Design Thinking Approach in Teaching Information Security
|
|
|
- Aubrie Griffith
- 10 years ago
- Views:
Transcription
1 Design Thinking Approach in Teaching Information Security Wasim A. Al-Hamdani Division of Computer Science Kentucky State University USA ABSTRACT: The phrase Design Thinking (DT) is increasingly used to mean the human-centered open problem solving procedure, it can be described as a discipline that uses the designer s receptivity and methods to balance people s needs with what is technologically feasible and what a viable business strategy can convert into customer value and market opportunity. It has been used wildly in the industry and business in particular Systems, Applications, and Products in Data Processing (SAP), to satisfy customer needs.design thinking s largerused in describing a particular style of creative thinking-in-action. Design Thinkinghas an increasing influence on twenty-first century education across disciplines. In this paper a new model to introduce information security Curriculum using design thinking methodology; based on: Understanding, Observe, Define, Ideate, Prototype, Test and Feedback. The model has been implemented in build a secure program as a way to understand information security and achieve the course objective and outcomes. The assessment of this course shows high level of student engagements, collaboration, research, and presenting ideas and thoughts. Keywords: Information Security, Teaching Information Security, Information Security Program, Design Thinking Received: 10 November 2013, Revised 19 December 2013, Accepted 4 January DLINE. All Rights Reserved 1. Introduction There are many methods to introduce information security knowledge to students, such as traditional lecture approach, tutorial approach, project approach, scribe approach, research/teaching synergy approach, and attack/defend isolated laboratory approach (Yurcik & Doss, 2001). The Seven Learning Styles (learning-styles-online.com, 2013) Visual (spatial): Using pictures, images, and spatial understanding. Aural (auditory-musical): Using sound and music. Verbal (linguistic): Using words, both in speech and writing. Physical (kinesthetic): Using your body, hands and sense of touch. Logical (mathematical): Using logic, reasoning and systems. Social (interpersonal): Learn in groups or with other people. 6 Information Security Education Journal Volume 1 Number 1 March 2014
2 Solitary (intrapersonal): Work alone and use self-study. All the above method does not focus on integrating Critical Thinking (CT) approach clearly (some has embedded this approach within its activities, such logic approach). Design thinking (DT) (A way of looking at problems or situations from a fresh perspective that suggests unorthodox solutions), can be stimulated both by an unstructured process such as brainstorming, and by a structured process such as lateral thinking (businessdictionary.com, 2013). Broader use in describing a specific style of creative thinking-in-action has increasing influence on twenty-first century education across disciplines. Design thinking stands for design-specific cognitive activities that designers apply during the process of designing. It is an inventive process of thinking backwards from people (end user, customer), that leads to design a product, a service, or is based on the conclusions of the knowledge gathered in the process (click4it.org, 2014). Design thinking is to ask students to become and convert into investigators in their world, attempt to solve problems, bridge and overpass the gaps of knowledge independently, collaboratively, and resourcefully. These are skills that are highly relevant in today s job market. (designthinkingforeducators.com, 2013) Design thinking is used in a limited context in education, especially for K12 and for project development and design. In this paper a new developed model based on design thinking is used to teach information security. The evaluation shows that the students get great experience based on a hands-on developmental security program, carry limited risk assessment, build contingency plan and in select the appropriate access control method. The student collaboration, brainstorm and discussion show great impact on understanding the concept of a topic. 2. Design Thinking The notion of design as a way of thinking can be found in the sciences to Herbert A. Simon s 1969 book The Sciences of the Artificial, (Simon,, 1969) and more specifically in design engineering to Robert McKim s 1973 book Practices in Visual Thinking. (McKim, 1973) Rolf Faste expanded McKim s work in the 80s and 90s in his teaching at Stanford, (Fast, Roth, & Wilde, 1993; Faste, 1994) defining and popularizing the idea of design thinking (Patnaik, 2009.) as a way of creative action that was adapted for business purposes by IDEO through David M. Kelley. The phrase design thinking was explained by Rowe (Rowe, 1991) to denote to the ways in which designers approach design problems, while design researchers have been studying the process for decades (Schon, 1983) and (Simon, 1969). In present-day use, the term refers to both predictable design domains as well as in different contexts such as business (Brown, 2009) and computing (Brooks, 2010). Design thinking can be seen as a grounding framework for multidisciplinary groups to communicate and to coordinate activity (Lindberg, Noweski, & Meinel, 2010). The design thinking model presented by (Kembel, 2009) is