27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Tanya Zlateva et al.<br />

Computer Information Systems and Telecommunication in 2002. The central goal of the program was<br />

to draw upon the resources of a large research university and to give students the academic<br />

knowledge and technical skills as well as to develop their ability to identify and solve security<br />

problems in their multi-disciplinary complexity taking into account technical, managerial, legal, and<br />

ethical aspects of information security. We emphasized from the outset an interdisciplinary design<br />

approach with strong laboratory and experiential components; a program scope that embraces<br />

contributions from multiple fields; and a program structure that integrates information assurance<br />

concepts, topics, and methods throughout the curriculum as opposed to predominantly in specialized<br />

courses (Zlateva et al., 2003). The integration of information assurance topics across the curriculum is<br />

conducted at three levels (Table 1):<br />

First, the fundamental information assurance topics are taught within the existing core courses at<br />

the undergraduate and graduate level. This ensures that all students are equipped with the basic<br />

knowledge of information security that is currently indispensable for any professional working in<br />

computer software, hardware, systems, or networks.<br />

Second, specialized semester long courses—such as information security, network security,<br />

database security, cryptography, biometrics, digital forensics, etc. —provide in-depth analysis of<br />

different security aspects. These courses provide the core for concentrators in information<br />

security and are available as electives to students outside the information security concentration.<br />

Third, advanced specialized courses—such as web applications, web services, enterprise<br />

computing, mobile applications, data mining etc. —include cyber security topics and modules.<br />

Our Master’s programs consists of ten four-credit courses and a concentration requires the<br />

completion of four courses, typically three specialized that provide depth and one related high level<br />

elective for breadth. When first introduced in 2002 the security concentrations in the MS in CS, CIS,<br />

and TC were based on five specialized courses— cryptography, computer networks and security,<br />

information systems security, database security, and network management and computer security<br />

(Table 1).<br />

The programs were well received and grew rapidly. From a curriculum point of view we soon<br />

recognized two related trends both of which required the introduction of new security topics and<br />

further development of the curriculum both in depth and breadth. From the point of view of pedagogy<br />

and access it became clear that novel online technologies such as virtualization and videocollaboration<br />

can increase the impact of content presentation and that new delivery formats, such as<br />

hybrid or distance learning, can make the program available to students at remote locations or who<br />

are unable to attend on-campus classes due to demanding work schedules. In the following we first<br />

discuss the evolution of the curriculum and then the novel teaching approaches.<br />

The large majority of students in our programs are information technology professionals and a<br />

considerable number are already involved in information security. From the very beginning of the<br />

programs their interests ranged from biometrics to digital forensics on the technical side, and from<br />

security policies to legal and regulatory issues on the managerial and organizational side. At the same<br />

time the information security field was rapidly evolving, maturing, and its importance was becoming<br />

widely recognized. Both these factors required us to deepen the theoretical and applied knowledge of<br />

the core, to updated and broaden the curriculum with topics and/or courses on emerging<br />

technologies, and to seek synergies with programs that focus on related and complementary fields.<br />

Depth was achieved by restructuring the teaching of security fundamentals and adding a course on<br />

network security in recognition of the central importance that global networks play in the modern<br />

world. Breadth was achieved by introducing a four-course certificate in digital forensics, a new course<br />

in biometrics and a number of specialized content modules in the advanced courses. In collaboration<br />

with the administrative sciences department we are currently exploring synergies with the<br />

concentration in Business Continuity, Security, and Risk Management and the introduction of new<br />

course on cyber law.<br />

269

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!