SlideShare a Scribd company logo
R.C. Dodge Jr. and L. Futcher (Eds.): WISE 6, 7, and 8, IFIP AICT 406, pp. 164–171, 2013.
© IFIP International Federation for Information Processing 2013
Towards a Pervasive Information Assurance Security
Educational Model
for Information Technology Curricula
Lynn Futcher and Johan Van Niekerk
Nelson Mandela Metropolitan University, Port Elizabeth, South Africa
{Lynn.Futcher,Johan.VanNiekerk}@nmmu.ac.za
Abstract. Information Technology (IT) encompasses all aspects of computing
technology. The pervasiveness of IT over the past decade means that
information assurance and security (IAS) know-how has become increasingly
important for IT professionals worldwide. However, South African universities
do not get specific curriculum guidelines to ensure that all essential security-
related aspects are included in the IT courses offered. With respect to IAS, these
universities are therefore required to self-regulate through measuring against
international norms and standards. One such norm for the IT profession is given
by the ACM/IEEE-CS in the ‘Information Technology 2008, Curriculum
Guidelines for Undergraduate Degree Programs in Information Technology’
document. This paper examines this norm, together with relevant South African
curricula policy document, to establish what information security guidance
exists to support IT curriculum developers and educators. In addition, it argues
that an integrated educational IAS model can help address IAS as a pervasive
theme throughout IT curricula.
Keywords: Information security education, information assurance and security
model, IT curriculum.
1 Introduction
Over the past decades, four major organizations in the United States have developed
computing curricula guidelines for colleges and universities. These include the
Association for Computing Machinery (ACM), the Association for Information
Systems (AIS), the Association for Information Technology Professionals (AITP) and
the Computer Society of the Institute for Electrical and Electronic Engineers
(IEEE-CS).
The School of Information and Communication Technology (ICT) at the Nelson
Mandela Metropolitan University (NMMU) is responsible for educating Information
Technology (IT) professionals for tomorrow. However, it does not get specific
curriculum guidelines to ensure that all essential security-related aspects are included
in the IT courses offered. The South African curricula guidelines for IT qualifications
[1,2,3,4] dictate the instructional offerings which need to be incorporated at each level
Towards a Pervasive Information Assurance Security Educational Model 165
of the curricula. However, they do not provide in-depth guidance with respect to
recommended content. As a South African university, the NMMU is therefore
required to self-regulate through measuring against international norms and standards.
One such norm for the computing profession is provided by the ACM/AIS/IEEE-CS
Computing Curricula 2005 [5]. More specifically, such a norm for the IT profession is
offered by the ACM/IEEE-CS in the ‘Information Technology 2008, Curriculum
Guidelines for Undergraduate Degree Programs in Information Technology’
document [6].
The purpose of this paper is to argue that the ACM/IEEE-CS and the South African
Council for Higher Education (CHE) curricula guidelines do not provide sufficient
guidance to ensure that information security is adequately incorporated within the IT
curricula of the School of ICT, NMMU. In addition, it proposes an integrated IAS
educational model to help address IAS as a pervasive theme throughout IT curricula.
The following sections discuss these guidelines and the extent to which they
support IT curriculum developers and educators at South African universities. This is
followed by some critical comments and recommendations in this regard.
2 ACM/IEEE-CS Curriculum Guidelines for Undergraduate
Degree Programs in Information Technology
IT is the latest academic discipline covered by the ACM/AIS/IEEE-CS Computing
Curricula volumes [5,6]. According to ACM/IEEE-CS, the pillars of IT include
programming, networking, human-computer interaction, databases, and web systems.
These are built on a foundation of knowledge of the fundamentals of IT. Overarching
the entire foundation and pillars are information assurance and security, and
professionalism [6].
The ACM/IEEE-CS’s ‘Information Technology 2008, Ccurriculum Guidelines for
Undergraduate Degree Programs in IT’ [6] presents a curriculum for a 4-year study
in IT. In so doing, it defines an IT body of knowledge that spans 13 knowledge areas.
Information Assurance and Security (IAS) is one of these knowledge areas. These
knowledge areas are further divided into smaller units, each of which represents
individual themes within the respective areas. At the lowest level of the hierarchy,
each unit is subdivided into a set of relevant topics.
IAS as a knowledge area is well defined by the ACM/IEEE-CS [6] curricula
guidelines. It is recognised as a very integrative knowledge area and one in which all
senior IT students should be involved. ACM/IEEE-CS specifically states that ‘every
student should be involved with some of the advanced security outcomes’ and that
‘every student needs some advanced, integrative experience in IAS in the 4th
year’. As
a knowledge area, it is divided into various units including Fundamental Aspects,
Security Mechanisms, Operational Issues, Policy, Attacks, Security Domains,
Forensics, Information States, Security Services, Threat Analysis Model and
Vulnerabilities. Approximately 7.5% of the total core hours defined for the 4-year
curriculum should be allocated to IAS. However, since much of the content listed by
IAS as a knowledge area may be regarded as primarily aimed at 4th
year level, there is
166 L. Futcher and J. Van Niekerk
a concern that some university curricula may only address security-related issues at
this level. In addition, at some universities it may be regarded as an elective since it is
a specialized field of study.
The ACM/IEEE-CS [6] addresses this concern to a certain extent since various
security units and topics are defined within other knowledge areas. In general, the
knowledge areas of IT Fundamentals (ITF), Information Assurance and Security
(IAS), Information Management (IM), Integrative Programming and Technologies
(IPT), Networking (NET), Platform Technologies (PT), System Administration and
Maintenance (SA), Social and Professional Issues (SP) and Web Systems and
Technologies (WS) all address some aspects of information assurance and security.
For example, software security practices lies within the Integrative Programming and
Technologies (IPT) knowledge area and a security unit is defined for the Networking
(NET) knowledge area. In addition, Vulnerabilities is listed as a unit within the Web
Systems and Technologies (WS) knowledge area. However, the knowledge areas of
Human Computer Interaction (HCI), Mathematics and Statistics for IT (MS),
Programming Fundamentals (PF) and System Integration and Architecture (SIA)
contain no security-related aspects.
ACM/IEEE-CS [6] also addresses IAS as a pervasive theme as discussed in the
following section.
3 IAS as a Pervasive Theme
In addition to having been defined as a key knowledge area, IAS has also been
defined as a pervasive theme. ACM/IEEE-CS [6] describes a pervasive theme as
those topics which are ‘considered essential, but that did not seem to belong in a
single specific knowledge area or unit’. These themes should therefore be woven into
the curriculum by being addressed numerous times and in multiple classes [6]. The
