APPROACHES TO THE FORMATION OF SCIENTIFIC THINKING IN CYBERSECURITY HIGH SCHOOL STUDENTS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2022.18.124137

Keywords:

cyber security; information technology; IT; information protection; specialty passport; CDIO; learning process.

Abstract

The need for specialists in the development of information systems is growing, therefore the cost and demand for educational programs and courses for “quick” entry into the specialty is increasing. Training of information security specialists is impossible without current and clear standards and training programs. Currently, there is no clear standard for a Cybersecurity major for Ph.D. The public discourse on the development and processing of passports of specialties should actualize the problems and challenges of the modern world market of information technologies. The application of best practices in state institutions and services will strengthen the security of the Ukrainian state. This article uses the experience of working with students of higher education at different levels. The corpus of the author’s publications over the past six years is used as the object of the research. The main research methods are a critical analysis of approaches to the activation of creative approaches in acquirers; comparative analysis of difficulties in preparing for the experiment and classification of publications by research areas. The work presents an overview of the information security labor market, its structure and features of interaction between employers and job applicants. The peculiarities of the development of information security specialists, as well as their phases of formation, are considered separately. Consolidation of university curricula and comparison of passports of scientific specialties (05.13.21 information protection systems, 21.05.01 information security, 05.13.06 information technologies, 13.00.10 information and communication technologies in education) of doctors of philosophy made it possible to single out the main directions, which a graduate of the “Cybersecurity” specialty should know and be able to do. Methods of involving students and graduate students in active learning are considered in a separate block. Statistics of cooperation with acquirers are analyzed, and it is shown that covering all aspects of cybersecurity is not always possible

Downloads

Download data is not yet available.

References

Buriachok, V., et al. (2020). Application of Ni Multisim Environment in the Practical Skills Building for Students of 125 “Cybersecurity” Specialty. Cybersecurity: Education, Science, Technique, 1(9), 159–169. https://doi.org/10.28925/2663-4023.2020.9.159169

Nashynets-Naumova, А., et al. (2020). Technology for Information and Cyber Security in Higher Education Institutions of Ukraine. Information Technologies and Learning Tools, 77(3), 337–354. https://doi.org/10.33407/itlt.v77i3.3424

Buriachok, V., et al. (2018). Training Model for Professionals in the Field of Information and Cyber Security in the Higher Educational Institutions of Ukraine. Information Technologies and Learning Tools, 67(5), 277–291. https://doi.org/10.33407/itlt.v67i5.2347

Buriachok, V., et al. (2021). Interdisciplinary Approach to the Development of Is Risk Management Skills on the Basis of Decision-Making Theory. Cybersecurity: Education, Science, Technique, 3(11), 155–165. https://doi.org/10.28925/2663-4023.2021.11.155165

Shevchenko, S., et al. (2020). Conducting a Swot-Analysis of Information Risk Assessment as a Means of Formation of Practical Skills of Students Specialty 125 Cyber Security. Cybersecurity: Education, Science, Technique, 2(10), 158–168. https://doi.org/10.28925/2663-4023.2020.10.158168

Delhij, A., van Solingen, R., Wijnands, W. (2015). The eduScrum Guide “The rules of the Game.”

Order “On the Specifics of the Introduction of the List of Fields of Knowledge and Specialties for which Higher Education Applicants are Trained, Approved by the Resolution of the Cabinet of Ministers of Ukraine dated April 29, 2015 No. 266,” #1460/27905 (2015). https://zakon.rada.gov.ua/rada/show/z1460-15

Yevdokymenko, M., Sokolov, V. (2019). Overview of the Course in “Wireless and Mobile Security.” Educating the Next Generation MSc in Cyber Security, 104–119. https://doi.org/10.5281/zenodo.2647747

Specialty passport “05.13.21 Information Protection Systems,” #26-08/2 (1999). https://zakon.rada.gov.ua/rada/show/v08_2330-99

Specialty passport “21.05.01 Information Security of the State,” #9-108-t (2000).

