Equity of Cybersecurity in the Education System: High Schools, Undergraduate, Graduate and Post-Graduate Studies.
()
About this ebook
But professors, instructors, educators, and school systems have mostly failed to promote cybersecurity, leaving themselves—and their students—at risk.
Joseph O. Esin highlights the serious nature of the problem in this book. He answers questions such as:
• What does a well-structured plan to prevent cyber-threats look like?
• How can we promote equity of cybersecurity in education system?
• Where do cyber threats rank compared with other dangers?
• How can high schools, colleges, and universities promote cybersecurity endeavors?
The best way to prevent cyberattacks is to create a professional education alliance that promotes meaningful change. High school, colleges, universities, professors, educators, and support personnel must come to the table to make prevention a priority.
Get a clear understanding of the problem and respond with meaningful measures with the insights and information in The Equity of Cybersecurity in the Education System.
Joseph O. Esin
Joseph O. Esin is a professor of computer information systems/cybersecurity, a fellow at the Washington Center for Cybersecurity Research and Development, and a fellow at the Botanical Research Institute of Texas. He earned a Bachelor of Science in biology from Saint Louis University, Saint Louis, Missouri; a Master of Arts in theology from the Society of Jesus College of Divinity, Saint Louis, Missouri; and a doctorate in computer education and information systems from the United States International University, San Diego, California. He is also the author of seven books including System Overview of a Cyber-Technology in a Digitally Connected Global Society, and Landscape of Cybersecurity Threats and Forensic Inquiry.
Read more from Joseph O. Esin
Landscape of Cybersecurity Threats and Forensic Inquiry Rating: 0 out of 5 stars0 ratingsSystem Overview of Cyber-Technology in a Digitally Connected Global Society Rating: 0 out of 5 stars0 ratingsThe Evolution of Instructional Technology: Overcoming Apprehension About the Use of Technology in the Classroom for Instruction Rating: 0 out of 5 stars0 ratings
Related to Equity of Cybersecurity in the Education System
Related ebooks
Cyber Security and Policy: A substantive dialogue Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 1: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsInsider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within Rating: 0 out of 5 stars0 ratingsNavigating the Digital Landscape: Fundamentals, Cybersecurity, Emerging Technologies, and Applications Rating: 0 out of 5 stars0 ratingsCybersecurity as a Fishing Game: Developing Cybersecurity in the Form of Fishing Game and What Top Management Should Understand Rating: 0 out of 5 stars0 ratingsData Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications Rating: 0 out of 5 stars0 ratingsFoundations of Data Intensive Applications: Large Scale Data Analytics under the Hood Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 2: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsPro Cryptography and Cryptanalysis: Creating Advanced Algorithms with C# and .NET Rating: 0 out of 5 stars0 ratingsHands-On Design Patterns with C++: Solve common C++ problems with modern design patterns and build robust applications Rating: 0 out of 5 stars0 ratingsAnalytical Hierarchy Process (AHP) A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsThreat Model A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsExplanation Based Learning: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsCYBERDEFENSE: Domain Name Systems as the Next Public Utility Rating: 0 out of 5 stars0 ratingsUltimate Cyberwarfare for Evasive Cyber Tactics Rating: 0 out of 5 stars0 ratings“Exploring Computer Systems: From Fundamentals to Advanced Concepts”: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsData Cleaning A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsBayesian Optimization and Data Science Rating: 0 out of 5 stars0 ratingsCloud Security Compliance A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Risk A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsComputer Forensics JumpStart Rating: 3 out of 5 stars3/5Deep Neural Nets A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsSOA-Based Enterprise Integration: A Step-by-Step Guide to Services-based Application Rating: 0 out of 5 stars0 ratingsAutonomic Computing: Fundamentals and Applications Rating: 0 out of 5 stars0 ratingsCryptography and Network Security Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsTechnology Risk And Cybersecurity A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsFinancial Institution Advantage and the Optimization of Information Processing Rating: 0 out of 5 stars0 ratingsCritical infrastructure protection Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsArtificial Intelligence Ethics and International Law: A TechnoSocial Vision of Artificial Intelligence in the International Life Rating: 0 out of 5 stars0 ratings
Security For You
Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsCodes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsAmazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques Rating: 5 out of 5 stars5/5
Reviews for Equity of Cybersecurity in the Education System
0 ratings0 reviews
Book preview
Equity of Cybersecurity in the Education System - Joseph O. Esin
Copyright © 2021 Joseph O. Esin. All rights reserved.