pervasive themes of the IT curriculum are described under IT Fundamentals (ITF).
The ACM/IEEE-CS [6] states that all the IT pervasive themes be covered by the end
of the 4-year curriculum and that they must be addressed frequently from 1st
to 4th
year. However, although IAS is defined as both a knowledge area and a pervasive
theme, at some universities it may be overlooked until the 4th
year.
According to the IT body of knowledge, as defined by the ACM/IEEE-CS [6], IT
Fundamentals (ITF) should take up approximately 8% of the core hours as indicated
in the IT curriculum. Of this 8%, ‘Pervasive Themes in IT’ should present
approximately 68% which equates to roughly 5.5% of the total core hours defined for
the 4-year curriculum. However, no further breakdown is provided as to how much
time should be allocated to IAS as a pervasive theme. This means that other topics
within the ‘Pervasive Themes in IT’ unit may be given preference over IAS. This may
lead to an IT graduate leaving university with apparent gaps in their security-related
knowledge.
According to the IT curricula guidelines of the ACM/IEEE-CS [6], the IT
Fundamentals (ITF) knowledge area is intended to be at the introductory level in a
curriculum. The purpose of the ITF knowledge area is to develop fundamental skills
Towards a Pervasive Information Assurance Security Educational Model 167
for subsequent courses by providing an overview of the IT discipline and how it
relates to other disciplines. In so doing, it should instill an IT mindset that helps IT
students understand the diverse contexts in which IT is used [6].
The ITF knowledge area is divided into four units. These units include ‘Pervasive
Themes in IT’, ‘History of IT’, ‘IT and its Related and Informing Disciplines’ and
‘Application Domains’. IAS is further listed as a topic within the ‘Pervasive Themes
in IT’ unit. Linked to IAS as a topic is the core learning outcome which is stated as -
‘Explain why the IAS perspective needs to pervade all aspects of IT’.
Many South African universities use these guidelines provided by ACM/IEEE-CS
as an informal reference when creating IT curricula. However, it is the opinion of the
authors that these guidelines do not adequately address IAS as a pervasive theme and
that no further guidance exists to assist IT educators in developing curricula to ensure
that IAS is effectively integrated into the curriculum at undergraduate level. In
support of this argument, Futcher, Schroder and Von Solms [7] question the extent to
which information security is incorporated into the IT/IS/CS curricula at South
African universities. They raise the concern that information security is not being
addressed adequately at undergraduate level and suggest that information security be
defined as a critical cross field outcome (CCFO) in South African curricula
guidelines. This implies that security-related aspects be integrated into the IT/IS/CS
curricula from the 1st
year of study. In line with this, the following section provides a
critical evaluation of current South African curricula guidelines [1,2,3,4] against the
ACM/IEEE-CS [6] guidelines.
4 A Critical Evaluation of South African Curricula Guidelines
Against the ACM/IEEE-CS
The South African Council for Higher Education (CHE) provides guidance to tertiary
institutions regarding curriculum composition. This guidance currently resides in
documents from the Higher Education Qualifications Framework (HEQF), the South
African Qualifications Authority (SAQA) and the National Assembly Training and
Education Department (NATED). This section examines the guidance provided by the
CHE specific to IT qualifications [1,2,3,4] in order to critically evaluate it against the
ACM/IEEE-CS [6] curriculum guidelines. The aim is to identify possible weaknesses
and areas for improvement with respect to integrating information security into IT
curricula.
The HEQF is a qualifications framework for a single coordinated higher education
sector. It applies to all higher education programmes and qualifications offered in
South Africa by public and/or private institutions. As such, it replaces previous policy
documents including ‘A Qualification Structure for Universities in South Africa -
NATED Report 116 (99/02)’, ‘General Policy for Technikon Instructional
Programmes - NATED Report 150 (97/01)’ and the ‘Formal Technikon Instructional
Programmes in the RSA - NATED Report 151 (99/01)’. However, some relevant
curricula information still resides in the NATED documents.
The NATED Report 151 specifies instructional offerings for a National Diploma
[2] and Bachelor of Technology in Information Technology [1]. Although no specific
168 L. Futcher and J. Van Niekerk
security-related offerings are stipulated for the National Diploma [2], Computer
Security IV and Information Security IV are specified for the Bachelor of Technology
[1] qualification. However, these two offerings are not compulsory in any of the nine
specialised IT fields as defined by SAQA [3,4]. These IT fields include Business
Applications, Software Development, Communication Networks, Web and
Application Development, Information Systems and Technology Management,
Intelligent Industrial Systems, Support Services, Technical Applications and
Hardware and Computer Architecture.
None of these IT fields have any security-related exit level outcomes nor specific
outcomes identified for the SAQA registered National Diploma in IT [4]. For all nine IT
fields, the SAQA registered Bachelor of Technology in IT qualification [3] defines a
security-related exit level outcome that states that ‘the qualifying learner should have the
ability to apply advanced techniques in the introduction and control of information
security in an IT environment’. However, this is only stipulated as being core for the
Business Applications field and as an elective for the other eight IT fields. Linked to this
exit level outcome is the associated assessment criterion ‘Evaluate the information
security environment and design control measures’. This poses a major concern with
respect to addressing IAS as a pervasive theme within South African IT curricula.
In comparison, the ACM/IEEE-CS’s curriculum guidelines [6] offers an excellent
baseline from which to develop a 4-year IT curriculum. Specifically, at the 4th
year
level it recommends the inclusion of IAS as an advanced subject area and it provides
very clear guidelines on the topics such an instructional offering should be covering
[6]. However, specific guidance on how to incorporate security concepts as a
pervasive theme during the first three years of study, and as part of the remaining 4th
year subjects, is lacking.
This could lead to potential problems at several different levels. Firstly, the
structure of the 4-year IT curriculum at the NMMU, and several other similar South
African universities, is such that the 4th
year of study forms part of an optional, more
advanced, qualification [1]. It is thus possible for a student to exit the qualification
after the 3rd
year of study. Secondly, even for students who do decide to enroll in the
optional 4th
year qualification, the “Information Security” instructional offering is not
considered compulsory in the South African curriculum guidelines, and is thus an
elective subject [1]. Students could thus elect to not receive the requisite information
security education. This means that the lack of specific guidance on how information
security-related concepts should be incorporated as a pervasive theme into the
curricula of subjects during the first three years of study could lead to IT curricula that
do not adequately address information security, despite the relative importance