remarkably different for its explicit treatment of empathy. His is a five-step cyclic model consisting of empathy, problem definition, ideation, prototyping, and testing. Empathy arises from a deep understanding of the stakeholders and their needs. It goes beyond merely involving users in a design process and considering their articulated wants and needs: in this model, empathy requires an anthropological approach to understanding users and their environments (Gestwicki & McNely, 2012) Design Thinking is an inventive process of thinking backwards from people (end user, customer) (Curedale, Design Thinking: process and methods manual, February 1, 2013), that leads to design a product, a service, or else, based on the conclusions of the knowledge gathered in the process. Design thinking is to ask students to become and convert into investigators in their world, attempt to solve problems, bridge and overpass the gaps of knowledge independently, collaboratively, and resourcefully. These are skills that are highly relevant in today s job market (Gray, 2013). Modern education depends on a diversity of different sources of information for discovery and picture conclusions. Between these sources are miscellaneous media such as videos, podcasts or text. Experts in the community can also be sought to convey information to students. In DT, students learn more about the problem they are trying to solve. They do this by going on field trips or by visiting an expert in a lab, workshop, or studio. There are many steps in design thinking, such as (McKendrick, 2013 ): Understand your customers: For example, in a service to support decision making, it is essential to know the indicators and where data are, and understand the process, the dynamics and frequency that are required in a process of decision making. Draw the service: Visualization is important. Apply visual drawings, diagrams and storytelling to vividly illustrate what the Information Security Education Journal Volume 1 Number 1 March
3 service will deliver. Prototype the service: Show how the service will flow through wireframes, videos and diagrams. Design the project: Map out all the elements that the service will support, including processes, people and technology. Deploy the service: Other (Simon H., 1969)suggest Define, Research, Ideation, Prototype, Choose, Implement and Learn.Or (Jakes, 2013) Empathy: We see how others feel towards a specific item. Interviews are used to gain insight to human nature. Define: In this step, we use the information gathered from interviews to find the user s real problem. Ideate: The third step in design thinking is where the group discovers solutions to the problem. Prototype: Once an idea is decided upon, groups work together using arbitrary materials to construct examples of their product and explain how their product works. Testing: This is the final step. Groups rebuild their prototypes and create a working product. Once built, testing begins. Testing identifies problems with the item, so the product can be modified to better suit the user. These could be expressed as in Figure 1. Observe and listen to the problem or situation without preconceptions Apply example prototype to original situation or problem Define the problem, based on the evidence of the observations Reserarch and build working examples of idea Generate many ideas for potential solutions to the de!ned problem (Brain storming) Figure 1. Design Thinking Process In this paper we will use the design thinking to present information security, and will use the following phases (hdschool.stan ford.edu, 2013). Understanding: During this part, students engage in learning. They talk to experts and conduct research. The goal is to develop background knowledge through these experiences. They use their developing understandings as a springboard as they begin to address design challenges. Observe: Students become powerful people viewers in the observation phase of the design thinking process. They watch how people behave and cooperate and they observe physical spaces and places. They talk to people around what they are doing, ask questions and reflect on what they see. The understanding and observation stages of design thinking help students develop a sense of empathy. Define: In this phase students focus to define the problem, based on the evidence of the observations Ideate: This is a critical component; the student discovers solutions to the problem. In this phase, quantity is encouraged. 8 Information Security Education Journal Volume 1 Number 1 March 2014
4 Students may be asked to generate a hundred ideas in a single session Prototype: This is an irregular and speedy portion of the design process. A prototype can be a model, sketch, or a cardboard box. Student work together using arbitrary materials to construct examples of their product and explain how their product works. Test: This is part of an iterative process that provides feedback. The resolution of testing is to learn what works and what doesn t, and then repeat. This means going back to your prototype and adapting it based on feedback. It ensures that students learn what works and what doesn t work for their users. The goal is to develop background knowledge Students develop a sense of empathy Understand Observe Iterative process that provides feedback Test Define Define the problem, based on the evidence of the observations A Prototype can be a model, sketch, or a cardboard box Prototype Ideate needs and developing insights Figure 2. Design thinking process There are many applications for design thinking in business innovation with small and enterprise groups, and in addition it is used for improving digital strategies. The application in education environment is limited to K12 and in particular for projects (designthinkingforeducators.com, 2013). 3. Information Security Design Thinking Model A normal course in information security possibly covers the following topics Introduction to Information Security Information Security Management Legal, Ethical, and Professional Issues in Information Security Risk Management Planning for Security Technical Security: Firewalls, VPNs, and Wireless Information Security Education Journal Volume 1 Number 1 March
5 Understand Observe Point of View Ideate Protype Test Research Talk to Experts Experience Define Opinion Remark Interview Engagement Involvement Visualization Picturing Vision Early sample Model Analysis Examining Investigation Feedbacks Figure 3. Details Design thinking process Technical Security: Intrusion Detection and Prevention Systems and Other Security Tools Cryptography Physical Security Implementing Information Security Security and Personnel Information Security Maintenance Another module is (testout.com, 2013) Introduction Access Control and Identity Management Cryptography Policies, Procedures, and Awareness Physical Security Perimeter Defenses Network Defenses Host Defenses Application Defenses Data Defenses Assessments and Audits 10 Information Security Education Journal Volume 1 Number 1 March 2014
6 Whatever the model to be presented, all syllabi have to cover major three elements: Management issues Technical and operational Physical issues In the design thinking model, we will take the subject information security as one major project, and then will break it down in to subprojects. The project is Create Information Security Program. The final overall project objectives are: Students write a model of information security program Students exchange ideas on each topic Students work as one team Students divide task according to project timesheet Students research, present and deliver ideas and prototypes In additions to above challenges, there are other challenges, which are Grading Exams Evaluations Phase 1: Understand Instructor side: Define a Challenge: A KSU campus has no information security program, you need to build a complete information security program Student side: Create a Project Plan: Understanding: 2 weeks Observe: 3 weeks Define: 2 weeks Ideate: 2 weeks Prototype: 4 weeks Testing and feedback: 1 week Understand the Challenge: Students specify what are the objectives of the challenge (Students sketch their objectives for a complete information security plan to protect personal information, medical, research, financial information, registration information, all campus networks, fax and printers) Prepare Research: Instructors guide students to start research and research methodologies. Gather Inspiration: Instructors guide students to interviews (students line up who to interview, what type of questions, and when) All findings are documented and then presented to all groups. Phase 2: Observe Students gather their findings through interviews, research, discussions and visits. Student starts to document their observations and findings. At this stage a student documents the followings: No end user policies No real securities for student records, financial records, personal, medical, research and campus network The only security is passwords (with no limited time) and limited physical security Information Security Education Journal Volume 1 Number 1 March
7 Personal security are unknown Physical security are limited Phase 3: Define The problem based on the evidence of the observations. At this stage students generate a documented approach that addresses how an organization will implement security measures. Phase 4: Ideate At this stage students have to put all their ideas, thoughts, research and findings into a general sketch. This has to include: Common Control (CC) o Program managements Management control (MC) o Certification, Accreditations and Security assessment (CA) o Planning (PL) o Risk Assessment (RA) o System & Service Acquisition (SA) o Compliance & Legal (CL) Operation Controls (OC) o Awareness &Training (AT) o Configuration Managements (CM) o Contingency Planning (CP) o Incident Response (IS) o Maintenance (MT) o Media Protection (MP) o Personnel Security (PS) o Physical & Environmental Protection (PE) o System & Information Integrity (SI) Technical controls (TC) o Cryptography(CR) o Access Control (AC) o Audit & Accountability (AU) o Identification and Authentication (IA) o System Communication Protection (SC) Private Control (PC) o Authority & Authority purpose (AP) o Accountability,Audit and Risk Managements (AR) o Data Quality & Integrity (DI) o Data Minimization and Retention (DM) The above list was generated after two weeks of substantial meetings and discussions. At this stage, the instructor has to adjust the student findings and research to cover all required topics. It is a high possibility that student findings differ from the above. The main issue at this stage is to adjust student findings to fit with the original objectives. Phase 5 Prototype This stage is most critical to put all student findings together, and it is the most time consuming because student has to develop the security plan with an example why they chose a certain solution. The instructor will play major role in adjustments and will correct their prototype according to the baseline of knowledge required for the course. Quite often this stage in working together with the next stage, Testing, and feedback is because the instructor will play as the customer and needs to give the student feedback to fit his needs. 12 Information Security Education Journal Volume 1 Number 1 March 2014
