NIST Special Publication 800-192
. Retrieved
from
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-192.pdf
●
IEEE Computer Society:
https://www.computer.org/
●
Information Technology Curricula 2017: Curriculum Guidelines for Baccaluaureate
Degree Programs in Information Technology
. (2017) ACM/IEEE-CS. Retrieved from:
https://www.acm.org/binaries/content/assets/education/curricula-
recommendations/it2017.pdf
●
Intel University Programs Office:
https://www.intel.com/content/www/us/en/education/highered/higher-ed-
overview.html
●
International Security Education Workshop (ISEW) was co-located with the
Colloquium for Information Systems Security Education (CISSE), and sponsored by
the Intel Corporation, the National Science Foundation (NSF), and the Institute for
Information and Infrastructure Protection (I3P) at the George Washington University
(GW): Report available at
http://csec2018.org
●
ISO/IEC 27002:2013
Information Technology – Security techniques – Code of
practice for information security controls.
(2013). International Organization for
Standardization (ISO)
.
Retrieved from
https://www.iso.org/standard/54533.html
●
Monster.com:
http://monster.com
●
Morgan, Steve. (July 28, 2015). Cybersecurity job market to suffer severe workforce
shortage.
CSO Online
. Retrieved from
http://www.csoonline.com/article/2953258/it-
careers/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-
shortage.html
●
National Centers of Academic Excellence in Cyber Defense:
https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/
●
National Centers of Academic Excellence in Cyber Operations:
https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-
operations/
●
National Institute of Standards and Technology / National Initiative for Cybersecurity
Education (NIST/NICE) Cybersecurity Workforce Demand:
https://www.nist.gov/sites/default/files/documents/2017/01/30/nice_workforce_deman
d.pdf
●
NGSS Lead States. 2013.
Next Generation Science Standards: For States, By States
.
Washington, DC: The National Academies Press.
●
Rostami, Masoud, Farinaz Koushanfar, and Ramesh Karri. “
A Primer on Hardware
Security: Models, Methods and Metrics
.”
Proceedings of the IEEE 102.8
(2014):
1283-1295. (USED)
●
Segran, Elizabeth. Why Top Tech CEOs Want Employees With Liberal Arts Degrees.
Fast Company
(August 28, 2014). Retrieved from
https://www.fastcompany.com/3034947/the-future-of-work/why-top-tech-ceos-want-
employees-with-liberal-arts-degrees
.
Cybersecurity 2017
Version 1.0 Report
CSEC2017
31 December 2017
88
●
Global IT Skills Framework for the Information Age (SFIA):
https://www.sfia-
online.org
●
Singapore Cybersecurity Strategy:
https://www.csa.gov.sg/news/publications/singapore-cybersecurity-strategy
●
Stoneburner, Gary, Clark Hayden, and Alexis Feringa. Engineering Principles for
Information Technology Security (A Baseline for Achieving Security, Revision A”
NIST Special Publication
(2004): 800-27 Rev A. Retrieved from:
http://ws680.nist.gov/publication/get_pdf.cfm?pub_id=151294
●
The 2015 (ISC)
2
Global Information Security Workforce Study
. (2015). International
Information Systems Security Certification Consortium – (ISC)
2
. Retrieved from
https://www.boozallen.com/content/dam/boozallen/documents/Viewpoints/2015/04/fr
ostsullivan-ISC2-global-information-security-workforce-2015.pdf
●
U.K. Government Communications Headquarters (GCHQ)
●
U.S. National Initiative for Cybersecurity Education (NICE), Cybersecurity
Workforce Framework (NCWF):
https://www.nist.gov/itl/applied-
cybersecurity/national-initiative-cybersecurity-education-nice/nice-cybersecurity
●
U.S. National Research Council. 2013. Next Generation Science Standards: For
States,
By States
. Washington, DC: The National Academies Press
●
U.S. National Research Council Next Generation Science Standards:
http://nextgenscience.org
●
U.S. National Security Agency and Department of Homeland Security Centers of
Academic Excellence in Cyber Defense and Cyber Operations:
https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/
and
https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-
operations/
●
U.S. National Science Foundation
●
Weingart S.H. (2000)
Physical Security Devices for Computer Subsystems: A Survey
of Attacks and Defenses
. In: Koç Ç.K., Paar C. (eds) Cryptographic Hardware and
Embedded Systems — CHES 2000. CHES 2000. Lecture Notes in Computer Science,
vol 1965. Springer, Berlin, Heidelberg (USED)
●
WG 11.8: Information Security Education
. International Federation for Information
Processing Working Group (IFIP WG 11.8). Retrieved from
https://www.ifiptc11.org/wg118
Cybersecurity 2017
Version 1.0 Report
CSEC2017
31 December 2017
89
Do'stlaringiz bilan baham: |