Accès libre

National Cybersecurity Education: Bridging Defense to Offense

   | 12 mars 2020
À propos de cet article

Citez

Arreguin-Toft, I. (2001). How the weak win wars: A theory of asymmetric conflict. International security, Vol. 26, Issue 1, 93-128.Search in Google Scholar

Baker, M. (2013). State of cyber workforce development. Software Engineering Institute, Carnegie Mellon University.Search in Google Scholar

Bazzell, M. (2016). Open source intelligence techniques: resources for searching and analyzing online information. Create Space Independent Publishing Platform.Search in Google Scholar

Beggs, R. W. (2014). Mastering Kali Linux for advanced penetration testing. Packt Publishing Ltd.Search in Google Scholar

Bruneau, E., & Kteily, N. (2017). The enemy as animal: Symmetric dehumanization during asymmetric warfare. PloS one, Vol. 12, Issue 7.10.1371/journal.pone.0181422552898128746412Search in Google Scholar

Cheung, R. S., Cohen, J. P., Lo, H. Z., & Elia, F. (2011). Challenge based learning in cybersecurity education. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Las Vegas Nevada, USA: CSREA Press.Search in Google Scholar

Cielen, D., Meysman, A., & Ali, M. (2016). Introducing data science: big data, machine learning, and more, using Python tools. Shelter Island, NY: Manning Publications Co.Search in Google Scholar

Davey, J., & Armstrong, H. L. (2001). An Approach to Teaching Cyber Warfare Tools and Techniques. Journal of Information Warfare, Vol. 1, Issue 2, 87-94.Search in Google Scholar

Dawson, M., & Omar, M. (2015). New Threats and Countermeasures in Digital Crime and Cyber Terrorism. Hershey, PA: IGI Global. doi:10.4018/978-1-4666-8345-710.4018/978-1-4666-8345-7Search in Google Scholar

Dawson, M., Wang, P., & Williams, K. (2018). The role of cae-cde in cybersecurity education for workforce development. Information Technology-New Generations. Springer, Cham.10.1007/978-3-319-77028-4_20Search in Google Scholar

Gikas, C. (2010). A general comparison of fisma, hipaa, iso 27000 and pci-dss standards. Information Security Journal: A Global Perspective, Vol. 19, Issue 3, 132-141.Search in Google Scholar

Helms, C. P. (2015). The Digital GCC: USCYBERCOM as a Combatant Command. Air Command and Staff College Maxwell Air Force Base United States, Alabama, SUA.10.21236/AD1012758Search in Google Scholar

Hollis, D. M. (2010). USCYBERCOM: The need for a combatant command versus a subunified command. Washington Dc: National Defense University Press.Search in Google Scholar

Hu, J., Cordel, D., & Meinel, C. (2004). A Virtual Laboratory for IT Security Education. Proceedings of EMISA International Conference on Informationssysteme im E-Business und E-Government (EMISA), Vol. 56, 60-71.Search in Google Scholar

Kim, E., Wells Jr, W. G., & Duffey, M. R. (2003). A model for effective implementation of Earned Value Management methodology. International Journal of Project Management, Vol. 21, Issue 5, 375-382.Search in Google Scholar

Najera-Gutierrez, G., & Ansari, J. A. (2018). Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux. Birmingham, UK: Packt Publishing Ltd.Search in Google Scholar

Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Special Publication, 800, 181.10.6028/NIST.SP.800-181Search in Google Scholar

Ranasinghe, N., Karunanayaka, K., Cheok, A. D., Fernando, O. N. N., Nii, H., & Gopalakrishnakone, P. (2011). Digital taste and smell communication. Proceedings of the 6th International Conference on Body Area Networks, 78-84, Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST).10.4108/icst.bodynets.2011.247067Search in Google Scholar

Schneider, F. B. (2013). Cybersecurity education in universities. IEEE Security & Privacy, Vol. 11, Issue 4, 3-4.Search in Google Scholar

Tzu, S. (2014). The art of war. Strategic Studies, 86-110, Routledge.Search in Google Scholar

U.S. Cybercom. (n.d.). Command History, available at: https://www.cybercom.mil/About/History/, accessed on 22 December 2019.Search in Google Scholar

Vijayan, J. (2009). Defense Secretary Gates approves creation of U.S. Cyber Command, available at: https://www.computerworld.com/article/2525896/defense-secretary-gates-approves-creation-of-u-s--cyber-command.html, accessed on 22 December 2019.Search in Google Scholar

Wang, M., Callaghan, V., Bernhardt, J., White, K., & Peña-Rios, A. (2018). Augmented reality in education and training: pedagogical approaches and illustrative case studies. Journal of Ambient Intelligence and Humanized Computing, Vol. 9, Issue 5, 1391-1402.Search in Google Scholar

Wang, P., Dawson, M., & Williams, K. L. (2019). Improving cyber defense education through national standard alignment: Case studies. National Security: Breakthroughs in Research and Practice, 78-91, IGI Global.Search in Google Scholar

Wong, E. (2005). Swift Road for US Citizen Soldiers Already Fighting in Iraq. New York Times.Search in Google Scholar