APPROACHES TO THE FORMATION OF SCIENTIFIC THINKING IN CYBERSECURITY HIGH SCHOOL STUDENTS
DOI:
https://doi.org/10.28925/2663-4023.2022.18.124137Keywords:
cyber security; information technology; IT; information protection; specialty passport; CDIO; learning process.Abstract
The need for specialists in the development of information systems is growing, therefore the cost and demand for educational programs and courses for “quick” entry into the specialty is increasing. Training of information security specialists is impossible without current and clear standards and training programs. Currently, there is no clear standard for a Cybersecurity major for Ph.D. The public discourse on the development and processing of passports of specialties should actualize the problems and challenges of the modern world market of information technologies. The application of best practices in state institutions and services will strengthen the security of the Ukrainian state. This article uses the experience of working with students of higher education at different levels. The corpus of the author’s publications over the past six years is used as the object of the research. The main research methods are a critical analysis of approaches to the activation of creative approaches in acquirers; comparative analysis of difficulties in preparing for the experiment and classification of publications by research areas. The work presents an overview of the information security labor market, its structure and features of interaction between employers and job applicants. The peculiarities of the development of information security specialists, as well as their phases of formation, are considered separately. Consolidation of university curricula and comparison of passports of scientific specialties (05.13.21 information protection systems, 21.05.01 information security, 05.13.06 information technologies, 13.00.10 information and communication technologies in education) of doctors of philosophy made it possible to single out the main directions, which a graduate of the “Cybersecurity” specialty should know and be able to do. Methods of involving students and graduate students in active learning are considered in a separate block. Statistics of cooperation with acquirers are analyzed, and it is shown that covering all aspects of cybersecurity is not always possible
Downloads
References
Buriachok, V., et al. (2020). Application of Ni Multisim Environment in the Practical Skills Building for Students of 125 “Cybersecurity” Specialty. Cybersecurity: Education, Science, Technique, 1(9), 159–169. https://doi.org/10.28925/2663-4023.2020.9.159169
Nashynets-Naumova, А., et al. (2020). Technology for Information and Cyber Security in Higher Education Institutions of Ukraine. Information Technologies and Learning Tools, 77(3), 337–354. https://doi.org/10.33407/itlt.v77i3.3424
Buriachok, V., et al. (2018). Training Model for Professionals in the Field of Information and Cyber Security in the Higher Educational Institutions of Ukraine. Information Technologies and Learning Tools, 67(5), 277–291. https://doi.org/10.33407/itlt.v67i5.2347
Buriachok, V., et al. (2021). Interdisciplinary Approach to the Development of Is Risk Management Skills on the Basis of Decision-Making Theory. Cybersecurity: Education, Science, Technique, 3(11), 155–165. https://doi.org/10.28925/2663-4023.2021.11.155165
Shevchenko, S., et al. (2020). Conducting a Swot-Analysis of Information Risk Assessment as a Means of Formation of Practical Skills of Students Specialty 125 Cyber Security. Cybersecurity: Education, Science, Technique, 2(10), 158–168. https://doi.org/10.28925/2663-4023.2020.10.158168
Delhij, A., van Solingen, R., Wijnands, W. (2015). The eduScrum Guide “The rules of the Game.”
Order “On the Specifics of the Introduction of the List of Fields of Knowledge and Specialties for which Higher Education Applicants are Trained, Approved by the Resolution of the Cabinet of Ministers of Ukraine dated April 29, 2015 No. 266,” #1460/27905 (2015). https://zakon.rada.gov.ua/rada/show/z1460-15
Yevdokymenko, M., Sokolov, V. (2019). Overview of the Course in “Wireless and Mobile Security.” Educating the Next Generation MSc in Cyber Security, 104–119. https://doi.org/10.5281/zenodo.2647747
Specialty passport “05.13.21 Information Protection Systems,” #26-08/2 (1999). https://zakon.rada.gov.ua/rada/show/v08_2330-99
Specialty passport “21.05.01 Information Security of the State,” #9-108-t (2000).