assigned to this topic by the ACM/IEEE-CS’s [6] curriculum guidelines.
Even though it cannot reasonably be expected from the ACM/IEEE-CS to provide
subject specific guidance on these topics, it could be argued that a minimum
“standard” for each topic area could be more clearly delineated by the curricula
guidelines. Such delineation could possibly be done with the assistance of the
information assurance model suggested in the ACM/IEEE-CS guidelines [6], to
provide the context for information security knowledge, and the use of a learning
taxonomy like Bloom’s taxonomy, as suggested by Van Niekerk & Von Solms [8] to
provide guidance on the “depth” of topic coverage at a specific year of study.
Towards a Pervasive Information Assurance Security Educational Model 169
As an example it could be argued that the topic of “buffer overflow
attacks/prevention” should not simply be relegated to form part of an optional 4th
year
subject. Instead it should be integrated into programming subjects throughout the
qualification. Thus, with the help of a learning taxonomy, like Bloom’s, specific
learning objectives could be defined which requires learners at the 1st
and 2nd
years of
study to remember and understand material relating to this topic, and which
requires 3rd
year students to be able to apply the relevant knowledge.
This integration of the topic into the programming curriculum could also provide
security context through the incorporation of the suggested information assurance
model. Relevant topics could thus still refer to the underlying information states,
security services and/or security countermeasures relevant to the context in which
these topics are being taught. Table 1 provides brief examples of sample learning
activities for the topic of “buffer overflow attacks/prevention” for the lowest three
levels of Bloom’s taxonomy only. Similar examples could also be constructed for the
remaining levels but were omitted due to space constraints.
Table 1. Abbreviated example of Learning Activities based on Bloom's Taxonomy for
Information Security, adapted from Anderson, et al. [9]
Level Verb Sample Activities
Apply execute Write error prevention code to ensure that your
methods iterating through the given list of stored items
cannot overstep the boundaries of this list. (Security
Countermeasure)
Understand discuss Explain how the integrity of the data in the computer’s
memory could be negatively affected if your code tries
to access an array element outside the boundaries of
the current array. (Security Services)
Remember define In terms of the underlying memory used/allocated,
define what an array of 32 bit integers is. (Information
States)
The information assurance model suggested by ACM/IEEE-CS [6] can also be
adapted to reflect this incorporation of Bloom’s taxonomy into the intended
curriculum design process. Such an adaptation is illustrated in Figure 1. This is
similar to an earlier adaptation by Maconachy, Schou, Ragsdale & Welch [10], where
“Time” was added as a fourth dimension to the model. The addition of a time
dimension was not used as “a causal agent of change, but a confounding change
agent” [10]. This catered for the need to modify other dimensions to cater for new
technologies which are introduced over time.
The adaptation depicted in Figure 1 similarly is not a causal agent, but rather
serves to illustrate the increasing “depth” of the student learner’s mastery of the
underlying, pervasive security concepts, in terms of Bloom’s taxonomy, as such a
student progresses through his/her studies. A student might therefore initially only
deal with a specific concept at the “remember” dimension of the cognitive domain but
should, over time, progress towards the “create” dimension.
170 L. Futcher and J. Van Niekerk
Fig. 1. Model for Pervasive Information Assurance and Security Education (adapted from
Maconachy, Schou, Ragsdale, Welch [10])
Weaving many of the IAS concepts into the curriculum provides challenges unique
to the IT profession. It is this challenge which this proposed model for pervasive
information assurance and security education, as depicted in Figure 1, could help to
address.
5 Conclusion
Although the ACM/IEEE-CS advocates IAS both as a knowledge area and as a
pervasive theme, there is little guidance provided with respect to assisting IT
educators in incorporating information security as a pervasive theme into their various
offerings. More guidance should be given by either the ACM/IEEE or at national
level with respect to IAS as a pervasive theme. In order to integrate IAS pervasively
into IT curricula, it would be sensible to use a learning taxonomy to “phase in”
concepts. By utilizing the proposed pervasive information assurance and security
model for IT education, curriculum developers and educators can determine the
fundamental, core and elective security-related aspects to be incorporated from the 1st
to the 4th
year of the IT qualification. Whereas fundamental aspects should form the
essential basis required for the proposed qualification, core aspects should include the
compulsory learning required in situations contextually relevant to the particular
instructional offering. Elective aspects should include any additional optional
security-related aspects that could enhance the qualification. Incorporation of the
Towards a Pervasive Information Assurance Security Educational Model 171
proposed model could benefit the guidelines provided by both the ACM/IEEE-CS and
the CHE.
Finally, CHE does not provide detailed subject level guidelines. It is the authors’
opinion that IT educators in South Africa could benefit from formally adopting
ACM/IEEE-CS guidelines since extensive guidance is provided. However, from a
security perspective the authors believe that even more guidance specific to the
incorporation of security as a pervasive theme is needed. However, future research is
required to determine whether security-related aspects are specified within
institutional learning programme guidelines.
References
1. South African Council for Higher Education (CHE), Nated Document 151: Baccalaureus
Technologiae: Information Technology (2005)
2. South African Council for Higher Education (CHE), Nated Document 151: National
Diploma: Information Technology (2005)
3. South African Qualifications Authority (SAQA), Registered Qualification: Bachelor of
Technology: Information Technology, (2007), http://regqs.saqa.org.za
4. South African Qualifications Authority (SAQA), Registered Qualification: National
Diploma: Information Technology (2007), http://regqs.saqa.org.za
5. ACM, AIS & IEEE-CS, Computing Curricula 2005: The Overview Report (2005)
6. ACM & IEEE-CS, Information Technology 2008: Curriculum Guidelines for
Undergraduate Degree Programs in Information Technology (2008)
7. Futcher, L., Schroder, C., Von Solms, R.: Information security education in South Africa.
Information Management & Computer Security 18(5), 366–374 (2010)
8. Van Niekerk, J., Von Solms, R.: Using Bloom’s taxonomy for information security
education. In: Education and Technology for a Better World. 9th IFIP TC 3 World
Conference on Computers in Education, WCCE 2009, Bento Goncalves, Brazil (July
2009)
9. Anderson, L., Krathwohl, D., Airasian, P., Cruikshank, K., Mayer, R., Pintrich, P., Raths,
J., Wittrock, M.: A Taxonomy for Learning, Teaching, and Assessing: A Revision of
Bloom’s Taxonomy of Educational Objectives, Complete Edition. Longman (2001)
10. Maconachy, W.V., Schou, C.D., Ragsdale, D., Welch, D.: A Model for Information
Assurance: An Integrated Approach. In: Proceedings of the 2001 IEEE Workshop on IAS.
United States Military Academy, West Point (2001)