8 Phase 6 Testing and Feedback In this phase students get the feedback from two sources: first from the administrator which they interviewed during early phases; and from the instructor, in addition to the other members of the group. 4. Discovery There are some findings we came across when we started to deliver this curriculum: There is no clear line between these the 6 phases and there always overlapping items. Figure 4 shows these: Testing and Feedback Protype Ideate Define Observe Understand Figure 4. Critical thinking overlapping The transfer of this course into design thinking method requires that the instructor be in touch with the student on daily basis to discuss ideas, finding guide their research and all students should share these. For all these reasons, the instructor and the student create a course blog where all users can post their questions, findings and all been on the same page. In addition to normal class hours, the instructor and the student meets 1.30 houses per week, for 30 minutes a session to discuss whatever they need. The instructor used Adobe connector for online meetings (or any other media). For student evaluation the instructor uses their engagement in the discus, finding, and writing the report. The process of the course evaluation is based on the creation list of questions that have never been discussed in the class, or any phase such as base line security, buffer overflow, and the answers for these 30 questions show that the students has had come across these definitions in their work to build and putting together the prototype, the evaluation. At this stage of adopting design thinking as an innovation teaching and learning method, the implementation was for a graduate program. Further study is needed to reflect on this method at the undergraduate learning process. Students have shown they have to be at the edge of technology to achieve their objective. 5. Conclusion Design thinking is usually measured by the ability to merge empathy for the context of a problem, inspiration in the generation Information Security Education Journal Volume 1 Number 1 March
9 of insights and solutions, and consistency to analyze and fit solutions to the context. Design thinking has become part business and management and lexicon of engineering practices. This method is a particular style of creative thinking-in-action has influence on education across disciplines. In this paper an information security course has been presented using design thinking, where students face the problem to build security program from no background. The outcome of this experiment shows that the students gain great experience indifferent topics in information security and they get this knowledge from: interviews, research, discussion, gathering ideas together and feedback. The work shows there are another approach to execute DT which is divides the course in many different projects. Overall result of this criticalthinking approach shows: the need for more courses to test it efficiency and effectiveness References [1] McKendrick, J. (2013 ). 5 steps for applying design thinking to enterprise service creation.can be retrieved from [2] Brooks, F. P. (2010). The design of design: essays from a computer scientist. Upper Saddle River, NJ: Addison Wesley. [3] Brown, T. (2009). Change by design: How design thinking transforms organizations and inspires innovation. New York, NY: Harper Business. [4] Businessdictionary.com. (2013). creative thinking. Retrieved from can be retrieved from [5] Click4it.org. (2014). design thinking. Retrieved from click4it.org: Can be retrieved from Design_Thinking#Step_by_Step_Process [6] Curedale, R. A. (February 1, 2013). Design Thinking: process and methods manual. Design Community College Inc. [7] Curedale, R. A. (June 1, 2013). Design Thinking Pocket Guide. Design Community College Inc. [8] Designthinkingforeducators.com. (2013). Design Thinking for Educators. Retrieved from designthinkingforeducators.com: Can be retrieved from [9] Fast, R. A., Roth, B., Wilde, D. J. (1993). Integrating Creativity into the Mechanical Engineering Curriculum. ASME [5] [5] [10] Resource Guide to Innovation in Engineering Design, American Society of Mechanical Engineers, New York. [11] Faste, R. (1994). Ambidextrous Thinking. Innovations in Mechanical Engineering Curricula for the 1990s, American Society of Mechanical Engineers, November. [12] Gestwicki, P., McNely, B. (2012). A case study of a five-step design thinking process in educational museum game design. Retrieved from can be retrieved from proceedings2012/mp2012_submission_37.pdf [13] Gray, L. -A. (2013). Making Education More Like Real Life Through Design Thinking. Retrieved 2013, from can be retrieved from [14] School.stanford.edu. (2013). Steps in a Design Thinking Process. Retrieved from hdschool.stanford.edu: Can be retrieved from [15] Jakes, D. (2013). Developing the Design Mind: An Introduction to Design Thinking. Retrieved from stanford.edu: Can be retrieved from [16] Kembel, G. (2009). Wakening creativity. Retrieved from kening_creativity [17] Learning-styles-online.com. (2013). Overview of Learning Styles. Retrieved from learning-styles-online.com: Can be retrived from [18] Lindberg, T., Noweski, C., Meinel, C. (2010). Evolving discourses on design thinking: how design cognition inspires metadisciplinary creative collaboration. Technoetic Arts, 8 (1) [19] Patnaik, D. ( 2009.). Forget Design Thinking and Try Hybrid Thinking. Fast Company. 14 Information Security Education Journal Volume 1 Number 1 March 2014