Specialty passport “05.13.06 Information Technologies,” #47-08/6 (2007). https://zakon.rada.gov.ua/rada/show/v0047330-07

Specialty passport “13.00.10 Information and Communication Technologies in Education,” #200-06/1 (2009). https://zakon.rada.gov.ua/rada/show/v200-330-09

Specialty passport “21.03.01 Humanitarian and Political Security of the State (Philosophical Sciences),” #11-10/11t (2004). https://zakon.rada.gov.ua/rada/show/v0_11330-04

Specialty passport “21.04.01 Economic Security of the State (Economic Sciences),” #11-10/11t (2004). https://zakon.rada.gov.ua/rada/show/va11-330-04

Specialty passport “21.06.01 Environmental Safety,” #33-07/7 (2001). https://zakon.rada.gov.ua/rada/show/va7_7330-01

Pylypchuk, V., Doronin, I. (2018). National Security Law and Military Law: Theoretical and Applied Principles of Formation and Development in Ukraine. Information and law, 2(25), 62–72. http://ippi.org.ua/sites/default/files/8_8.pdf

CDIO Office (2019). CDIO Standards 2.1. http://www.cdio.org/content/cdio-standards-21

Bogachuk, I., Sokolov, V., Buriachok, V. (2018). Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers. In V International Scientific and Practical Conference Problems of Infocommunications. Science and Technology (pp. 581–585). https://doi.org/10.1109/infocommst.2018.8632151

Hu, Z., et al. (2020). Bandwidth Research of Wireless IoT Switches. In 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (pp. 546–550). https://doi.org/10.1109/tcset49122.2020.235492

Hu, Z., et al. (2020). Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4–2.5 GHz Range. Data-Centric Business and Applications, 48, 675–709. https://doi.org/10.1007/978-3-030-43070-2_29

Vladymyrenko, M., Sokolov, V., Astapenia, V. (2019). Study of Stability of Peer-to-Peer Wireless Networks with Self-Organization. Cybersecurity: Education, Science, Technique, 3, 6–26. https://doi.org/10.28925/2663-4023.2019.3.626

Kipchuk, F., et al. (2020). Investigation of Availability of Wireless Access Points based on Embedded Systems. In VI International Scientific and Practical Conference Problems of Infocommunications. Science and Technology (pp. 246–250). https://doi.org/10.1109/

picst47496.2019.9061551

Sokolov, V., Vovkotrub, B., Zotkin, I. (2019). Comparative Analysis of Bandwidth of Low-Power Wireless IoT Switches. Cybersecurity: Education, Science, Technique, 1(5), 16–30. https://doi.org/10.28925/2663-4023.2019.5.1630

Byts, A., et al. (2021). Experimental Determination of the Optimal Parameters of Teleconferencing on Mobile Devices. Cybersecurity: Education, Science, Technique, 2(14), 68–86. https://doi.org/10.28925/2663-4023.2021.14.6886

Taj Dini, M., Sokolov, V. (2017). Internet of Things Security Problems. Modern Information Protection, 1, 120–127.

Vladymyrenko, M., et al. (2019). Analysis of Implementation Results of the Distributed Access Control System. In VI International Scientific and Practical Conference Problems of Infocommunications. Science and Technology (pp. 39–44). https://doi.org/10.1109/picst47496.2019.9061376

Taj Dini, M., Sokolov, V. (2018). Penetration Tests for Bluetooth Low Energy and Zigbee using the Software-Defined Radio. Modern Information Protection, 1, 82–89.

TajDini, M., Sokolov, V., Buriachok, V. (2019). Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio. In 8th International Conference on “Mathematics. Information Technologies. Education” (pp. 287–296).

Buriachok, V., Sokolov, V., Taj Dini, M. (2020). Research of Caller ID Spoofing Launch, Detection, and Defense. Cybersecurity: Education, Science, Technique, 1(7), 6–16. https://doi.org/10.28925/2663-4023.2020.7.616

TajDini, M., Sokolov, V., Skladannyi, P. (2021). Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio. In IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (pp. 7–11). https://doi.org/10.1109/ukrmico52950.2021.9716665

Sokolov, V., Korzhenko, O. (2018). Analysis of Recent Attacks based on Social Engineering Techniques. In All-Ukrainian scientific and practical conference of higher education graduates and young scientists “Computer engineering and cyber security: achievements and innovations” (pp. 361–363). https://doi.org/10.2139/ssrn.3455471