More Related Content

What's hot

Security and personnel
Security and personnelSecurity and personnel
Security and personnel
Dhani Ahmad
 
Alccs brochure
Alccs brochureAlccs brochure
Alccs brochure
Sachin Desai
 
Utilization of Information Technology Among Higher Educational Institutions R...
Utilization of Information Technology Among Higher Educational Institutions R...Utilization of Information Technology Among Higher Educational Institutions R...
Utilization of Information Technology Among Higher Educational Institutions R...
Jo Balucanag - Bitonio
 
PMD admit webinar 5.25.2021
PMD admit webinar 5.25.2021PMD admit webinar 5.25.2021
PMD admit webinar 5.25.2021
KevinAlt1
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
IOSR Journals
 
Heino Tiina
Heino TiinaHeino Tiina
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSDEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
IAEME Publication
 
Webster University USA by Study Metro
Webster University USA by Study MetroWebster University USA by Study Metro
Webster University USA by Study Metro
Abhishek Bajaj
 
Determining the core part of software development curriculum applying associa...
Determining the core part of software development curriculum applying associa...Determining the core part of software development curriculum applying associa...
Determining the core part of software development curriculum applying associa...
csandit
 
50120140506012 2-3
50120140506012 2-350120140506012 2-3
50120140506012 2-3
IAEME Publication
 
Computer Based Career
Computer Based CareerComputer Based Career
Computer Based Career
h1019zzang
 
Data Visualization and Analysis of Engineering Educational Statisticsx
Data Visualization and Analysis of Engineering Educational StatisticsxData Visualization and Analysis of Engineering Educational Statisticsx
Data Visualization and Analysis of Engineering Educational Statisticsx
IJAAS Team
 
Career Cartography - Careers in IT
Career Cartography - Careers in ITCareer Cartography - Careers in IT
Career Cartography - Careers in IT
Karim Wallani
 
NITG-placement brochure 2016-17
NITG-placement brochure 2016-17NITG-placement brochure 2016-17
NITG-placement brochure 2016-17
Akash Kotha
 
ITSS course spec
ITSS course specITSS course spec
ITSS course spec
Abdulaziz Almass
 
Goa university prospectus 2016 17 educationiconnect.com 7862004786
Goa university prospectus 2016 17 educationiconnect.com 7862004786Goa university prospectus 2016 17 educationiconnect.com 7862004786
Goa university prospectus 2016 17 educationiconnect.com 7862004786
00007123
 
Competency model for
Competency model forCompetency model for
Competency model for
csandit
 

What's hot (17)

Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Alccs brochure
Alccs brochureAlccs brochure
Alccs brochure
 
Utilization of Information Technology Among Higher Educational Institutions R...
Utilization of Information Technology Among Higher Educational Institutions R...Utilization of Information Technology Among Higher Educational Institutions R...
Utilization of Information Technology Among Higher Educational Institutions R...
 
PMD admit webinar 5.25.2021
PMD admit webinar 5.25.2021PMD admit webinar 5.25.2021
PMD admit webinar 5.25.2021
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
Heino Tiina
Heino TiinaHeino Tiina
Heino Tiina
 
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSDEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
 
Webster University USA by Study Metro
Webster University USA by Study MetroWebster University USA by Study Metro
Webster University USA by Study Metro
 
Determining the core part of software development curriculum applying associa...
Determining the core part of software development curriculum applying associa...Determining the core part of software development curriculum applying associa...
Determining the core part of software development curriculum applying associa...
 
50120140506012 2-3
50120140506012 2-350120140506012 2-3
50120140506012 2-3
 
Computer Based Career
Computer Based CareerComputer Based Career
Computer Based Career
 
Data Visualization and Analysis of Engineering Educational Statisticsx
Data Visualization and Analysis of Engineering Educational StatisticsxData Visualization and Analysis of Engineering Educational Statisticsx
Data Visualization and Analysis of Engineering Educational Statisticsx
 
Career Cartography - Careers in IT
Career Cartography - Careers in ITCareer Cartography - Careers in IT
Career Cartography - Careers in IT
 
NITG-placement brochure 2016-17
NITG-placement brochure 2016-17NITG-placement brochure 2016-17
NITG-placement brochure 2016-17
 
ITSS course spec
ITSS course specITSS course spec
ITSS course spec
 
Goa university prospectus 2016 17 educationiconnect.com 7862004786
Goa university prospectus 2016 17 educationiconnect.com 7862004786Goa university prospectus 2016 17 educationiconnect.com 7862004786
Goa university prospectus 2016 17 educationiconnect.com 7862004786
 
Competency model for
Competency model forCompetency model for
Competency model for
 

Similar to 10.1007%2 f978 3-642-39377-8-18

A Proposal of National Higher Education Student Information System Infrastruc...
A Proposal of National Higher Education Student Information System Infrastruc...A Proposal of National Higher Education Student Information System Infrastruc...
A Proposal of National Higher Education Student Information System Infrastruc...
IRJET Journal
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
ijfcstjournal
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
ijfcstjournal
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-government
Editor IJCATR
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
katherncarlyle
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
daniahendric
 
Information Security Assessment Dammam Technical College MSIS .docx
Information Security Assessment Dammam Technical College MSIS .docxInformation Security Assessment Dammam Technical College MSIS .docx
Information Security Assessment Dammam Technical College MSIS .docx
jaggernaoma
 
What Is Dod Directive 8570 And How Does It Benefit Me?
What Is Dod Directive 8570 And How Does It Benefit Me?What Is Dod Directive 8570 And How Does It Benefit Me?
What Is Dod Directive 8570 And How Does It Benefit Me?
Jeteye Enterprises Inc.
 
Supervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projectsSupervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projects
Arun Singh
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
ijseajournal
 
Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...
theijes
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
florriezhamphrey3065
 
2014 ASEE NCS Conf_Paper 72_02152014 (1)
2014 ASEE NCS Conf_Paper 72_02152014 (1)2014 ASEE NCS Conf_Paper 72_02152014 (1)
2014 ASEE NCS Conf_Paper 72_02152014 (1)
Atul Khiste
 
A Live Virtual Simulator for Teaching Cybersecurity
A Live Virtual Simulator for Teaching CybersecurityA Live Virtual Simulator for Teaching Cybersecurity
A Live Virtual Simulator for Teaching Cybersecurity
saman zaker
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
Mohammed Mahfouz Alhassan
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
DETERMINING THE CORE PART OF SOFTWARE DEVELOPMENT CURRICULUM APPLYING ASSOCIA...
DETERMINING THE CORE PART OF SOFTWARE DEVELOPMENT CURRICULUM APPLYING ASSOCIA...DETERMINING THE CORE PART OF SOFTWARE DEVELOPMENT CURRICULUM APPLYING ASSOCIA...
DETERMINING THE CORE PART OF SOFTWARE DEVELOPMENT CURRICULUM APPLYING ASSOCIA...
cscpconf
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Seungjoo Kim
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
iaemedu
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
IAEME Publication
 

Similar to 10.1007%2 f978 3-642-39377-8-18 (20)

A Proposal of National Higher Education Student Information System Infrastruc...
A Proposal of National Higher Education Student Information System Infrastruc...A Proposal of National Higher Education Student Information System Infrastruc...
A Proposal of National Higher Education Student Information System Infrastruc...
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSCAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
 
Design and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-governmentDesign and Implementation Security Model for Sudanese E-government
Design and Implementation Security Model for Sudanese E-government
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
 
Information Security Assessment Dammam Technical College MSIS .docx
Information Security Assessment Dammam Technical College MSIS .docxInformation Security Assessment Dammam Technical College MSIS .docx
Information Security Assessment Dammam Technical College MSIS .docx
 
What Is Dod Directive 8570 And How Does It Benefit Me?
What Is Dod Directive 8570 And How Does It Benefit Me?What Is Dod Directive 8570 And How Does It Benefit Me?
What Is Dod Directive 8570 And How Does It Benefit Me?
 
Supervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projectsSupervising undergraduate-cybersecurity-projects
Supervising undergraduate-cybersecurity-projects
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...Challenges to the Implementation of Information Technology Risk Management an...
Challenges to the Implementation of Information Technology Risk Management an...
 
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docxStrategic HRM Plan Grading GuideHRM498 Version 42.docx
Strategic HRM Plan Grading GuideHRM498 Version 42.docx
 
2014 ASEE NCS Conf_Paper 72_02152014 (1)
2014 ASEE NCS Conf_Paper 72_02152014 (1)2014 ASEE NCS Conf_Paper 72_02152014 (1)
2014 ASEE NCS Conf_Paper 72_02152014 (1)
 
A Live Virtual Simulator for Teaching Cybersecurity
A Live Virtual Simulator for Teaching CybersecurityA Live Virtual Simulator for Teaching Cybersecurity
A Live Virtual Simulator for Teaching Cybersecurity
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
DETERMINING THE CORE PART OF SOFTWARE DEVELOPMENT CURRICULUM APPLYING ASSOCIA...
DETERMINING THE CORE PART OF SOFTWARE DEVELOPMENT CURRICULUM APPLYING ASSOCIA...DETERMINING THE CORE PART OF SOFTWARE DEVELOPMENT CURRICULUM APPLYING ASSOCIA...
DETERMINING THE CORE PART OF SOFTWARE DEVELOPMENT CURRICULUM APPLYING ASSOCIA...
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 
A model based security requirements engineering framework
A model based security requirements engineering frameworkA model based security requirements engineering framework
A model based security requirements engineering framework
 

More from Ornrutai

Din6
Din6Din6
Din6
Ornrutai
 
Din 1
Din 1Din 1
Din 1
Ornrutai
 
10.1007%2 f978 0-387-34844-5-49
10.1007%2 f978 0-387-34844-5-4910.1007%2 f978 0-387-34844-5-49
10.1007%2 f978 0-387-34844-5-49
Ornrutai
 
10.1007%2 f978 0-387-34839-1-12
10.1007%2 f978 0-387-34839-1-1210.1007%2 f978 0-387-34839-1-12
10.1007%2 f978 0-387-34839-1-12
Ornrutai
 
10.1007%2 f0 387-25590-7-25
10.1007%2 f0 387-25590-7-2510.1007%2 f0 387-25590-7-25
10.1007%2 f0 387-25590-7-25
Ornrutai
 
Ej1148601
Ej1148601Ej1148601
Ej1148601
Ornrutai
 
Ej1133000
Ej1133000Ej1133000
Ej1133000
Ornrutai
 
Ej1114547
Ej1114547Ej1114547
Ej1114547
Ornrutai
 
Abstract
Abstract Abstract
Abstract
Ornrutai
 
6
66
5
55
4
44
Journal techno 3
Journal techno 3Journal techno 3
Journal techno 3
Ornrutai
 
Journal techno 1
Journal techno 1Journal techno 1
Journal techno 1
Ornrutai
 
Journal 2
Journal 2 Journal 2
Journal 2
Ornrutai
 
Learning force p5
Learning force p5Learning force p5
Learning force p5
Ornrutai
 
Ornrutai ph m ed4 no1
Ornrutai ph m ed4 no1Ornrutai ph m ed4 no1
Ornrutai ph m ed4 no1
Ornrutai
 

More from Ornrutai (17)

Din6
Din6Din6
Din6
 
Din 1
Din 1Din 1
Din 1
 
10.1007%2 f978 0-387-34844-5-49
10.1007%2 f978 0-387-34844-5-4910.1007%2 f978 0-387-34844-5-49
10.1007%2 f978 0-387-34844-5-49
 
10.1007%2 f978 0-387-34839-1-12
10.1007%2 f978 0-387-34839-1-1210.1007%2 f978 0-387-34839-1-12
10.1007%2 f978 0-387-34839-1-12
 
10.1007%2 f0 387-25590-7-25
10.1007%2 f0 387-25590-7-2510.1007%2 f0 387-25590-7-25
10.1007%2 f0 387-25590-7-25
 
Ej1148601
Ej1148601Ej1148601
Ej1148601
 
Ej1133000
Ej1133000Ej1133000
Ej1133000
 
Ej1114547
Ej1114547Ej1114547
Ej1114547
 
Abstract
Abstract Abstract
Abstract
 
6
66
6
 
5
55
5
 
4
44
4
 
Journal techno 3
Journal techno 3Journal techno 3
Journal techno 3
 
Journal techno 1
Journal techno 1Journal techno 1
Journal techno 1
 
Journal 2
Journal 2 Journal 2
Journal 2
 
Learning force p5
Learning force p5Learning force p5
Learning force p5
 
Ornrutai ph m ed4 no1
Ornrutai ph m ed4 no1Ornrutai ph m ed4 no1
Ornrutai ph m ed4 no1
 

