skip to main content
review-article

An exploration of the current state of information assurance education

Published: 18 January 2010 Publication History

Abstract

Information Assurance and computer security are serious worldwide concerns of governments, industry, and academia. Computer security is one of the three new focal areas of the ACM/IEEE's Computer Science Curriculum update in 2008. This ACM/IEEE report describes, as the first of its three recent trends, "the emergence of security as a major area of concern." The importance of Information Assurance and Information Assurance education is not limited to the United States. Other nations, including the United Kingdom, Australia, New Zealand, Canada, and other members from NATO countries and the EU, have inquired as to how they may be able to establish Information Assurance education programs in their own country.
The goal of this document is to explore the space of various existing Information Assurance educational standards and guidelines, and how they may serve as a basis for helping to define the field of Information Assurance. It was necessary for this working group to study what has been done for other areas of computing. For example, computer science (CS 2008 and associate-degree CS 2009), information technology (IT 2008), and software engineering (SE 2004), all have available curricular guidelines.
In its exploration of existing government, industry, and academic Information Assurance guidelines and standards, as well as in its discovery of what guidance is being provided for other areas of computing, the working group has developed this paper as a foundation, or a starting point, for creating an appropriate set of guidelines for Information Assurance education. In researching the space of existing guidelines and standards, several challenges and opportunities to Information Assurance education were discovered. These are briefly described and discussed, and some next steps suggested.

References

[1]
Computing Curricula 2005, The Overview Report (http://www.acm.org/education/education/curric_vols/CC2005-March06Final.pdf)
[2]
Information Technology 2008, Curriculum Guidelines for Undergraduate Degree Programs in Information Technology (http://www.acm.org//education/curricula/IT2008%20Curriculum.pdf)
[3]
Computer Science 2008, An Interim Revision of CS 2001 (http://www.acm.org//education/curricula/ComputerScience2008.pdf)
[4]
Software Engineering 2004, Curriculum Guidelines of Undergraduate Degree Programs in Software Engineering (http://sites.computer.org/ccse)
[5]
Computing Curriculum 2001 (http://www.acm.org/education/curric_vols/cc2001.pdf).
[6]
Samuel T. Redwine, Jr., Editor. (2006). Software Assurance: A Guide to the Common Body of Knowledge to Produce, Acquire, and Sustain Secure Software Version 1.0. US Department of Homeland Security, May.
[7]
http://www.swebok.org
[8]
The "CORE Body of Knowledge for Information Technology Professionals" (http://www.acs.org.au/ictcareers/index.cfm?action=show&conID=cbok3)
[9]
Report of the Task Force on the ACS Towards 2000, Australian Computer Society, November 1992.
[10]
Computing Curricula 2009: Guidelines for Associate-Degree Transfer Curriculum in Computer Science. http://www.acmtyc.org/WebReports/CSreport/
[11]
ACM Education Curriculum Recommendations. http://www.acm.org/education/curricula-recommendations
[12]
ACM TYCEC Curriculum, Assessment, and Pedagogy repository. http://www.capspace.org/
[13]
NSA list of CSEs http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml
[14]
SFS program solicitation http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=5228
[15]
IASP program description http://www.defenselink.mil/cionii/sites/iasp/
[16]
NSA IASP program requirements http://www.nsa.gov/ia/academic_outreach/nat_cae/cae_iae_program_criteria.shtml
[17]
National Training Standard for Information Systems Security Professionals http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf
[18]
NIST 800-16 Standard http://csrc.nist.gov/publications/nistpubs/800-16/800-16.pdf
[19]
DoD 8570 Directive http://www.dtic.mil/whs/directives/corres/pdf/857001m.pdf
[20]
DHS EBK http://www.us-cert.gov/ITSecurityEBK/EBK2008.pdf
[21]
ISO 17024 Standard http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=29346
[22]
IFIP WG 11.8 homepage http://www.118.ifip.info/
[23]
IFIP TC11 WB 11.8 Information Security Education, Proceedings WISE 2, 2nd World Conference Information Security Education, Edith Cowan University, Perth, Western Australia, July 12-14, 2001.
[24]
http://ftp.fas.org/irp/offdocs/pdd/pdd-63.htm
[25]
http://www.cnss.gov/
[26]
J. Ryan and C Schou (2004) On Security Education, Training and Certifications. Information Systems Control Journal. Volume 6.
[27]
http://www.sans.org
[28]
http://www.isc2.org
[29]
http://www.abet.org
[30]
http://www.qaa.ac.uk/reviews/ELIR/GoodPractice/InternalSubjectELIR.pdf
[31]
http://www.qaa.ac.uk
[32]
http://www.ed.gov
[33]
http://www/auqa.edu.au/
[34]
http://www.aacsb.edu/accreditation/
[35]
http://www.csab.org/
[36]
C. Schou, W. Maconachy, et al. (1993). Organizational Information Security: Awareness, Training and Education to Maintain System Integrity. In Proceedings of the Ninth International Computer Security Symposium. Toronto, Canada.
[37]
B. E. Mullins, T. H. Lacey, R. F. Mills, J. M. Trechter, and S. D. Bass. (2007) How the cyber defense exercise shaped an information-assurance curriculum. IEEE Security & Privacy, 5(5):40--49, Sept.- Oct.
[38]
http://www.hsv.se/
[39]
http://csrc.nist.gov/groups/SMA/fisma/index.html
[40]
L. Hoffman (1974). Course outline for computer security and privacy. SIGCSE Bull. 6, 3 (Sep. 1974), 13--17.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCSE Bulletin
ACM SIGCSE Bulletin  Volume 41, Issue 4
December 2009
205 pages
ISSN:0097-8418
DOI:10.1145/1709424
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 January 2010
Published in SIGCSE Volume 41, Issue 4

Check for updates

Author Tags

  1. IA
  2. education
  3. guidelines
  4. information assurance
  5. standards

Qualifiers

  • Review-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)4
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media