40 likes | 198 Views
Integrating Cybersecurity into the Curriculum. Peter L. Reiher 1 and William J. Kaiser 2 1 UCLA Computer Science Department 2 UCLA Electrical Engineering Department. Cybersecurity in the Curriculum: Successful Development Phase. Successful introduction of security in system design
E N D
Integrating Cybersecurityinto the Curriculum Peter L. Reiher1 and William J. Kaiser2 1UCLA Computer Science Department 2UCLA Electrical Engineering Department
Cybersecurity in the Curriculum: Successful Development Phase • Successful introduction of security in system design • Instruction integrating constraints of cybersecurity with balance of functionality and computing platform energy • Motivational project-based undergrad courses • Exploited Intel Atom platforms and testbed funded by Intel • Created cybersecurity exercise set • Deployed on the DETER testbed • Uses in graduate and undergraduate instruction • Launched preliminary introduction of cybersecurity content to introductory programming courses
Cybersecurity in the Curriculum: Deployment Phase • Mission to speed introduction of cybersecurity into broad range of courses • Now Developing materials for introducing cybersecurity content into general curriculum • Introductory courses (for example, programming) • Advanced courses (for example, operating systems, embedded systems) • Approach is development of security orientation to existing coursework content with: • Lecture materials, exercises, test and assessment questions, laboratory projects • Objective is to fully support instructors who specialize in areas other than security and wish to adopt cybersecurity in their coursework.
Cybersecurity in the Curriculum: Approach and Progress • Develop content for courses offered now • UCLA intro programming is currently underway with planned cybersecurity integration • UCLA operating system and other advanced classes in 2013 • Test with collaborators now to validate approach • Harvey Mudd College will deploy our introductory programming materials in the upcoming year • Test to validate approach for department wishing to integrate cybersecurity (without security experts on staff) • Objective to expand to other institutions and courses • Co-develop objectives for content with community • Test and validate with assessment • Share all content for rapid deployment