Specialty passport “05.13.06 Information Technologies,” #47-08/6 (2007). https://zakon.rada.gov.ua/rada/show/v0047330-07
Specialty passport “13.00.10 Information and Communication Technologies in Education,” #200-06/1 (2009). https://zakon.rada.gov.ua/rada/show/v200-330-09
Specialty passport “21.03.01 Humanitarian and Political Security of the State (Philosophical Sciences),” #11-10/11t (2004). https://zakon.rada.gov.ua/rada/show/v0_11330-04
Specialty passport “21.04.01 Economic Security of the State (Economic Sciences),” #11-10/11t (2004). https://zakon.rada.gov.ua/rada/show/va11-330-04
Specialty passport “21.06.01 Environmental Safety,” #33-07/7 (2001). https://zakon.rada.gov.ua/rada/show/va7_7330-01
Pylypchuk, V., Doronin, I. (2018). National Security Law and Military Law: Theoretical and Applied Principles of Formation and Development in Ukraine. Information and law, 2(25), 62–72. http://ippi.org.ua/sites/default/files/8_8.pdf
CDIO Office (2019). CDIO Standards 2.1. http://www.cdio.org/content/cdio-standards-21
Bogachuk, I., Sokolov, V., Buriachok, V. (2018). Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers. In V International Scientific and Practical Conference Problems of Infocommunications. Science and Technology (pp. 581–585). https://doi.org/10.1109/infocommst.2018.8632151
Hu, Z., et al. (2020). Bandwidth Research of Wireless IoT Switches. In 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (pp. 546–550). https://doi.org/10.1109/tcset49122.2020.235492
Hu, Z., et al. (2020). Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4–2.5 GHz Range. Data-Centric Business and Applications, 48, 675–709. https://doi.org/10.1007/978-3-030-43070-2_29
Vladymyrenko, M., Sokolov, V., Astapenia, V. (2019). Study of Stability of Peer-to-Peer Wireless Networks with Self-Organization. Cybersecurity: Education, Science, Technique, 3, 6–26. https://doi.org/10.28925/2663-4023.2019.3.626
Kipchuk, F., et al. (2020). Investigation of Availability of Wireless Access Points based on Embedded Systems. In VI International Scientific and Practical Conference Problems of Infocommunications. Science and Technology (pp. 246–250). https://doi.org/10.1109/
picst47496.2019.9061551
Sokolov, V., Vovkotrub, B., Zotkin, I. (2019). Comparative Analysis of Bandwidth of Low-Power Wireless IoT Switches. Cybersecurity: Education, Science, Technique, 1(5), 16–30. https://doi.org/10.28925/2663-4023.2019.5.1630
Byts, A., et al. (2021). Experimental Determination of the Optimal Parameters of Teleconferencing on Mobile Devices. Cybersecurity: Education, Science, Technique, 2(14), 68–86. https://doi.org/10.28925/2663-4023.2021.14.6886
Taj Dini, M., Sokolov, V. (2017). Internet of Things Security Problems. Modern Information Protection, 1, 120–127.
Vladymyrenko, M., et al. (2019). Analysis of Implementation Results of the Distributed Access Control System. In VI International Scientific and Practical Conference Problems of Infocommunications. Science and Technology (pp. 39–44). https://doi.org/10.1109/picst47496.2019.9061376
Taj Dini, M., Sokolov, V. (2018). Penetration Tests for Bluetooth Low Energy and Zigbee using the Software-Defined Radio. Modern Information Protection, 1, 82–89.
TajDini, M., Sokolov, V., Buriachok, V. (2019). Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio. In 8th International Conference on “Mathematics. Information Technologies. Education” (pp. 287–296).
