Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course

Author(s):  
A. Conklin
2021 ◽  
pp. 93-101
Author(s):  
D.S. Kucherenko ◽  

The article discusses the problems of managing the information security of the enterprise in a changing business climate. The description, shortcomings and advantages of the existing asS TP security system are given. The specifics of the company's procedural and technological security capabilities have been revealed. The enterprise's IT infrastructure has been identified in the information security and cyber defense format, consisting of three components: the servers of applications that deliver business applications; database servers that contain business data and system administration channels to manage and monitor infrastructure that need to work together as a coherent and coordinated system. Structured architecture, uniting corporate cybersecurity in 11 functional areas covering the technical and operational breadth of enterprise cybersecurity. These functional areas are highlighted on the basis of their relative independence from each other and because they are well consistent with the way staff, experience and responsibilities are shared in the enterprise. This corporate cybersecurity architecture format provides the basis for managing the capabilities that the enterprise provides the tools of audit, forensics, detection, and preventive control. This structure provides consistent management of security capabilities and helps prioritize their deployment, maintenance, and updates over time. It also ensures strict accountability and good alignment of strategy, staff, budget and technology to meet the organization's security needs. The structure is designed to be flexible and scalable regardless of the size of the enterprise. It provides an expandable mechanism for adjusting cyber defense over time in response to changing cyber threats.


Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


1999 ◽  
Author(s):  
Corey D. Schou ◽  
James Frost ◽  
Nathan Wingert ◽  
W. V. Maconachy

Sign in / Sign up

Export Citation Format

Share Document