Skip to main content

An Institutional Risk Reduction Model for Teaching Cybersecurity

  • Conference paper
  • First Online:

Part of the book series: IFIP Advances in Information and Communication Technology ((IFIPAICT,volume 579))

Abstract

This work presents a model for reviewing the risks of institutions teaching cybersecurity. The work is based on efforts in this direction at Regis University and Adams 12 Five Star Schools in Colorado. These two institutions are described in a comparative case study reviewing the following four aspects of addressing risk: policy, adjudication, infrastructure protection, and curricular boundaries. The model is presented in a generalizable framework to facilitate risk analysis across the education of children in public schools, university level education, and professional development programs. This framework is not intended to supplement a traditional threat analysis program and not replace it. In addition to the specialized risks addressed here, institutions teaching cybersecurity are often perceived as potential targets for adversaries because of the schools as a pipeline to cyber defense activities, and because institutions teaching cybersecurity are part of societal long-term cyber defense strategies that confront criminal, nation state, and activist threats.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Marcum, C., Higgins, G., Ricketts, M., Wolfe, S.: Hacking in high school: cybercrime perpetration by Juveniles. Deviant Behav. 35(7), 581–591 (2014)

    Google Scholar 

  2. Marquardson, J., Gomillion, D.: Cyber security curriculum development: protecting students and institutions while providing hands-on experience. Inf. Syst. Educ. J. 16(5), 12–21 (2018)

    Google Scholar 

  3. Boylan, A., Tepe, A., Davis, D.: Texas governance and authorities for cyber attack response: a summary. https://cybersecurity.tamu.edu/wp-content/uploads/2019/11/Cyber-Response-State-Authorities_13-NOV-19.pdf. Accessed 3 July 2020

  4. Fujs, D., Mihelič, A., and Vrhovec, S.: The power of interpretation: qualitative methods in cybersecurity research, tile of a proceedings paper. In: 14th International Conference on Availability, Reliability and Security (ARES 2019), Article 92, pp. 1–10. Association for Computing Machinery, New York (2019)

    Google Scholar 

  5. Creswell, J., Creswell, J.: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, p. 7. Sage Publications, Thousand Oaks (2017)

    Google Scholar 

  6. Carl, D.: Perkins Career and Technical Education Act of 2006, Public Law 88-210; 18 December 1963, As Amended Through P.L 116-6 Enacted 15 February 2019, United States of America (2019)

    Google Scholar 

  7. Knowles, M., Holton III, E., Swanson, R.: The Adult Learner. Routledge, London (2012)

    Book  Google Scholar 

  8. https://www.acm.org/code-of-ethics. Accessed 10 Feb 2020

  9. National Collegiate Cyber Defense Competition Rules. https://www.nationalccdc.org/index.php/competition/competitors/rules. Accessed 10 Feb 2020

  10. Rocky mountain collegiate cyber defense competition. https://plantzmasters.net/rmccdc/. Accessed 10 Feb 2020

  11. Cryptologic foundation framework. https://cryptologicfoundation.org/visit/goal/cybersecurity-curriculum-framework-portal-login.html. Accessed 10 Feb 2020

  12. Stallings, W., Brown, L., Bauer, M., Bhattacharjee, A.: Computer security: principles and practice, pp. 0–978. Pearson Education, Upper Saddle River (2012)

    Google Scholar 

  13. NICERC cybersociety curriculum. https://nicerc.org/curricula/cyber-society/. Accessed 10 Feb 2020

  14. Clark center home. https://www.clark.center/home. Accessed 10 Feb 2020

  15. NIST cybersecurity framework. https://www.nist.gov/cyberframework. Accessed 3 July 2020

  16. Nieles, M., Dempsey, K., Pillitteri, V.: NIST Special publication 800-12 revision 1 an introduction to information security. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf. Accessed 3 July 2020

  17. Lockheed Martin Cyberquest™ competition, https://www.lockheedmartin.com/content/dam/lockheed-martin/eo/documents/CyberQuest/2019/LM-CYBERQUEST-Challenge-Overview_PIRA.pdf. Accessed 10 Feb 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Erik Moore or Daniel Likarish .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Moore, E., Likarish, D., Bastian, B., Brooks, M. (2020). An Institutional Risk Reduction Model for Teaching Cybersecurity. In: Drevin, L., Von Solms, S., Theocharidou, M. (eds) Information Security Education. Information Security in Action. WISE 2020. IFIP Advances in Information and Communication Technology, vol 579. Springer, Cham. https://doi.org/10.1007/978-3-030-59291-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59291-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59290-5

  • Online ISBN: 978-3-030-59291-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics