Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Information Security

Design Implications Of Changing Student Demographics, Andy Igonor, Natalya Koehler Oct 2016

Design Implications Of Changing Student Demographics, Andy Igonor, Natalya Koehler

Learning Showcase 2016: A Celebration of Discovery, Transformation and Success

Many non-traditional higher education institutions have built their cyber security and computer science programs {CSCS) to cater to the needs of adult, working learners. Focusing on this demographic has implications for course and program design. Design approaches have therefore focused on strategies aimed at translating knowledge into learning nuggets specific to the adult learner, enabling day one job-readiness upon graduation. Recently, there has been increased focus on CSCS education at the high school level. The computer science for all initiative was announced recently by US President Obama, and there have been increased creativity on the part of higher education institutions …


An Assessment Model To Improve National Cyber Security Governance, Bilge Karabacak, Unal Tatar, Adrian Gheorghe Jan 2016

An Assessment Model To Improve National Cyber Security Governance, Bilge Karabacak, Unal Tatar, Adrian Gheorghe

All Faculty and Staff Scholarship

Today, cyber space has been embraced by individuals, organizations and nations as an indispensable instrument of daily life. Accordingly, impact of cyber threats has continuously been increasing. Critical infrastructure protection and fighting against cyber threats are crucial elements of national security agendas of governments. In this regard, governments need to assess the roles and responsibilities of public and private organizations to address the problems of current cyber protection postures and to respond with reorganization and reauthorization of these postures. A risk management approach is critical in placing these efforts in an ongoing lifecycle process. In this paper, a model is …


Regulatory Approaches For Cyber Security Of Critical Infrastructures: The Case Of Turkey, Bilge Karabacak, Sevgi Ozkan Yildirim, Nazife Baykal Jan 2016

Regulatory Approaches For Cyber Security Of Critical Infrastructures: The Case Of Turkey, Bilge Karabacak, Sevgi Ozkan Yildirim, Nazife Baykal

All Faculty and Staff Scholarship

Critical infrastructures are vital assets for public safety, economic welfare and/or national security of countries. Today, cyber systems are extensively used to control and monitor critical infrastructures. A considerable amount of the infrastructures are connected to the Internet over corporate networks. Therefore, cyber security is an important item for the national security agendas of several countries. The enforcement of security principles on the critical infrastructure operators through the regulations is a still-debated topic. There are several academic and governmental studies that analyze the possible regulatory approaches for the security of the critical infrastructures. Although most of them favor the market-oriented …


A Vulnerability-Driven Cyber Security Maturity Model For Measuring National Critical Infrastructure Protection Preparedness, Bilge Karabacak, Sevgi Ozkan Yildirim, Nazife Baykal Jan 2016

A Vulnerability-Driven Cyber Security Maturity Model For Measuring National Critical Infrastructure Protection Preparedness, Bilge Karabacak, Sevgi Ozkan Yildirim, Nazife Baykal

All Faculty and Staff Scholarship

Critical infrastructures are vital assets for the public safety, economic welfare and national security of countries. Cyber systems are used extensively to monitor and control critical infrastructures. A number of infrastructures are connected to the Internet via corporate networks. Cyber security is, therefore, an important item of the national security agenda of a country. The intense interest in cyber security has initiated research focusing on national cyber security maturity assessments. However, little, if any, research is dedicated to maturity assessments of national critical infrastructure protection efforts. Instead, the vast majority of studies merely examine diverse national-level security best practices ranging …