Developing Cyber Security Competences Through Simulation-Based Learning

2022 ◽  
pp. 348-360
Author(s):  
Bistra Konstantinova Vassileva

The importance of cyber security competences is growing both in practice and in academia during the last few years. This chapter provides a current overview of the existing body of the literature in the field of simulation-based learning and the key cyber security issues. The author's primary goal is to develop a methodological business-oriented and evidence-based learning framework which will provide students or trainees with the opportunity to develop practical skills in the field of cyber security issues through a virtual business simulator. The overall intention is to provide a coherent framework that makes use of active-based learning and gamification to support the active participation of students or trainees. To meet these goals, the Reference Framework for Applied Competences (REFRAC) is applied. Taking into account that in 2040 ICT and internet will be ‘culturally invisible', cyber security competences will be a must for everyone. They will be critical both for personal and companies' survival in the turbulent and highly competitive digital environment.

Author(s):  
Bistra Konstantinova Vassileva

The importance of cyber security competences is growing both in practice and in academia during the last few years. This chapter provides a current overview of the existing body of the literature in the field of simulation-based learning and the key cyber security issues. The author's primary goal is to develop a methodological business-oriented and evidence-based learning framework which will provide students or trainees with the opportunity to develop practical skills in the field of cyber security issues through a virtual business simulator. The overall intention is to provide a coherent framework that makes use of active-based learning and gamification to support the active participation of students or trainees. To meet these goals, the Reference Framework for Applied Competences (REFRAC) is applied. Taking into account that in 2040 ICT and internet will be ‘culturally invisible', cyber security competences will be a must for everyone. They will be critical both for personal and companies' survival in the turbulent and highly competitive digital environment.


Author(s):  
Yulia Zhdanovа ◽  
Svitlana Spasiteleva ◽  
Svitlana Shevchenko

The article deals with the problem of training modern specialists of the specialty "125 - Cyber Security". Issues of providing students with specialized and professional knowledge and skills in cryptographic protection of the information are considered. The necessity of obtaining practical knowledge on information protection with a certain amount of theoretical knowledge for future cybersecurity specialists has been substantiated. Through the analysis of literature and the use of own experience, the essence and structure of the concept of "competence on cryptographic protection of the information" have been determined. Formation of these competencies have been carried out within the framework of interdisciplinary links of educational disciplines, namely: "Applied Cryptology", "Secure Programming". The list of requirements for professionally significant characteristics of a cybersecurity specialist in the field of cryptographic protection of information has been determined. An overview of cryptographic libraries has been conducted and the main criteria for selecting the cryptographic service and the programming environment have been determined. The article demonstrates the need to use modern cryptographic .Net Framework services and the Microsoft Visual Studio application development environment to provide students with the knowledge and practical skills of information protection. The model of formation and development of competences on cryptographic protection of the information for students of the specialty “125-Cyber Security” has been developed and the ways of its realization at Borys Grinchenko Kyiv University have been offered. In the course of the research it was determined that in the programming of cryptographic protection mechanisms, practical skills of using cryptographic algorithms in the processing and transmission of data have been effectively formed. It is proved that the definition of the volume of theoretical knowledge and practical skills, taking into account the interdisciplinary connections of educational disciplines, allows preparing specialists with practical skills in cryptographic protection of the information. Such specialists are necessary for IT companies in the labor market.


2020 ◽  
Vol 102 (913) ◽  
pp. 367-387
Author(s):  
Massimo Marelli

AbstractDigitalization and new technologies have an increasingly important role in today's humanitarian activities. As humanitarian organizations become more active in and reliant on new and digital technologies, they evolve from being simple bystanders to being fully fledged stakeholders in cyberspace, vulnerable to adverse cyber operations that could impact on their capacity to protect and assist people affected by armed conflict or other situations of violence.This shift makes it essential for humanitarian organizations to understand and properly map their resulting cyber perimeter. Humanitarian organizations can protect themselves and their activities by devising appropriate cyber strategies for the digital environment. Clearly defining the digital boundaries within which they carry out operations lays the groundwork for humanitarian organizations to develop a strategy to support and protect humanitarian action in the digital environment, channel available resources to where they are most needed, and understand the areas in which their operational dialogue and working modalities need to be adapted for cyberspace.The purpose of this article is to identify the unique problems facing international humanitarian organizations operating in cyberspace and to suggest ways to address them. More specifically, the article identifies the key elements that an international humanitarian organization should consider in developing a cyber security strategy. Throughout, the International Committee of the Red Cross and its specificities are used as an example to illustrate the problems identified and the possible ways to address them.


2022 ◽  
Author(s):  
Nitul Dutta ◽  
Nilesh Jadav ◽  
Sudeep Tanwar ◽  
Hiren Kumar Deva Sarma ◽  
Emil Pricop

2021 ◽  
Author(s):  
Abhi Patel ◽  
Tim Schenk ◽  
Steffi Knorn ◽  
Heiko Patzlaff ◽  
Dragan Obradovic ◽  
...  

2015 ◽  
Vol 16 (3) ◽  
pp. 4-14 ◽  
Author(s):  
James Burns ◽  
Georgia Bullitt ◽  
Howard Kramer ◽  
Jack Habert ◽  
James Doench

Purpose – To explain the requirements of Regulation Systems Compliance and Integrity (“Regulation SCI”) and the new responsibilities of organizations defined as “SCI entities.” Design/methodology/approach – Explains the purpose of Regulation SCI, the responsibilities of SCI entities, systems covered by the rules (“SCI systems”), and specific obligations of SCI entities, including the establishment and periodic review of policies and procedures, compliance with the Exchange Act, designation of “responsible SCI personnel,” appropriate corrective action in response to “SCI events,” notification of systems changes, annual “SCI reviews,” business continuity and disaster recovery testing, and recordkeeping and filing. Discusses future implications for SCI Entities and other market participants. Findings – Regulation SCI launches a broad and extensive overlay of rules and guidance to address systems capacity and integrity issues that have increasingly affected the securities markets. The adoption of this regulation suggests that there will continue to be increased scrutiny by the SEC, FINRA and other regulators of the automated systems and related policies and procedures of all market participants. Practical implications – SCI entities will need to devote considerable attention and resources not just to prevent incidents where possible, but also to establish systems for ensuring thorough compliance and well-documented and reasonable follow-up actions where necessary. All market professionals – including broker-dealers, investment advisers, pension funds and investment companies – should study the new regulation and consider adopting appropriate policies and procedures to address operating as well as cyber security issues with respect to their own critical operating technology. Originality/value – Practical guidance from experienced financial services lawyers.


Sign in / Sign up

Export Citation Format

Share Document