6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Tanya Zlateva et al.<br />
Computer Information Systems and Telecommunication in 2002. The central goal of the program was<br />
to draw upon the resources of a large research university and to give students the academic<br />
knowledge and technical skills as well as to develop their ability to identify and solve security<br />
problems in their multi-disciplinary complexity taking into account technical, managerial, legal, and<br />
ethical aspects of information security. We emphasized from the outset an interdisciplinary design<br />
approach with strong laboratory and experiential components; a program scope that embraces<br />
contributions from multiple fields; and a program structure that integrates information assurance<br />
concepts, topics, and methods throughout the curriculum as opposed to predominantly in specialized<br />
courses (Zlateva et al., 2003). The integration of information assurance topics across the curriculum is<br />
conducted at three levels (Table 1):<br />
First, the fundamental information assurance topics are taught within the existing core courses at<br />
the undergraduate and graduate level. This ensures that all students are equipped with the basic<br />
knowledge of information security that is currently indispensable for any professional working in<br />
computer software, hardware, systems, or networks.<br />
Second, specialized semester long courses—such as information security, network security,<br />
database security, cryptography, biometrics, digital forensics, etc. —provide in-depth analysis of<br />
different security aspects. These courses provide the core for concentrators in information<br />
security and are available as electives to students outside the information security concentration.<br />
Third, advanced specialized courses—such as web applications, web services, enterprise<br />
computing, mobile applications, data mining etc. —include cyber security topics and modules.<br />
Our Master’s programs consists of ten four-credit courses and a concentration requires the<br />
completion of four courses, typically three specialized that provide depth and one related high level<br />
elective for breadth. When first introduced in 2002 the security concentrations in the MS in CS, CIS,<br />
and TC were based on five specialized courses— cryptography, computer networks and security,<br />
information systems security, database security, and network management and computer security<br />
(Table 1).<br />
The programs were well received and grew rapidly. From a curriculum point of view we soon<br />
recognized two related trends both of which required the introduction of new security topics and<br />
further development of the curriculum both in depth and breadth. From the point of view of pedagogy<br />
and access it became clear that novel online technologies such as virtualization and videocollaboration<br />
can increase the impact of content presentation and that new delivery formats, such as<br />
hybrid or distance learning, can make the program available to students at remote locations or who<br />
are unable to attend on-campus classes due to demanding work schedules. In the following we first<br />
discuss the evolution of the curriculum and then the novel teaching approaches.<br />
The large majority of students in our programs are information technology professionals and a<br />
considerable number are already involved in information security. From the very beginning of the<br />
programs their interests ranged from biometrics to digital forensics on the technical side, and from<br />
security policies to legal and regulatory issues on the managerial and organizational side. At the same<br />
time the information security field was rapidly evolving, maturing, and its importance was becoming<br />
widely recognized. Both these factors required us to deepen the theoretical and applied knowledge of<br />
the core, to updated and broaden the curriculum with topics and/or courses on emerging<br />
technologies, and to seek synergies with programs that focus on related and complementary fields.<br />
Depth was achieved by restructuring the teaching of security fundamentals and adding a course on<br />
network security in recognition of the central importance that global networks play in the modern<br />
world. Breadth was achieved by introducing a four-course certificate in digital forensics, a new course<br />
in biometrics and a number of specialized content modules in the advanced courses. In collaboration<br />
with the administrative sciences department we are currently exploring synergies with the<br />
concentration in Business Continuity, Security, and Risk Management and the introduction of new<br />
course on cyber law.<br />
269