10 [20] Rowe, P. G. (1991). Design thinking. Cambridge, MA: The MIT Press. [21] Schon, D. (1983). The Reflective Practitioner: How Professionals Think in Action. ew York, NY: Basic Books. [22] Simon, H. (1969). The Sciences of the Artificial. Cambridge: MIT Press. [23] Simon, H. A. (1969). The sciences of the artificial.. Cambridge, MA: MIT Press. [24] Testout.com. (2013). Information Security Principles. Retrieved from security Pro: Can be retrived from home/it-certification-training/labsim-certification-training/security-pro. [25] Yurcik, W., Doss, D. (2001). Different Approaches in the Teaching of Information Systems Security. Published in the Proceedings of the Information Systems Education Conference (ISECON). Author Biography Dr. Al-Hamdani, Ph D form University of East Anglia (1985), UK, and Master from Loughborough University of Technology (1981), U.K, he played a leading role at KSU in developing the Cyber security program at graduate and undergraduate studies ; He was at the University of Technology in Baghdad from 1985 to He has published six textbooks dealing with Computer Science and Cryptography. For the past 23 years he has concentrated his research in cryptographic algorithms and computer security. Currently he is engage in information security research and teaching. Dr. Al-Hamdani has contributed many chapters in research textbooks, published more than 350 research paper and projects. Information Security Education Journal Volume 1 Number 1 March
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
TAKING DESIGN THINKING TO SCHOOLS
TAKING DESIGN THINKING TO SCHOOLS TAKING DESIGN THINKING TO SCHOOLS Taking Design Thinking to School is a collaboration of the Hasso Plattner Institute of Design (d.school), the School of Education (SUSE)
Security Compliance In a Post-ACA World
1 Security Compliance In a Post-ACA World Security Compliance in a Post-ACA World Discussion of building a security compliance framework as part of an ACA Health Insurance Exchange implementation. Further
Multidisciplinary Engineering Systems Graduate Education: Master of Engineering in Mechatronics
Multidisciplinary Engineering Systems Graduate Education: Master of Engineering in Mechatronics Kevin Craig College of Engineering Marquette University Milwaukee, WI, USA Phil Voglewede College of Engineering
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
Course Specification. MSc Audio Engineering 2016-17 (MSADE) www.leedsbeckett.ac.uk LEEDS BECKETT UNIVERSITY
LEEDS BECKETT UNIVERSITY Course Specification MSc Audio Engineering 2016-17 (MSADE) Our courses undergo a process of review periodically, in addition to annual review and enhancement. Course Specifications
IT Security Management Risk Analysis and Controls
IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent
CREATING ON-LINE MATERIALS FOR COMPUTER ENGINEERING COURSES
1 CREATING ON-LINE MATERIALS FOR COMPUTER ENGINEERING COURSES Abstract Suxia Cui 1, and Yonghui Wang 2 1 Electrical and Computer Engineering Department 2 Engieering Technology Department Prairie View A&M
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
Department of Engineering & Technology IT 112 Product Development & Design Proposed University Studies Course
Department of Engineering & Technology IT 112 Product Development & Design Proposed University Studies Course The Department of Engineering & Technology is proposing to include IT 112 in the University
System Security Certification and Accreditation (C&A) Framework
System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:
Programme Specification and Curriculum Map for BSc (Hons) Computer Forensics
Programme Specification and Curriculum Map for BSc (Hons) Computer Forensics 1. Programme title Computer Forensics 2. Awarding institution Middlesex University 3. Teaching institution 4. Programme accredited
Multimedia Systems Engineering
Appendix 3.11 Multimedia Systems Engineering Major Profile MASSEY UNIVERSITY BACHELOR OF ENGINEERING with HONOURS Multimedia Systems Engineering Major Profile Description and Competency Framework 2009
Honours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information
Honours Degree (top-up) Computing Abbreviated Programme Specification Containing Both Core + Supplementary Information 1 Awarding Institution / body: Lancaster University 2a Teaching institution: University
The CS Principles Project 1
The CS Principles Project 1 Owen Astrachan, Duke University Amy Briggs, Middlebury College Abstract The Computer Science Principles project is part of a national effort to reach a wide and diverse audience
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Instructional. Design& Technology. Areas of Focus. Areas of Focus. Master of Science Degree Program
Instructional Design& Technology Master of Science Degree Program Whether it s in a corporate training facility or high school classroom, the instructor s role is one of the most important in our society.
INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION
INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION Amruth N. Kumar (Moderator) Ramapo College of New Jersey, Mahwah, NJ [email protected] Jack Beidler University of Scranton, PA [email protected]
Department: PSYC. Course No.: 132. Credits: 3. Title: General Psychology I. Contact: David B. Miller. Content Area: CA 3 Science and Technology
Department: PSYC Course No.: 132 Credits: 3 Title: General Psychology I. Contact: David B. Miller Content Area: CA 3 Science and Technology Catalog Copy: 132. General Psychology I Course Information: (a)
Lesson Plan. Course Title: Advanced Computer Programming Session Title: Databases. Preparation
Lesson Plan Course Title: Advanced Computer Programming Session Title: Databases Lesson Duration: 2-3 days Performance Objective: Upon completion of this assignment, the student will be able to: identify
Computer Forensics and Security Management PGDip/MSc
SCHOOL OF COMPUTING & MATHEMATICAL SCIENCES Computer Forensics and Security Management PGDip/MSc Greenwich Campus www.gre.ac.uk/cms Why study this programme? This programme is designed for graduates with
Describe the process of parallelization as it relates to problem solving.
Level 2 (recommended for grades 6 9) Computer Science and Community Middle school/junior high school students begin using computational thinking as a problem-solving tool. They begin to appreciate the
Curran, K. Tutorials. Independent study (including assessment) N/A
MODULE TITLE: MODULE CODE: Systems Security COM535 YEAR OF REVISION: 2013/14 MODULE LEVEL: 6 CREDIT POINTS: 20 MODULE STATUS: SEMESTER: 1 LOCATION: E-LEARNING: PREREQUISITE(S): CO-REQUISITE(S): MODULE
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
Interdisciplinary Program in Information Security and Assurance. By Kossi Edoh NC A&T State University Greensboro
Interdisciplinary Program in Information Security and Assurance By Kossi Edoh NC A&T State University Greensboro Information Assurance The protection of electronic information and infrastructures that
INDIANAPOLIS, IN 2011 CATALOG Volume 78
TABLE OF CONTENTS CURRICULA 2 SCHOOL OF INFORMATION TECHNOLOGY 2 INFORMATION SYSTEMS AND CYBERSECURITY (RESIDENCE PROGRAM) 2 INFORMATION SYSTEMS AND CYBERSECURITY (ONLINE PROGRAM) 3 INFORMATION SYSTEMS
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.
University of the Arts London (UAL)
Programme Specification Every taught course of study leading to a UAL award is required to have a Programme Specification. This summarises the course aims, learning outcomes, teaching, learning and assessment
School of Computing and Technology
School of Computing and Technology We offer employmentfocused education and research in computing, the built environment and engineering, giving our students industry-relevant skills and knowledge. Applied
UNDERGRADUATE PROGRAMME SPECIFICATION
UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: Intermediate Awards: Mode of Study: UCAS Codes: QAA Subject Benchmarks: JACS Code: Recognised by:
Intro to Human Centered Service Design Thinking
Intro to Human Centered Service Design Thinking thinkjarcollective.com Adapted from ideo.org DESIGN A BETTER COMMUTE DISCOVER Human-centered design begins with in-depth interviews and qualitative research.
Computer Graphics Art Curriculum Resources
Computer Graphics Art Curriculum Resources Dena E. Eber Bowling Green State University Bowling Green, OH USA [email protected] Abstract This paper describes the Computer Graphics Art Curriculum Resources
Programme Specification. BSc (Hons) Sound Technology and Digital Music. Valid from: September 2012 Faculty of Technology, Design and Environment
Programme Specification BSc (Hons) Sound Technology and Digital Music Valid from: September 2012 Faculty of Technology, Design and Environment SECTION 1: GENERAL INFORMATION Awarding body: Teaching institution
2014 New Jersey Core Curriculum Content Standards - Technology
2014 New Jersey Core Curriculum Content s - Technology Content Area Grade Content Statement Students will: Technology A. Technology Operations and Concepts: Students demonstrate a sound understanding of
Honours Degree (top-up) Business Abbreviated Programme Specification Containing Both Core + Supplementary Information
Honours Degree (top-up) Business Abbreviated Programme Specification Containing Both Core + Supplementary Information 1 Awarding Institution / body: Lancaster University 2a Teaching institution: University
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Fall 2014: Graphic Design
Fall 2014: Graphic Design Graphic design is a large and growing profession in demand in the global communications world. In addition to an emphasis on traditional skills and production methods, the program
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Security Control Standards Catalog
Security Control Standards Catalog Version 1.2 Texas Department of Information Resources April 3, 2015 Contents About the Security Control Standards Catalog... 1 Document Life Cycle... 1 Revision History...