Buriachok, V., Sokolov, V., Taj Dini, M. (2020). Research of Caller ID Spoofing Launch, Detection, and Defense. Cybersecurity: Education, Science, Technique, 1(7), 6–16. https://doi.org/10.28925/2663-4023.2020.7.616
TajDini, M., Sokolov, V., Skladannyi, P. (2021). Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio. In IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (pp. 7–11). https://doi.org/10.1109/ukrmico52950.2021.9716665
Sokolov, V., Korzhenko, O. (2018). Analysis of Recent Attacks based on Social Engineering Techniques. In All-Ukrainian scientific and practical conference of higher education graduates and young scientists “Computer engineering and cyber security: achievements and innovations” (pp. 361–363). https://doi.org/10.2139/ssrn.3455471
Sokolov, V., Kurbanmuradov D. (2018). The Method of Combating Social Engineering at the Objects of Information Activity. Cybersecurity: Education, Science, Technique, 1, 6–16. https://doi.org/10.28925/2663-4023.2018.1.616
Marusenko, R., Sokolov, V., Buriachok, V. (2020). Experimental Evaluation of Phishing Attack on High School Students. Advances in Computer Science for Engineering and Education III, 1247, 668–680. https://doi.org/10.1007/978-3-030-55506-1_59
Marusenko, R., Sokolov, V., Bogachuk, I. (2022). Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation. Advances in Artificial Systems for Logistics Engineering, 135, 583–594. https://doi.org/10.1007/978-3-031-04809-8_53
Iosifova, O., et al. (2020). Techniques Comparison for Natural Language Processing. In 2nd International Workshop on Modern Machine Learning Technologies and Data Science (pp. 57–67).
Iosifov, I., Iosifova, O., Sokolov, V. (2020). Sentence Segmentation from Unformatted Text using Language Modeling and Sequence Labeling Approaches. In VII International Scientific and Practical Conference Problems of Infocommunications. Science and Technology (pp. 335–337). https://doi.org/10.1109/picst51311.2020.9468084
Romanovskyi, O., et al. (2020). Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition. Advances in Computer Science for Engineering and Education IV, 83, 25–36. https://doi.org/10.1007/978-3-030-80472-5_3
Iosifova, O., et al. (2021). Analysis of Automatic Speech Recognition Methods. In Workshop on Cybersecurity Providing in Information and Telecommunication Systems (pp. 252–257).
Iosifov, I., et al. (2022). Natural Language Technology to Ensure the Safety of Speech Information. In Workshop on Cybersecurity Providing in Information and Telecommunication Systems II (pp. 216–226).
Iosifov, I., et al. (2022). Transferability Evaluation of Speech Emotion Recognition Between Different Languages. Advances in Computer Science for Engineering and Education, 134, 413–426. https://doi.org/10.1007/978-3-031-04812-8_35
TajDini, M., et al. (2020). Wireless Sensors for Brain Activity — A Survey, Electronics, 9(12), 1–26. https://doi.org/10.3390/electronics9122092
Hu, Z., et al. (2021). Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence. Advances in Computer Science for Engineering and Education IV, 83, 374–388. https://doi.org/10.1007/978-3-030-80472-5_31
Kurbanmuradov, D., Sokolov, V., Astapenia, V. (2019). Implementation of the XTEA Encryption Protocol based on Wireless Systems of the IEEE 802.15.4 Standard. Cybersecurity: Education, Science, Technique, 2(6). 32–45. https://doi.org/10.28925/2663-4023.2019.6.3245
Tsyrkaniuk, D., et al. (2021). The Method of Building Profiles of the Marketplace User and the Attacker. Cybersecurity: Education, Science, Technique, 2(14), 50–67. https://doi.org/10.28925/2663-4023.2021.14.5067
Kipchuk, F., et al. (2021). Assessing Approaches of IT Infrastructure Audit. In 8th International Conference on Problems of Infocommunications, Science and Technology (pp. 213–217). https://doi.org/10.1109/picst54195.2021.9772181
Buriachok, V., Sokolov, V. (2019). Implementation of Active Learning in the Master’s Program on Cybersecurity. Advances in Computer Science for Engineering and Education II, 938, 610–624. https://doi.org/10.1007/978-3-030-16621-2_57
Buriachok, V., Shevchenko, S., Skladannyi, P. (2018). Virtual Laboratory for Modeling of Processes in Informational and Cyber Securities as a form of Forming Practical Skills of Students. Cybersecurity: Education, Science, Technique, 2(2), 98–104. https://doi.org/10.28925/2663-4023.2018.2.98104
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Volodymyr Sokolov
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.