Recently uploaded

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 

Recently uploaded (20)

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 

10.1007%2 f978 3-642-39377-8-18

  • 1. R.C. Dodge Jr. and L. Futcher (Eds.): WISE 6, 7, and 8, IFIP AICT 406, pp. 164–171, 2013. © IFIP International Federation for Information Processing 2013 Towards a Pervasive Information Assurance Security Educational Model for Information Technology Curricula Lynn Futcher and Johan Van Niekerk Nelson Mandela Metropolitan University, Port Elizabeth, South Africa {Lynn.Futcher,Johan.VanNiekerk}@nmmu.ac.za Abstract. Information Technology (IT) encompasses all aspects of computing technology. The pervasiveness of IT over the past decade means that information assurance and security (IAS) know-how has become increasingly important for IT professionals worldwide. However, South African universities do not get specific curriculum guidelines to ensure that all essential security- related aspects are included in the IT courses offered. With respect to IAS, these universities are therefore required to self-regulate through measuring against international norms and standards. One such norm for the IT profession is given by the ACM/IEEE-CS in the ‘Information Technology 2008, Curriculum Guidelines for Undergraduate Degree Programs in Information Technology’ document. This paper examines this norm, together with relevant South African curricula policy document, to establish what information security guidance exists to support IT curriculum developers and educators. In addition, it argues that an integrated educational IAS model can help address IAS as a pervasive theme throughout IT curricula. Keywords: Information security education, information assurance and security model, IT curriculum. 1 Introduction Over the past decades, four major organizations in the United States have developed computing curricula guidelines for colleges and universities. These include the Association for Computing Machinery (ACM), the Association for Information Systems (AIS), the Association for Information Technology Professionals (AITP) and the Computer Society of the Institute for Electrical and Electronic Engineers (IEEE-CS). The School of Information and Communication Technology (ICT) at the Nelson Mandela Metropolitan University (NMMU) is responsible for educating Information Technology (IT) professionals for tomorrow. However, it does not get specific curriculum guidelines to ensure that all essential security-related aspects are included in the IT courses offered. The South African curricula guidelines for IT qualifications [1,2,3,4] dictate the instructional offerings which need to be incorporated at each level
  • 2. Towards a Pervasive Information Assurance Security Educational Model 165 of the curricula. However, they do not provide in-depth guidance with respect to recommended content. As a South African university, the NMMU is therefore required to self-regulate through measuring against international norms and standards. One such norm for the computing profession is provided by the ACM/AIS/IEEE-CS Computing Curricula 2005 [5]. More specifically, such a norm for the IT profession is offered by the ACM/IEEE-CS in the ‘Information Technology 2008, Curriculum Guidelines for Undergraduate Degree Programs in Information Technology’ document [6]. The purpose of this paper is to argue that the ACM/IEEE-CS and the South African Council for Higher Education (CHE) curricula guidelines do not provide sufficient guidance to ensure that information security is adequately incorporated within the IT curricula of the School of ICT, NMMU. In addition, it proposes an integrated IAS educational model to help address IAS as a pervasive theme throughout IT curricula. The following sections discuss these guidelines and the extent to which they support IT curriculum developers and educators at South African universities. This is followed by some critical comments and recommendations in this regard. 2 ACM/IEEE-CS Curriculum Guidelines for Undergraduate Degree Programs in Information Technology IT is the latest academic discipline covered by the ACM/AIS/IEEE-CS Computing Curricula volumes [5,6]. According to ACM/IEEE-CS, the pillars of IT include programming, networking, human-computer interaction, databases, and web systems. These are built on a foundation of knowledge of the fundamentals of IT. Overarching the entire foundation and pillars are information assurance and security, and professionalism [6]. The ACM/IEEE-CS’s ‘Information Technology 2008, Ccurriculum Guidelines for Undergraduate Degree Programs in IT’ [6] presents a curriculum for a 4-year study in IT. In so doing, it defines an IT body of knowledge that spans 13 knowledge areas. Information Assurance and Security (IAS) is one of these knowledge areas. These knowledge areas are further divided into smaller units, each of which represents individual themes within the respective areas. At the lowest level of the hierarchy, each unit is subdivided into a set of relevant topics. IAS as a knowledge area is well defined by the ACM/IEEE-CS [6] curricula guidelines. It is recognised as a very integrative knowledge area and one in which all senior IT students should be involved. ACM/IEEE-CS specifically states that ‘every student should be involved with some of the advanced security outcomes’ and that ‘every student needs some advanced, integrative experience in IAS in the 4th year’. As a knowledge area, it is divided into various units including Fundamental Aspects, Security Mechanisms, Operational Issues, Policy, Attacks, Security Domains, Forensics, Information States, Security Services, Threat Analysis Model and Vulnerabilities. Approximately 7.5% of the total core hours defined for the 4-year curriculum should be allocated to IAS. However, since much of the content listed by IAS as a knowledge area may be regarded as primarily aimed at 4th year level, there is
  • 3. 166 L. Futcher and J. Van Niekerk a concern that some university curricula may only address security-related issues at this level. In addition, at some universities it may be regarded as an elective since it is a specialized field of study. The ACM/IEEE-CS [6] addresses this concern to a certain extent since various security units and topics are defined within other knowledge areas. In general, the knowledge areas of IT Fundamentals (ITF), Information Assurance and Security (IAS), Information Management (IM), Integrative Programming and Technologies (IPT), Networking (NET), Platform Technologies (PT), System Administration and Maintenance (SA), Social and Professional Issues (SP) and Web Systems and Technologies (WS) all address some aspects of information assurance and security. For example, software security practices lies within the Integrative Programming and Technologies (IPT) knowledge area and a security unit is defined for the Networking (NET) knowledge area. In addition, Vulnerabilities is listed as a unit within the Web Systems and Technologies (WS) knowledge area. However, the knowledge areas of Human Computer Interaction (HCI), Mathematics and Statistics for IT (MS), Programming Fundamentals (PF) and System Integration and Architecture (SIA) contain no security-related aspects. ACM/IEEE-CS [6] also addresses IAS as a pervasive theme as discussed in the following section. 