Cybersecurity Awareness through Laboratories and Cyber Competitions in the Education System: Practices to Promote Student Success
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32807
Cybersecurity Awareness through Laboratories and Cyber Competitions in the Education System: Practices to Promote Student Success

Authors: Haydar Teymourlouei

Abstract:

Cybersecurity is one of the greatest challenges society faces in an age revolving around technological development. With cyber-attacks on the continuous rise, the nation needs to understand and learn ways that can prevent such attacks. A major contribution that can change the education system is to implement laboratories and competitions into academia. This method can improve and educate students with more hands-on exercises in a highly motivating setting. Considering the fact that students are the next generation of the nation’s workforce, it is important for students to understand concepts not only through books, but also through actual hands-on experiences in order for them to be prepared for the workforce. An effective cybersecurity education system is critical for creating a strong cyber secure workforce today and for the future. This paper emphasizes the need for awareness and the need for competitions and cybersecurity laboratories to be implemented into the education system.

Keywords: Awareness, competition, cybersecurity, laboratories, workforce.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1115322

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1449

References:


[1] Bucci, S. (2013). A congressional guide: Seven steps to U.S. Security, Prosperity, and Freedom in Cyberspace. Retrieved from http://www.heritage.org/research/reports/2013/04/a-congressional-guide-seven-steps-to-us-security-prosperity-and-freedom-in-cyberspace
[2] Florida center for cybersecurity. (2013). University of Florida, Retrieved from http://www.usf.edu/pdfs/final-cybersecurity-report.pdf
[3] Why is cyber security important. (2010). State of New Jersey. Retrieved from http://old.citationmachine.net/index2.php?reqstyleid=2&mode= form&reqsrcid=APAUnivDocOnline&srcCode=22&more=yes&nameCnt=1
[4] Ate Centers Impact 2014, Patton, Madeline, ED. Tempe, AZ: Maricopa Community Colleges, 2014. Retrieved from http://www.atecenters.org/ wpcontent/uploads/PDF/ATEIMPACT_2014.pdf.
[5] Wagner, P. (2006). A portable computer security workshop. University of Wisconsin, Retrieved from http://citeseerx.ist.psu.edu/viewdoc/ download?doi=10.1.1.101.9059&rep=rep1&type=pdf
[6] Cheung, R. (2011). Challenge based learning in cybersecurity education. Retrieved from http://josephcohen.com/papers/cbl.pdf.
[7] Spidalieri, F. (2014). Professionalizing cybersecurity: A path to universal standards and status. Retrieved from http://www.salve.edu/ sites/default/files/filesfield/documents/Professionalizing-Cybersecurity.pdf.
[8] D. W. Evans and C. L. Chatmon, “Increasing Minority Participation in Information Assurance,” in ITHET 6th Annual International Conference. Retrieved from http://ieeexplore.ieee.org/stamp/ stamp.jsp?arnumber=1560322
[9] Dahlberg, T. (2007). The stars leadership model for broadening participation in computing. Retrieved from http://www.uncg.edu/stars/ doc_stars/STARS Leadership Model.pdf
[10] Sommestad, T. (2012). Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments. Retrieved from http://www.sommestad.com/teodor/Filer/Sommestad,%20Hallberg%20-%202012%20-%20Cyber%20security%20exercises%20and%20competitions%20as%20a%20platform%20for%20cyber%20security%20experiments.pdf