05.2023)Google ScholarGoogle Scholar
  28. Faculty of technical sciences, University of Novi Sad(FTN) Cyber Security curriculum http://www.ftn.uns.ac.rs/1149659633/informaciona-bezbednost (accessed 04.05.2023)Google ScholarGoogle Scholar
  29. Concordia “Becoming a Cybersecurity Consultant” course https://www.concordia-h2020.eu/becoming-a-cybersecurity-consultant (accessed 04.05.2023)Google ScholarGoogle Scholar
  30. SANS Institute “Enterprise Penetration Testing” course https://www.sans.org/cyber-security-courses/enterprise-penetration-testing (accessed 04.05.2023)Google ScholarGoogle Scholar

Index Terms

  1. Dynamic Cybersecurity Curriculum Optimization Method (DyCSCOM)

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
          August 2023
          1440 pages
          ISBN:9798400707728
          DOI:10.1145/3600160

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 August 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate228of451submissions,51%
        • Article Metrics

          • Downloads (Last 12 months)29
          • Downloads (Last 6 weeks)1

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format