Tampa, Florida
June 15, 2019
June 15, 2019
June 19, 2019
Computing and Information Technology
11
10.18260/1-2--32594
https://peer.asee.org/32594
804
Dr. Swain is currently a Professor at the South Carolina State University. Dr. Swain has 30+ years of experience as an engineer and educator. He has more than 60 publications in journals and conference proceedings, has procured research and development grants from the NSF, NASA, DOT, DOD, and DOE and reviewed a number of books on computer-related areas. He is also a reviewer for ACM Computing Reviews, IJAMT, CIT, ASEE, and other conferences and journals. He is a registered Professional Engineer (PE) in South Carolina and ETAC of ABET reviewer for Electrical Engineering Technology and Computer Engineering Technology.
Biswajit Biswal, Ph.D.
Biswal is working as Assistant Professor of Computer Science at South Carolina State University, Orangeburg, SC, USA since January 2017. He holds Ph.D. in Computer and Information Systems Engineering from Tennessee State University, M.S. in Electrical Engineering form NYU Tondon School of Engineering, and B.E. in Medical Electronics Engineering from India. His research interests are machine learning, data mining, cyber security, cloud computing, RF signal detection (Drones), IOT, and big data analysis. He has more than 10 technical papers published in conferences and journals. He is also a member of IEEE.
Information and Communication Technologies (ICT) have become increasingly important for US citizens, who are becoming dependent on the use of information networks and services in their daily lives. Yet, while uptake of new technology among citizens is high, a large portion of the population remains unaware of their exposure to risks from security breaches and “cyber-abuse” in the form of network disruptions, malicious code, criminality and hackings, as well as hardware and software failures. There is an urgent need for the development and implementation of awareness-raising campaigns targeted at the safe and responsible use of ICT.
The demand for cybersecurity experts in both the public and private sectors is far outpacing the development of the talent pool, making for a hyper-competitive labor market. Against ever evolving cyber-threats the need to graduate students skilled in the concepts and technologies of cybersecurity is becoming a critical responsibility of academic institutions in order to help preserve the sovereignty of the US and her allies. Roughly two-thirds of security practitioners indicate that their organization does not invest enough in security awareness training. Professionals in the field consider it imperative for academic institutions to increase course development in computer security to make students both knowledgeable and technologically prepared for future challenges in this field. Knowledge about ongoing and planned activities will help the institutions to design and develop effective programs individually and in collaboration with others. Universities are only beginning to catch up.
The objective of this paper is to describe our experiences in the design and development of cybersecurity courses and laboratory exercises for a cybersecurity concentration for our computer science majors. The findings presented in this paper may be used by interested parties in cybersecurity curriculum and course development.
Swain, N., & Biswal, B. (2019, June), Design and Development of Cybersecurity Concentration Courses and Laboratory Experiences for Undergraduate Students Paper presented at 2019 ASEE Annual Conference & Exposition , Tampa, Florida. 10.18260/1-2--32594
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2019 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015