Asee peer logo

Implementation Of Information Assurance And Security In Existing It Curricula

Download Paper |

Conference

2006 Annual Conference & Exposition

Location

Chicago, Illinois

Publication Date

June 18, 2006

Start Date

June 18, 2006

End Date

June 21, 2006

ISSN

2153-5965

Conference Session

Network Administration and Security

Tagged Division

Engineering Technology

Page Count

9

Page Numbers

11.720.1 - 11.720.9

DOI

10.18260/1-2--309

Permanent URL

https://peer.asee.org/309

Download Count

486

Request a correction

Paper Authors

biography

Joseph Ekstrom Brigham Young University

visit author page

Joseph J. Ekstrom (Ph. D. Computer Science, BYU 1992) has been Associate Professor of Information Technology at BYU since 2001. During 30 years of industrial experience he held positions from developer through senior management. His research interests include network and systems management, distributed computing, system modeling and architecture, system development, and IT curriculum and instruction.

visit author page

biography

Melissa Dark Purdue University

visit author page

Melissa Dark is an Associate Professor in Computer and Information Technology at Purdue University. She is also the Assistant Director for Educational Programs at the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University. Her academic interests include information assurance and security curriculum and faculty development, educational technology, instructional design, and assessment.

visit author page

biography

Barry Lunt Brigham Young University

visit author page

Barry M. Lunt is an Associate Professor of Information Technology at Brigham Young University in Provo, UT. Dr. Lunt received a B.S. and an M.S. degree in EET from BYU, and a Ph.D. in Occupational and Adult Education from Utah State University in Logan, UT. He has spent seven years in industry as a design engineer. His present research emphases are the physical design of electronic circuits and systems, IT curriculum, and engineering education.

visit author page

Download Paper |

Abstract
NOTE: The first page of text has been automatically extracted and included below in lieu of an abstract

Session xxx Implementation of Information Assurance and Security In Existing IT Curricula Melissa Jane Dark Purdue University, West Lafayette Indiana

Joseph J. Ekstrom, Barry M. Lunt Brigham Young University, Provo Utah

Abstract The IT2005 model curriculum describes Information Assurance and Security as a pervasive theme that must be integrated throughout the IT curriculum. The associated knowledge area provides a minimum set of outcomes associated with this important subject. Implementing a knowledge area that is required across the entire curriculum is a significant challenge, since security has historically been given weak coverage in computing courses. In this paper we introduce the approaches used in two IT programs for implementing the IT2005 requirement for IAS as a “pervasive theme”. We also include a brief introduction to IT2005 and to the Information Assurance Education community. It is our belief that any program that is preparing students to deploy computing technology in the current world environment should include security concerns in the curriculum. We hope that our experience can help others achieve this important goal.

Introduction The Information Assurance and Security knowledge area in IT20051 was created through the interaction of the Information Technology and Information Assurance education communities.2 Information Assurance and Security is one of 8 (Figure 1) pervasive themes introduced IT2005. The committee states “that these topics are best addressed multiple times in multiple classes, beginning in the IT fundamentals class and woven like threads throughout the tapestry of the IT curriculum”3. These themes are referenced in various knowledge areas, however, Information Assurance and Security is also a KA of it’s own. The IT community that has become SIGITE, the ACM Information Technology Education SIG, began the formal organizational process in Dec. 2001 with a meeting near Provo, Utah. By the spring of 2005 SIGITE had held 5 academically oriented conferences and produced numerous conference papers to explain the process,4 5 6 7 8 9 10 11 12 and its committees had produced drafts of the IT accreditation criteria with ABET 13 participated in the creation of the Computing Curriculum Overview Document (CC2005)14 and the IT200515 model curriculum. Three IT programs received accreditation through CAC of ABET in 2005. The IT community received international attention with presentations at conferences in South America, Europe, and China. And many IT programs are well on their way to implementing the IT model curriculum.

Ekstrom, J., & Dark, M., & Lunt, B. (2006, June), Implementation Of Information Assurance And Security In Existing It Curricula Paper presented at 2006 Annual Conference & Exposition, Chicago, Illinois. 10.18260/1-2--309

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2006 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015