Cybersecurity activities for education and curriculum design: A survey
Oct 21, 2024
DOI: https://doi.org/10.1016/j.chbr.2024.100501
Published in: Computers in Human Behavior Reports
Publisher: Elsevier
Cyber threats are one of the main concerns in this growing technology epoch. To tackle this issue, highly skilled and motivated cybersecurity professionals are increasingly in demand to prevent, detect, respond to, or even mitigate the effects of such threats. However, the world faces a workforce shortage of qualified cybersecurity professionals and practitioners. To address this dilemma, several cybersecurity educational programs have been introduced, such as specialized cybersecurity courses in computer science graduate programs. With the increasing demand, different cybersecurity courses are introduced at the high school level, undergraduate computer science and information systems programs, and even at the government level. Due to the peculiar nature of cybersecurity, educational institutions face many issues when designing a curriculum or cybersecurity activities. In this paper, we study existing cybersecurity curriculum approaches and activities. We also present case studies on cybersecurity education around the globe.
Other Researches
With the widespread use of renewable energy sources (RES) in the smart grid, the next generation power system, short-term load forecasting (STLF) is of critical importance in grid stability and energy optimization. Traditional STLF models include is...
LENS: Lightweight and Explainable LLM-Based APT Detection at the Edge for 6G Security
Expected to be deployed in the early 2030s, sixth-generation (6G) wireless networks, with their high speed and integration with cutting-edge technology such as intelligent edge computing, expand the attack surface and face serious cyber threat risks...
LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy
Sixth Generation (6G) wireless networks, which are expected to be deployed in the 2030s, have already created great excitement in academia and the private sector with their extremely high communication speed and low latency rates. However, despite t...
Unmanned Aerial Vehicles (UAVs) have been extensively used recently for wireless networks. However, such networks encounter several challenges that remain unsolved. In this paper, we address the issue of joint optimization of trajectory design and r...
Supervised methods of machine learning for email classification: a literature survey
In today’s digital landscape, email is acknowledged as a critical conduit for global data exchanges. With a surge in data volume, malefactors exploit user identities, leading to data misuse. Cybercriminals employ electronic transgressions such as ph...
Dynamic Resource Management for Cloud Spot Markets
Resource management for cloud computing environments that are characterized by many layers emerges as a critical task for cloud computing providers. Such providers are compelled by the demands and strategies of stochastic customers to adopt dynamic ...
Dynamic mobility load balancing for 5G small-cell networks based on utility functions
Deployment of small cells was introduced to support high data rate services and expand macro cell coverage for the envisioned 5G networks. A small cell network, which has a smaller size, along with the user equipment (UE) mobility, frequently underg...
Markov prediction model for host load detection and VM placement in live migration
The design of good host overload/underload detection and virtual machine (VM) placement algorithms plays a vital role in assuring the smoothness of VM live migration. The presence of the dynamic environment that leads to a changing load on the VMs m...
Soap-based vs. restful web services: A case study for multimedia conferencing
RESTful Web services are now emerging as an alternative to SOAP-based Web services and might be a more suitable choice in some cases. A comparison of two Web programming interfaces — the standard Parlay-X multimedia SOAP-based Web service and a REST...