The Future of Education

Edition 14

Accepted Abstracts

Education in Management of Cybersecurity

Nedko Tagarev, University of National and World Economy (Bulgaria)

Abstract

The problem presented in this article is the growing need for adequate and relevant cybersecurity education. Current trends placed cybersecurity and the upward trend in the use of smart technologies as the backbone of any business and management education. The education program and training have to cover the specific needs for management of cybersecurity. The program includes – computer security, network security, information technologies (IT) security, physical security, Internet security, security policy, management and business continuity. For training and analyses, we use cyber-attacks examples and real-life cases[1]. As a milestone, the author, use the cybersecurity in objects of critical infrastructure. These objects require specific cybersecurity measures and defence mechanisms. This education of management of cybersecurity provides the often forgotten “horizontal approach”[2] in cybersecurity. On the other side, in general, there is a need for adequate analyses – methods and methodology. The most frequently used, training methods are risk analyses[3], case studies and scenario analyses. Information security (IS) is part of cybersecurity education. Education in IS is based on most popular international standards such as ISO and NIST[4]. Education relies on Information security management system (ISMS)[5], cryptography, authentication methods and process analyses.

Keywords: Education, Cybersecurity, Management;

References:
[1] Н. Тагарев, “Д-р Недко Тагарев, УНСС: Всеки компютър е непрекъснато атакуван, в мрежата „плуват“ изключително голямо количество вредоносни софтуери – Радио Верига Фокус.”
[2] D. Dudenhoeffer et al., Computer Security for Nuclear Security Professionals. 2013.
[3] ISO, “ISO 31000 Risk management.” [Online]. Available: https://www.iso.org/iso-31000-risk-management.html. [Accessed: 15-Oct-2018].
[4] T. A. Allen, “NIST Special Publication 800-series General Information,” NIST, 21-May-2018. [Online]. Available: https://www.nist.gov/itl/nist-special-publication-800-series-general-information. [Accessed: 03-Dec-2018].
[5] “ISO/IEC 27000:2012(en), Information technology — Security techniques — Information security management systems — Overview and vocabulary.” [Online]. Available: https://www.iso.org/obp/ui/#iso:std:iso-iec:27000:ed-2:v1:en. [Accessed: 18-Nov-2018].

Back to the list

REGISTER NOW

Reserved area


Media Partners:

Click BrownWalker Press logo for the International Academic and Industry Conference Event Calendar announcing scientific, academic and industry gatherings, online events, call for papers and journal articles
Pixel - Via Luigi Lanzi 12 - 50134 Firenze (FI) - VAT IT 05118710481
    Copyright © 2024 - All rights reserved

Privacy Policy

Webmaster: Pinzani.it