JOB DESCRIPTION. 1. JOB TITLE: Senior Lecturer in Computer Science (Cyber Security)
JOB DESCRIPTION 1. JOB TITLE: Senior Lecturer in Computer Science (Cyber Security) 2. HRMS REFERENCE NUMBER: HR14195 3. ROLE CODE: FINSLTSR4 4. DEPARTMENT: Department of Computer Science Faculty of Science
Conquering the Missing Link: Arts Integration in Secondary Schools
PARTNERS IN EDUCATION ANNUAL MEETING Conquering the Missing Link: Arts Integration in Secondary Schools Deborah Brzoska, Susana Browne, Patricia Relph, Rae Takemoto February 5, 2015 10:30 AM 12:30 PM The
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
CONTINUOUS MONITORING
CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how
ASET Online Education Development of learning modules:
ASET Online Education Development of learning modules: Goals: The primary goals in creating courses of study in various neurodiagnostic modalities are threefold: To provide a method of systematic training
QUEEN S UNIVERSITY BELFAST. e-learning and Distance Learning Policy 2009-2012
QUEEN S UNIVERSITY BELFAST e-learning and Distance Learning Policy 2009-2012 1 Introduction The University defines e-learning as learning facilitated and supported through the use of information and communication
Programme Specification and Curriculum Map for MSci Sports Informatics & Data Analytics
Programme Specification and Curriculum Map for MSci Sports Informatics & Data Analytics 1. Programme title MSci in Sports Informatics & Data Analytics 2. Awarding institution Middlesex University 3. Teaching
Program Your Own Game
Program Your Own Game Provided by TryEngineering - Lesson Focus Lesson focuses on how software engineers design computer games and other software. Student teams work together to develop a simple computer
From User-Centered to Participatory Design Approaches
From User-Centered to Participatory Design Approaches Elizabeth B.-N. Sanders SonicRim Abstract There is a shift in perspective occurring today at the collaborative edge of design and social science. It
Security Controls Assessment for Federal Information Systems
Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Bellingham Control System Cyber Security Case Study
Bellingham Control System Cyber Security Case Study Marshall Abrams Joe Weiss Presented at at 2007 Annual Computer Security Applications Conference Case Study Synopsis Examine actual control system cyber
City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013
City University of Hong Kong Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 01/013 Part I Course Title: Course Code: Course Duration: Cryptography
LOUGHBOROUGH UNIVERSITY
LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical
COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)
FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide
Restructuring a Masters Teaching Program
Restructuring a Masters Teaching Program Marilyn Koeller National University This article will explain the process that Course Leads used to restructure the Masters in the Arts of Teaching program by working
Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer
Syllabus No: CIS 200 Title: Fundamentals of Network Security Credits: 4 Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer Instructor: Dr. B. Dike-Anyiam, Computer Science & Networking
JOB DESCRIPTION. 1. JOB TITLE: Senior Lecturer in Computer Science (Cyber Security)
JOB DESCRIPTION 1. JOB TITLE: Senior Lecturer in Computer Science (Cyber Security) 2. HRMS REFERENCE NUMBER: HR14196 3. ROLE CODE: FINSLTSR5 4. DEPARTMENT: Department of Computer Science Faculty of Science
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
eorgette ullivan Portfolio
Portfolio Experience Designer: Design Research, Interaction and Visual Design georgettes.com [email protected] 512-362-8078 Innovating Enterprise IT Management Software Description Create a reference
RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE. ARTS 248: Designing Motion Graphics
I. Basic Course Information RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE ARTS 248: Designing Motion Graphics A. Course Number and Title: ARTS-248 Designing Motion Graphics B. New or Modified
Masters in Information Technology
Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101
Student Union B, Room 100 (501) 569-3160. Professional and
Student Union B, Room 100 (501) 569-3160 Professional and Master of Arts in Professional and Technical Writing Technical Writing The Master of Arts in Professional and Technical Writing (PTW) program provides
Programme Specification and Curriculum Map for BSc Honours Information Technology
Programme Specification and urriculum Map for Sc Honours Information Technology 1. Programme title Sc Honours Information Technology 2. warding institution Middlesex University 3. Teaching institution
THREE-YEAR COURSES VISUAL & MULTIMEDIA DESIGN
