Recommendations for development and implementation of the professional modelcompetences in the sphere of training of specialists for of the national cyber-security system
DOI:
https://doi.org/10.18372/2410-7840.20.12862Keywords:
infrastructure, cybersecurity, cyberthreats, cyber defense, cyberspace, competence, systemAbstract
The article analyzes the process of formation of information and cyberspace, and as a result, a conclusion is made about the intensification of information confrontation between countries and their entry into a qualitatively new phase of mutual relations - information and cybernetic confrontation. This requires a quali-tatively new approach to the training of IT professionals, with its orientation primarily on the practical plane in the field of information and cyber-non-security. To solve this problem, the article identifies the most priority key directions for the training of such specialists. Based on the results of the analysis of Ukrainian legislation on cybersecurity and the standard NATO training curriculum on cybersecuri-ty, a model for training specialists for the national cybersecurity system was proposed. The competence and learning out-comes implemented in the model can be used as a basis for the development of educational programs and curricula for qualitative training of specialists for the national cybersecurity system, namely bachelors of cybersecurity,
as agreed by the National Agency for Quality Assurance in Higher Education in 2017, new standards on cybersecurity at the following edu-cational-professional and educational-scientific levels. In the article several basic classes of the model of professional com-petencies in the field of training specialists for the national cybersecurity system were proposed. Given that the main sub-jects of the national cybersecurity system in accordance with the Constitution and laws of Ukraine is the State Service for Special Communications and Information Protection of Ukraine, the National Police Ukraine, the Security Service of Ukraine, the Ministry of Defense of Ukraine and the General Staff of the Armed Forces of Ukraine, intelligence bodies and the National Bank of Ukraine, the work agreed upon with the tasks assigned to these structures, models of professional competencies for the preparation of their personal cooperation.
References
Закон України Про основні засади забезпечення кібербезпеки України. (Відомості Верховної Ради (ВВР), 2017, № 45, ст.403) [Електронний ресурс]. Режим доступу: http:// zakon0. rada. gov. ua/ laws/ show/2163-19.
Перший стандарт вищої освіти стосується кібер-безпеки. Нацагентство із забезпечення якості ви-щої освіти погодило перший стандарт вищої осві-ти [Електронний ресурс]. Режим доступу: https:// ligazakon.net / lawnews / doc/-NZ173112-PERSHYY- STANDART- VYSHCHOYI-OSVITY-STOSUYETSYA – KIBERBEZPEKY ?type=ep.
Cybersecurity: A Generic Reference Curriculum (RC). Dear Partners, NATO Members, 4500-1 (OSEM PED) October 2016, 73 р.
ISO/IEC 27032:2012 Information technology. Secu-rity techniques. Guidelines for cybersecurity, 50 p.
В.Бурячок, В. Богуш, "Рекомендації щодо розроб-ки та запровадження профілю навчання «кіберне-тична безпека» в Україні", Ukrainian Scientific Journal of Information Security, vol. 20, issue 2, pp. 126-131, 2014.
Ю. Борсуковський, В. Бурячок, "Роль і місце вищих навчальних закладів у створенні системи інформаційної та кібернетичної безпеки Украї-ни", Сучасний захист інформації №1, С. 34-40, 2017.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).