Sokolov, V., Kurbanmuradov D. (2018). The Method of Combating Social Engineering at the Objects of Information Activity. Cybersecurity: Education, Science, Technique, 1, 6–16. https://doi.org/10.28925/2663-4023.2018.1.616

Marusenko, R., Sokolov, V., Buriachok, V. (2020). Experimental Evaluation of Phishing Attack on High School Students. Advances in Computer Science for Engineering and Education III, 1247, 668–680. https://doi.org/10.1007/978-3-030-55506-1_59

Marusenko, R., Sokolov, V., Bogachuk, I. (2022). Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation. Advances in Artificial Systems for Logistics Engineering, 135, 583–594. https://doi.org/10.1007/978-3-031-04809-8_53

Iosifova, O., et al. (2020). Techniques Comparison for Natural Language Processing. In 2nd International Workshop on Modern Machine Learning Technologies and Data Science (pp. 57–67).

Iosifov, I., Iosifova, O., Sokolov, V. (2020). Sentence Segmentation from Unformatted Text using Language Modeling and Sequence Labeling Approaches. In VII International Scientific and Practical Conference Problems of Infocommunications. Science and Technology (pp. 335–337). https://doi.org/10.1109/picst51311.2020.9468084

Romanovskyi, O., et al. (2020). Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition. Advances in Computer Science for Engineering and Education IV, 83, 25–36. https://doi.org/10.1007/978-3-030-80472-5_3

Iosifova, O., et al. (2021). Analysis of Automatic Speech Recognition Methods. In Workshop on Cybersecurity Providing in Information and Telecommunication Systems (pp. 252–257).

Iosifov, I., et al. (2022). Natural Language Technology to Ensure the Safety of Speech Information. In Workshop on Cybersecurity Providing in Information and Telecommunication Systems II (pp. 216–226).

Iosifov, I., et al. (2022). Transferability Evaluation of Speech Emotion Recognition Between Different Languages. Advances in Computer Science for Engineering and Education, 134, 413–426. https://doi.org/10.1007/978-3-031-04812-8_35

TajDini, M., et al. (2020). Wireless Sensors for Brain Activity — A Survey, Electronics, 9(12), 1–26. https://doi.org/10.3390/electronics9122092

Hu, Z., et al. (2021). Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence. Advances in Computer Science for Engineering and Education IV, 83, 374–388. https://doi.org/10.1007/978-3-030-80472-5_31

Kurbanmuradov, D., Sokolov, V., Astapenia, V. (2019). Implementation of the XTEA Encryption Protocol based on Wireless Systems of the IEEE 802.15.4 Standard. Cybersecurity: Education, Science, Technique, 2(6). 32–45. https://doi.org/10.28925/2663-4023.2019.6.3245

Tsyrkaniuk, D., et al. (2021). The Method of Building Profiles of the Marketplace User and the Attacker. Cybersecurity: Education, Science, Technique, 2(14), 50–67. https://doi.org/10.28925/2663-4023.2021.14.5067

Kipchuk, F., et al. (2021). Assessing Approaches of IT Infrastructure Audit. In 8th International Conference on Problems of Infocommunications, Science and Technology (pp. 213–217). https://doi.org/10.1109/picst54195.2021.9772181

Buriachok, V., Sokolov, V. (2019). Implementation of Active Learning in the Master’s Program on Cybersecurity. Advances in Computer Science for Engineering and Education II, 938, 610–624. https://doi.org/10.1007/978-3-030-16621-2_57

Buriachok, V., Shevchenko, S., Skladannyi, P. (2018). Virtual Laboratory for Modeling of Processes in Informational and Cyber Securities as a form of Forming Practical Skills of Students. Cybersecurity: Education, Science, Technique, 2(2), 98–104. https://doi.org/10.28925/2663-4023.2018.2.98104

Downloads


Abstract views: 204

Published

2022-12-29

How to Cite

Sokolov, V. (2022). APPROACHES TO THE FORMATION OF SCIENTIFIC THINKING IN CYBERSECURITY HIGH SCHOOL STUDENTS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(18), 124–137. https://doi.org/10.28925/2663-4023.2022.18.124137

Most read articles by the same author(s)

1 2 > >>