No part of this book may be reproduced, stored in a retrieval system, or transmitted by any means without the written permission of the author.
Published by AuthorHouse 03/23/2021
ISBN: 978-1-6655-2012-6 (sc)
ISBN: 978-1-6655-2011-9 (e)
Any people depicted in stock imagery provided by Getty Images are models,
and such images are being used for illustrative purposes only.
Certain stock imagery © Getty Images.
Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.
Contents
Acknowledgments
Introduction: Distinguishing Guide
Author’s Commitment
Intended Audience
Preamble
Equity of Cybersecurity in Education
Foundation of Cybersecurity
Academic Professors’, Instructors’, and Educators’ Operatives
Equity in Cybersecurity Education Algorithm
Culture of Instructional Delivery
Philosophy of Student Learning Outcomes
Significance of Course Learning Outcomes
Student Learning Outcomes in Cybersecurity Course Offerings
Structure of the Course Offerings
Five Funneling Courses: High School through Postgraduate Studies
Course Descriptions: Five Funneling Courses with Related CLO and SLO
Course Offerings: Bachelor of Science in Cybersecurity
Graduate (MSc) and Postgraduate (PhD) Studies in Cybersecurity
Formation of Graduate and Postgraduate Studies
Importance of Graduate and Postgraduate Studies
Course Offerings: Graduate and Postgraduate Studies
References
Examinations Bank
About the Author
Acknowledgments
I am immensely grateful to my father, Worthy Maurice Akuda Okon Esin; my mother, Mrs. Felicia Nkoyo Eyo Esin; my paternal grandfather, Chief Esin Akuda Abasi; my paternal grandmother, Madam Afiong U. Abasi; my maternal grandfather, Chief Eyo A. Ulliong; and my maternal grandmother, Madam Iqwo A. Ekpa. I also would like to extend a special thank-you to Chief Clement E. Anthony, Professor Joseph A. Asor, Professor Emmanuel N. Ngwang, Professor Lester C. Newman, Professor Glenell Lee-Pruitt, Professor Benson Kariuki, Professor Tyson McMillan, Professor Jane LeClair, Dr. Lisa G. Lang, Dr. Felix M. Ekanem, John A. Ozo, Dr. Moses A. Agana, Joseph E. Ukpong, Prince O. Ana, Victor A. Rom, Victor B. Uno, Sunday B. Akan, Ekwere D. Ekwere, and Nicholas N. Edet for their sustained support and assistance. Special thanks are extended to all my family members, to Udung Esin, AFI-UDA, to the Uda group of villages, and to the Mbo and Oron communities for their unrelenting support.
Introduction
Distinguishing Guide
I must admit, cyberthreats, cyberattacks, and breaches of organizations’ resources have outgrown every other risk factor faced by public and private organizations, institutions of higher education, and global security personnel. I unassertively appeal to academic professors, instructors, and educators to redouble their efforts with determination, commitment, and the willingness to accept the responsibility of establishing collaborative alliances with high schools, colleges, and universities to support, nurture, and promote equity of cybersecurity in education systems in different subject areas, including computer science, computer information systems, management information security, criminal justice, biology, and chemistry. The perils of cyberthreats, cyberattacks, unauthorized use, hacking and cracking, and data breaches are proliferating on every device connected to the internet and in every organization’s secure storage center. Armed with ongoing indiscretion surrounding the use of the true-to-life but frightful internet
for network connections, data storage, transmission, and communication in private and public organizations, higher education enterprises are strongly urged to restrain from adopting a lethargic byzantine approach to thwart collaborative efforts needed to battle existing looming threats of cybersecurity by advancing with aggressive steps and a well-structured plan of action to protect against, defend against, and eradicate the underlying forces of cybercrimes, cyberthreats, and cyberattacks against vulnerable, innocent citizens. Cybersecurity is an art of intellectual confrontation, utilizing the utmost in human intellectual ability in the battle zone, and it helps to place maximum responsibility on higher education administrators, professors, instructors, and educators for reorganizing most segments of their course offerings with singular, worldwide, user-friendly, unrestricted educational equipment to train the new generation. To gain expertise in cybercrimes, cyberthreats, cyberattacks, social engineering, and hacking is a long-term undertaking and requires continuing education from the fundamentals through graduate studies. Skill and expertise to battle cybersecurity threats must start by adopting equity in cybersecurity education as a fundamental point of reference, such as in high school through postgraduate programs.