3 IAS as a Pervasive Theme In addition to having been defined as a key knowledge area, IAS has also been defined as a pervasive theme. ACM/IEEE-CS [6] describes a pervasive theme as those topics which are ‘considered essential, but that did not seem to belong in a single specific knowledge area or unit’. These themes should therefore be woven into the curriculum by being addressed numerous times and in multiple classes [6]. The pervasive themes of the IT curriculum are described under IT Fundamentals (ITF). The ACM/IEEE-CS [6] states that all the IT pervasive themes be covered by the end of the 4-year curriculum and that they must be addressed frequently from 1st to 4th year. However, although IAS is defined as both a knowledge area and a pervasive theme, at some universities it may be overlooked until the 4th year. According to the IT body of knowledge, as defined by the ACM/IEEE-CS [6], IT Fundamentals (ITF) should take up approximately 8% of the core hours as indicated in the IT curriculum. Of this 8%, ‘Pervasive Themes in IT’ should present approximately 68% which equates to roughly 5.5% of the total core hours defined for the 4-year curriculum. However, no further breakdown is provided as to how much time should be allocated to IAS as a pervasive theme. This means that other topics within the ‘Pervasive Themes in IT’ unit may be given preference over IAS. This may lead to an IT graduate leaving university with apparent gaps in their security-related knowledge. According to the IT curricula guidelines of the ACM/IEEE-CS [6], the IT Fundamentals (ITF) knowledge area is intended to be at the introductory level in a curriculum. The purpose of the ITF knowledge area is to develop fundamental skills
  • 4. Towards a Pervasive Information Assurance Security Educational Model 167 for subsequent courses by providing an overview of the IT discipline and how it relates to other disciplines. In so doing, it should instill an IT mindset that helps IT students understand the diverse contexts in which IT is used [6]. The ITF knowledge area is divided into four units. These units include ‘Pervasive Themes in IT’, ‘History of IT’, ‘IT and its Related and Informing Disciplines’ and ‘Application Domains’. IAS is further listed as a topic within the ‘Pervasive Themes in IT’ unit. Linked to IAS as a topic is the core learning outcome which is stated as - ‘Explain why the IAS perspective needs to pervade all aspects of IT’. Many South African universities use these guidelines provided by ACM/IEEE-CS as an informal reference when creating IT curricula. However, it is the opinion of the authors that these guidelines do not adequately address IAS as a pervasive theme and that no further guidance exists to assist IT educators in developing curricula to ensure that IAS is effectively integrated into the curriculum at undergraduate level. In support of this argument, Futcher, Schroder and Von Solms [7] question the extent to which information security is incorporated into the IT/IS/CS curricula at South African universities. They raise the concern that information security is not being addressed adequately at undergraduate level and suggest that information security be defined as a critical cross field outcome (CCFO) in South African curricula guidelines. This implies that security-related aspects be integrated into the IT/IS/CS curricula from the 1st year of study. In line with this, the following section provides a critical evaluation of current South African curricula guidelines [1,2,3,4] against the ACM/IEEE-CS [6] guidelines. 4 A Critical Evaluation of South African Curricula Guidelines Against the ACM/IEEE-CS The South African Council for Higher Education (CHE) provides guidance to tertiary institutions regarding curriculum composition. This guidance currently resides in documents from the Higher Education Qualifications Framework (HEQF), the South African Qualifications Authority (SAQA) and the National Assembly Training and Education Department (NATED). This section examines the guidance provided by the CHE specific to IT qualifications [1,2,3,4] in order to critically evaluate it against the ACM/IEEE-CS [6] curriculum guidelines. The aim is to identify possible weaknesses and areas for improvement with respect to integrating information security into IT curricula. The HEQF is a qualifications framework for a single coordinated higher education sector. It applies to all higher education programmes and qualifications offered in South Africa by public and/or private institutions. As such, it replaces previous policy documents including ‘A Qualification Structure for Universities in South Africa - NATED Report 116 (99/02)’, ‘General Policy for Technikon Instructional Programmes - NATED Report 150 (97/01)’ and the ‘Formal Technikon Instructional Programmes in the RSA - NATED Report 151 (99/01)’. However, some relevant curricula information still resides in the NATED documents. The NATED Report 151 specifies instructional offerings for a National Diploma [2] and Bachelor of Technology in Information Technology [1]. Although no specific
  • 5. 168 L. Futcher and J. Van Niekerk security-related offerings are stipulated for the National Diploma [2], Computer Security IV and Information Security IV are specified for the Bachelor of Technology [1] qualification. However, these two offerings are not compulsory in any of the nine specialised IT fields as defined by SAQA [3,4]. These IT fields include Business Applications, Software Development, Communication Networks, Web and Application Development, Information Systems and Technology Management, Intelligent Industrial Systems, Support Services, Technical Applications and Hardware and Computer Architecture. None of these IT fields have any security-related exit level outcomes nor specific outcomes identified for the SAQA registered National Diploma in IT [4]. For all nine IT fields, the SAQA registered Bachelor of Technology in IT qualification [3] defines a security-related exit level outcome that states that ‘the qualifying learner should have the ability to apply advanced techniques in the introduction and control of information security in an IT environment’. However, this is only stipulated as being core for the Business Applications field and as an elective for the other eight IT fields. Linked to this exit level outcome is the associated assessment criterion ‘Evaluate the information security environment and design control measures’. This poses a major concern with respect to addressing IAS as a pervasive theme within South African IT curricula. In comparison, the ACM/IEEE-CS’s curriculum guidelines [6] offers an excellent baseline from which to develop a 4-year IT curriculum. Specifically, at the 4th year level it recommends the inclusion of IAS as an advanced subject area and it provides very clear guidelines on the topics such an instructional offering should be covering [6]. However, specific guidance on how to incorporate security concepts as a pervasive theme during the first three years of study, and as part of the remaining 4th year subjects, is lacking. This could lead to potential problems at several different levels. Firstly, the structure of the 4-year IT curriculum at the NMMU, and several other similar South African universities, is such that the 4th year of study forms part of an optional, more advanced, qualification [1]. It is thus possible for a student to exit the qualification after the 3rd year of study. Secondly, even for students who do decide to enroll in the optional 4th year qualification, the “Information Security” instructional offering is not considered compulsory in the South African curriculum guidelines, and is thus an elective subject [1]. Students could thus elect to not receive the requisite information security education. This means that the lack of specific guidance on how information security-related concepts should be incorporated as a pervasive theme into the curricula of subjects during the first three years of study could lead to IT curricula that do not adequately address information security, despite the relative importance assigned to this topic by the ACM/IEEE-CS’s [6] curriculum guidelines. Even though it cannot reasonably be expected from the ACM/IEEE-CS to provide subject specific guidance on these topics, it could be argued that a minimum “standard” for each topic area could be more clearly delineated by the curricula guidelines. Such delineation could possibly be done with the assistance of the information assurance model suggested in the ACM/IEEE-CS guidelines [6], to provide the context for information security knowledge, and the use of a learning taxonomy like Bloom’s taxonomy, as suggested by Van Niekerk & Von Solms [8] to provide guidance on the “depth” of topic coverage at a specific year of study.
