Association for information systems



Download 2,51 Mb.
Pdf ko'rish
bet72/85
Sana21.01.2022
Hajmi2,51 Mb.
#397811
1   ...   68   69   70   71   72   73   74   75   ...   85
Bog'liq
csec2017

NIST Special Publication 800-192
. Retrieved 
from 
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-192.pdf
  

 
IEEE Computer Society: 
https://www.computer.org/
 
 

 
Information Technology Curricula 2017: Curriculum Guidelines for Baccaluaureate 
Degree Programs in Information Technology
. (2017) ACM/IEEE-CS. Retrieved from: 
https://www.acm.org/binaries/content/assets/education/curricula-
recommendations/it2017.pdf
 

 
Intel University Programs Office: 
https://www.intel.com/content/www/us/en/education/highered/higher-ed-
overview.html
  

 
International Security Education Workshop (ISEW) was co-located with the 
Colloquium for Information Systems Security Education (CISSE), and sponsored by 
the Intel Corporation, the National Science Foundation (NSF), and the Institute for 
Information and Infrastructure Protection (I3P) at the George Washington University 
(GW): Report available at 
http://csec2018.org
  

 
ISO/IEC 27002:2013
 
Information Technology – Security techniques – Code of 
practice for information security controls. 
(2013). International Organization for 
Standardization (ISO)
.
 Retrieved from 
https://www.iso.org/standard/54533.html
  

 
Monster.com: 
http://monster.com
  

 
Morgan, Steve. (July 28, 2015). Cybersecurity job market to suffer severe workforce 
shortage. 
CSO Online
. Retrieved from 
http://www.csoonline.com/article/2953258/it-
careers/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-
shortage.html
 
 

 
National Centers of Academic Excellence in Cyber Defense: 
https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/
 

 
National Centers of Academic Excellence in Cyber Operations: 
https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-
operations/
 

 
National Institute of Standards and Technology / National Initiative for Cybersecurity 
Education (NIST/NICE) Cybersecurity Workforce Demand: 
https://www.nist.gov/sites/default/files/documents/2017/01/30/nice_workforce_deman
d.pdf
 

 
NGSS Lead States. 2013. 
Next Generation Science Standards: For States, By States

Washington, DC: The National Academies Press. 

 
Rostami, Masoud, Farinaz Koushanfar, and Ramesh Karri. “
A Primer on Hardware 
Security: Models, Methods and Metrics
.” 
Proceedings of the IEEE 102.8
 (2014): 
1283-1295. (USED) 

 
Segran, Elizabeth. Why Top Tech CEOs Want Employees With Liberal Arts Degrees. 
Fast Company
 (August 28, 2014). Retrieved from 
https://www.fastcompany.com/3034947/the-future-of-work/why-top-tech-ceos-want-
employees-with-liberal-arts-degrees
.  


Cybersecurity 2017
 
 
Version 1.0 Report
 
CSEC2017
 
 
31 December 2017
 
88 
 

 
Global IT Skills Framework for the Information Age (SFIA): 
https://www.sfia-
online.org
  

 
Singapore Cybersecurity Strategy: 
https://www.csa.gov.sg/news/publications/singapore-cybersecurity-strategy
  

 
Stoneburner, Gary, Clark Hayden, and Alexis Feringa. Engineering Principles for 
Information Technology Security (A Baseline for Achieving Security, Revision A” 
NIST Special Publication 
(2004): 800-27 Rev A. Retrieved from: 
http://ws680.nist.gov/publication/get_pdf.cfm?pub_id=151294
  

 
The 2015 (ISC)
 
2
 Global Information Security Workforce Study
. (2015). International 
Information Systems Security Certification Consortium – (ISC)
 2
. Retrieved from 
https://www.boozallen.com/content/dam/boozallen/documents/Viewpoints/2015/04/fr
ostsullivan-ISC2-global-information-security-workforce-2015.pdf  

 
U.K. Government Communications Headquarters (GCHQ) 

 
U.S. National Initiative for Cybersecurity Education (NICE), Cybersecurity 
Workforce Framework (NCWF): 
https://www.nist.gov/itl/applied-
cybersecurity/national-initiative-cybersecurity-education-nice/nice-cybersecurity
   

 
U.S. National Research Council. 2013. Next Generation Science Standards: For 
States, 
By States
. Washington, DC: The National Academies Press 

 
U.S. National Research Council Next Generation Science Standards:
 
http://nextgenscience.org
 

 
U.S. National Security Agency and Department of Homeland Security Centers of 
Academic Excellence in Cyber Defense and Cyber Operations: 
https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/
 
and 
https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-
operations/
 

 
U.S. National Science Foundation 

 
Weingart S.H. (2000) 
Physical Security Devices for Computer Subsystems: A Survey 
of Attacks and Defenses
. In: Koç Ç.K., Paar C. (eds) Cryptographic Hardware and 
Embedded Systems — CHES 2000. CHES 2000. Lecture Notes in Computer Science, 
vol 1965. Springer, Berlin, Heidelberg (USED) 

 
WG 11.8: Information Security Education
. International Federation for Information 
Processing Working Group (IFIP WG 11.8). Retrieved from 
https://www.ifiptc11.org/wg118
 
 
 


Cybersecurity 2017
 
 
Version 1.0 Report
 
CSEC2017
 
 
31 December 2017
 
89 
 

Download 2,51 Mb.

Do'stlaringiz bilan baham:
1   ...   68   69   70   71   72   73   74   75   ...   85




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish