Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises

Bernd Remmele, Jessica Peichl
{"title":"Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises","authors":"Bernd Remmele, Jessica Peichl","doi":"10.1145/3465481.3469198","DOIUrl":null,"url":null,"abstract":"Micro- and Small Enterprises (MSE) and the persons working there (owners/managers, employees) are often neglected in policies and initiatives concerning cybersecurity and data privacy. Communication strategies are targeting IT-departments or IT-specialists - most MSEs have neither. The Horizon 2020 project GEIGER wants to address this problem by providing a cybersecurity monitoring solution that can be used by IT-laypersons. In addition to an easy-to-use software tool focusing on the monitoring of imminent cyber threats GEIGER develops an Education Ecosystem, which approaches this target groups at different levels: from regular employees, who cannot or don't want to extensively deal with cybersecurity, to designated persons (internal or external), who are made responsible for monitoring the functioning of GEIGER in a company. To take full account of this, the competence level of individuals and their development are part of the data structure of the GEIGER monitoring. Hence, it also includes automated recommendations to follow certain training sequences included in GEIGER or from other sources. To define the different levels of competence in cybersecurity, i.e. also their development, to propose adequate learning objectives and design pertinent learning materials, GEIGER has elaborated a curriculum. The structure of this curriculum follows the conditions and requirements given by the general situation of security threats and learning scenarios in MSEs. It has three main dimensions: ‘levels’ that reflect the competence development within MSE-specific learning environments; ‘pillars’ that reflect the GEIGER-specific topical differentiation in general cybersecurity as well as handling and communicating GEIGER functions; object ‘layers’ that reflect specific cybersecurity threats as they appear for the IT-lay target groups in MSEs. To allow for interoperability of the educational parts of GEIGER the competences of the GEIGER curriculum are written in form of xAPI-statements, i.e. a specific metadata-format for learning achievements.","PeriodicalId":417395,"journal":{"name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 16th International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3465481.3469198","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Micro- and Small Enterprises (MSE) and the persons working there (owners/managers, employees) are often neglected in policies and initiatives concerning cybersecurity and data privacy. Communication strategies are targeting IT-departments or IT-specialists - most MSEs have neither. The Horizon 2020 project GEIGER wants to address this problem by providing a cybersecurity monitoring solution that can be used by IT-laypersons. In addition to an easy-to-use software tool focusing on the monitoring of imminent cyber threats GEIGER develops an Education Ecosystem, which approaches this target groups at different levels: from regular employees, who cannot or don't want to extensively deal with cybersecurity, to designated persons (internal or external), who are made responsible for monitoring the functioning of GEIGER in a company. To take full account of this, the competence level of individuals and their development are part of the data structure of the GEIGER monitoring. Hence, it also includes automated recommendations to follow certain training sequences included in GEIGER or from other sources. To define the different levels of competence in cybersecurity, i.e. also their development, to propose adequate learning objectives and design pertinent learning materials, GEIGER has elaborated a curriculum. The structure of this curriculum follows the conditions and requirements given by the general situation of security threats and learning scenarios in MSEs. It has three main dimensions: ‘levels’ that reflect the competence development within MSE-specific learning environments; ‘pillars’ that reflect the GEIGER-specific topical differentiation in general cybersecurity as well as handling and communicating GEIGER functions; object ‘layers’ that reflect specific cybersecurity threats as they appear for the IT-lay target groups in MSEs. To allow for interoperability of the educational parts of GEIGER the competences of the GEIGER curriculum are written in form of xAPI-statements, i.e. a specific metadata-format for learning achievements.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
为微型和小型企业的非it员工构建网络安全课程
微型和小型企业(MSE)及其工作人员(所有者/经理,员工)在有关网络安全和数据隐私的政策和举措中经常被忽视。沟通策略的目标是it部门或it专家——大多数中小企业两者都没有。地平线2020项目GEIGER希望通过提供一个可供it外行使用的网络安全监控解决方案来解决这个问题。除了一个易于使用的软件工具,专注于监测迫在眉睫的网络威胁,GEIGER还开发了一个教育生态系统,针对不同层次的目标群体:从不能或不想广泛处理网络安全的正式员工,到负责监控GEIGER在公司运作的指定人员(内部或外部)。为了充分考虑到这一点,个人的能力水平及其发展是GEIGER监测数据结构的一部分。因此,它还包括遵循GEIGER或其他来源的某些训练序列的自动建议。为了定义网络安全能力的不同层次,即他们的发展,提出适当的学习目标和设计相关的学习材料,GEIGER制定了一套课程。本课程的结构遵循mse安全威胁和学习场景的一般情况所给出的条件和要求。它有三个主要维度:反映mse特定学习环境中能力发展的“水平”;反映GEIGER在一般网络安全以及处理和沟通GEIGER功能方面的特定主题差异的“支柱”;对象“层”反映了特定的网络安全威胁,因为它们出现在mse的it层目标群体中。为了实现GEIGER教学部分的互操作性,GEIGER课程的能力以xapi语句的形式编写,即用于学习成果的特定元数据格式。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Fighting organized crime by automatically detecting money laundering-related financial transactions Template Protected Authentication based on Location History and b-Bit MinHash Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises Privacy in Times of COVID-19: A Pilot Study in the Republic of Ireland Location Security under Reference Signals’ Spoofing Attacks: Threat Model and Bounds
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1