  • 6. Towards a Pervasive Information Assurance Security Educational Model 169 As an example it could be argued that the topic of “buffer overflow attacks/prevention” should not simply be relegated to form part of an optional 4th year subject. Instead it should be integrated into programming subjects throughout the qualification. Thus, with the help of a learning taxonomy, like Bloom’s, specific learning objectives could be defined which requires learners at the 1st and 2nd years of study to remember and understand material relating to this topic, and which requires 3rd year students to be able to apply the relevant knowledge. This integration of the topic into the programming curriculum could also provide security context through the incorporation of the suggested information assurance model. Relevant topics could thus still refer to the underlying information states, security services and/or security countermeasures relevant to the context in which these topics are being taught. Table 1 provides brief examples of sample learning activities for the topic of “buffer overflow attacks/prevention” for the lowest three levels of Bloom’s taxonomy only. Similar examples could also be constructed for the remaining levels but were omitted due to space constraints. Table 1. Abbreviated example of Learning Activities based on Bloom's Taxonomy for Information Security, adapted from Anderson, et al. [9] Level Verb Sample Activities Apply execute Write error prevention code to ensure that your methods iterating through the given list of stored items cannot overstep the boundaries of this list. (Security Countermeasure) Understand discuss Explain how the integrity of the data in the computer’s memory could be negatively affected if your code tries to access an array element outside the boundaries of the current array. (Security Services) Remember define In terms of the underlying memory used/allocated, define what an array of 32 bit integers is. (Information States) The information assurance model suggested by ACM/IEEE-CS [6] can also be adapted to reflect this incorporation of Bloom’s taxonomy into the intended curriculum design process. Such an adaptation is illustrated in Figure 1. This is similar to an earlier adaptation by Maconachy, Schou, Ragsdale & Welch [10], where “Time” was added as a fourth dimension to the model. The addition of a time dimension was not used as “a causal agent of change, but a confounding change agent” [10]. This catered for the need to modify other dimensions to cater for new technologies which are introduced over time. The adaptation depicted in Figure 1 similarly is not a causal agent, but rather serves to illustrate the increasing “depth” of the student learner’s mastery of the underlying, pervasive security concepts, in terms of Bloom’s taxonomy, as such a student progresses through his/her studies. A student might therefore initially only deal with a specific concept at the “remember” dimension of the cognitive domain but should, over time, progress towards the “create” dimension.
  • 7. 170 L. Futcher and J. Van Niekerk Fig. 1. Model for Pervasive Information Assurance and Security Education (adapted from Maconachy, Schou, Ragsdale, Welch [10]) Weaving many of the IAS concepts into the curriculum provides challenges unique to the IT profession. It is this challenge which this proposed model for pervasive information assurance and security education, as depicted in Figure 1, could help to address. 5 Conclusion Although the ACM/IEEE-CS advocates IAS both as a knowledge area and as a pervasive theme, there is little guidance provided with respect to assisting IT educators in incorporating information security as a pervasive theme into their various offerings. More guidance should be given by either the ACM/IEEE or at national level with respect to IAS as a pervasive theme. In order to integrate IAS pervasively into IT curricula, it would be sensible to use a learning taxonomy to “phase in” concepts. By utilizing the proposed pervasive information assurance and security model for IT education, curriculum developers and educators can determine the fundamental, core and elective security-related aspects to be incorporated from the 1st to the 4th year of the IT qualification. Whereas fundamental aspects should form the essential basis required for the proposed qualification, core aspects should include the compulsory learning required in situations contextually relevant to the particular instructional offering. Elective aspects should include any additional optional security-related aspects that could enhance the qualification. Incorporation of the
  • 8. Towards a Pervasive Information Assurance Security Educational Model 171 proposed model could benefit the guidelines provided by both the ACM/IEEE-CS and the CHE. Finally, CHE does not provide detailed subject level guidelines. It is the authors’ opinion that IT educators in South Africa could benefit from formally adopting ACM/IEEE-CS guidelines since extensive guidance is provided. However, from a security perspective the authors believe that even more guidance specific to the incorporation of security as a pervasive theme is needed. However, future research is required to determine whether security-related aspects are specified within institutional learning programme guidelines. References 1. South African Council for Higher Education (CHE), Nated Document 151: Baccalaureus Technologiae: Information Technology (2005) 2. South African Council for Higher Education (CHE), Nated Document 151: National Diploma: Information Technology (2005) 3. South African Qualifications Authority (SAQA), Registered Qualification: Bachelor of Technology: Information Technology, (2007), http://regqs.saqa.org.za 4. South African Qualifications Authority (SAQA), Registered Qualification: National Diploma: Information Technology (2007), http://regqs.saqa.org.za 5. ACM, AIS & IEEE-CS, Computing Curricula 2005: The Overview Report (2005) 6. ACM & IEEE-CS, Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology (2008) 7. Futcher, L., Schroder, C., Von Solms, R.: Information security education in South Africa. Information Management & Computer Security 18(5), 366–374 (2010) 8. Van Niekerk, J., Von Solms, R.: Using Bloom’s taxonomy for information security education. In: Education and Technology for a Better World. 9th IFIP TC 3 World Conference on Computers in Education, WCCE 2009, Bento Goncalves, Brazil (July 2009) 9. Anderson, L., Krathwohl, D., Airasian, P., Cruikshank, K., Mayer, R., Pintrich, P., Raths, J., Wittrock, M.: A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom’s Taxonomy of Educational Objectives, Complete Edition. Longman (2001) 10. Maconachy, W.V., Schou, C.D., Ragsdale, D., Welch, D.: A Model for Information Assurance: An Integrated Approach. In: Proceedings of the 2001 IEEE Workshop on IAS. United States Military Academy, West Point (2001)