THREE-YEAR COURSES VISUAL & MULTIMEDIA DESIGN undergraduate programmes three-year course visual & multimedia design 02 Brief descriptive summary Over the past 80 years Istituto Marangoni has grown and
Comparison of Teaching Systems Analysis and Design Course to Graduate Online Students verses Undergraduate On-campus Students
Comparison of Teaching Systems Analysis and Design Course to Graduate Online Students verses Undergraduate On-campus Students Adeel Khalid a1* a Assistant Professor, Systems and Mechanical Engineering
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental
Security Self-Assessment Tool
Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security
Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science
Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will
CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University
Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University Course Description: Concepts and issues in physical and cyber security; technological vulnerabilities
Computer Technology Standards of Learning for Virginia s Public Schools
Computer Technology Standards of Learning for Virginia s Public Schools February 2013 Board of Education Commonwealth of Virginia Introduction As the new century has unfolded, various studies have postulated
JOB DESCRIPTION. 1. JOB TITLE: Lecturer in Theology and Religious Studies. 2. DEPARTMENT: Theology and Religious Studies. 3. DATE: October 2012
JOB DESCRIPTION 1. JOB TITLE: Lecturer in Theology and Religious Studies 2. DEPARTMENT: Theology and Religious Studies 3. DATE: October 2012 4. ORGANISATION: 5. JOB PURPOSE: This post is funded by a grant
Compliance Overview: FISMA / NIST SP800 53
Compliance Overview: FISMA / NIST SP800 53 FISMA / NIST SP800 53: Compliance Overview With Huntsman SIEM The US Federal Information Security Management Act (FISMA) is now a key element of the US Government
Teaching principles of management through experiential and service learning
Teaching principles of management through experiential and service learning ABSTRACT Omid Furutan University of La Verne Management faculties often use cases, simulations, and research projects to achieve
Master of Science in Information Security and Assurance
Master of Science in Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the 10 security domains that are
Introduction to Curriculum CLDDV 107. 10:05 a.m. 1:10 p.m. Section 2035. Tuesday, January 17, 2012 A G E N D A
Introduction to Curriculum CLDDV 107 10:05 a.m. 1:10 p.m. Section 2035 Tuesday, January 17, 2012 A G E N D A I N T R O D U C T I O N S S Y L L A B U S A N D A C T I V I T Y C A L E N D A R G E T T I N
For students entering in 2006. Aristotle University, Thessalonica University Carlos III, Madrid
Erasmus Mundus MSc in Network and e Business Centred Computing For students entering in 2006 Awarding Institutions: Teaching Institutions: The University of Reading, Aristotle University, Thessalonica
EDUCATION FOR THE FUTURE. www.itt-tech.edu
EDUCATION FOR THE FUTURE www.itt-tech.edu THE MISSION OF THE ITT TECHNICAL INSTITUTE The THE ITT MISSION Technical of ITT Educational Institute is Services, an institution Inc., and ITT of Technical higher
An Information Assurance and Security Curriculum Implementation
Issues in Informing Science and Information Technology Volume 3, 2006 An Information Assurance and Security Curriculum Implementation Samuel P. Liles and Reza Kamali Purdue University Calumet, Hammond,
Web design & planning
Instructor Guide Timing: 12 to 18 hours Level: Ages 15 and up Web design & planning Project Overview In this project, student teams work on a project to build a website for a client. The client selects
Report on Game Design and Development Courses Meeting Knowledge Areas
Report on Game Design and Development Courses Meeting Knowledge Areas Brent M. Dingle Summer 2014 Revised Fall 2014 and Spring 2015 Abstract This document approaches a Game Design and Development (GDD)
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics
Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security & Digital Forensics 2. Awarding institution Middlesex University 3. Teaching
BSc (Hons) Computer Animation
BSc (Hons) Computer Animation Programme Specification EDM-DJ-08/2014 Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and
A Primer on Writing Effective Learning-Centered Course Goals
A Primer on Writing Effective Learning-Centered Course Goals Robert K. Noyd (DFB) & The Staff of The Center for Educational Excellence (CEE) US Air Force Academy A Shift from a Topic-Centered to a Learning-Centered
MA Design for Digital Media
MA Design for Digital Media Programme Specification EDM-DJ-08/2015 Primary Purpose: Course management, monitoring and quality assurance. Secondary Purpose: Detailed information for students, staff and