Most professor, instructors, and educators graduated prior to the emergence of internet mayhem and cybersecurity, and prior to the era of course learning outcomes (CLO) and student learning outcomes (SLO). Components of student learning outcomes must include evidence-based practices of instruction style, methodology, and the use of assessment information, organized to meet the needs of students, satisfy the expectations of course offerings, meet program goals, provide measurable assessment tools, give feedback relative to academic performance and teaching effectiveness, and create an institutional mission, purpose, and philosophy. Cybersecurity is a challenging discipline involving rigorous algorithms; hence, course learning outcomes must each involve a self-justifying mechanism aiming at reinforcing professors’ and educators’ agreement to accept students into the academic program, ready and prepared to stimulate positive interactions in and out of the classroom, provide constructive and passive feedback, encourage teamwork among students, and implement different techniques to encourage active learning endeavors so students may become self-directed and independent critical thinkers.
Equity in cybersecurity education must be organized to provide an instructional, step-by-step approach to empower professors, instructors, and learners to face this swiftly growing threat to innocent citizens. Perpetrators of cyberattacks have expanded their sophisticated strategies to include various facilities, hacking and cracking into private and public financial data and other information using cyberwarfare, ransomware, and malware to intimidate and sabotage the landscape of the global community. Our private and public transmission and communication systems are unrestricted and without boundaries; the integration of mobile technology and electronic communication has increased, serving as host to more cyberattacks and cybercrimes, the perpetrators of which are sophisticated, organized, and often fully aware of the facilities they intend to target.
Amid the COVID-19 pandemic, the only unchallenged, obvious, all-inclusive concern is the health-care security of vulnerable private citizens. Notwithstanding world citizens’ privacy, medical doctors, allied health-care professionals, national leaders, state governors, mayors, and local government representatives have emerged as the most effective, efficient, dependable, defensive, and offensive leaders in the battle against this world pandemic, a shattering episode. However, the pandemic seems to be girded by scriptural and mystical realities, as seen when analyzed mathematically; the COVID-19 pandemic (C = 100, 0 =79, V = 5, 1 = 1, D = 500; add these figures together to get 685. Subtract 19 from 685, and you get 666 [Revelation 13:18]) has brought the entire global community into challenging times marked by uncertain disorders amid intriguing questions that cause superpowers, middle powers, lower powers, and zero powers—First World, Second World, Third World, Fourth World, and Zero World nations—to remain humble and unassuming, untiringly acknowledging the glory of God’s creation. God pronounced his glory, his wonders, and his blessings upon the worldly kingdom that he created (Job 38:18). God did not declare his servant Job innocent or guilty; hence, amid the COVID-19 pandemic, we must continue to work together, pray together, and refrain from declaring all God’s dedicated and consecrated families on earth innocent or guilty.
Nations that are firmly engrained with stockpiles of nuclear weapons, with long-range, short-range, and no-range ballistic missiles that act like labor-saving-mechanical appliances such as washing machines, toasters, and photocopy machines, contain push buttons which give these leaders the unique and unprecedented opportunity to push just a button and have the inflict great devastation upon vulnerable innocent global citizens. Leaders with nuclear weapons seem determined to do everything humanly possible to destroy entire nations or regions that attempt to acquire nuclear weapons. Where are the nuclear missile buttons now that the COVID-19 pandemic is ringing the doorbell? COVID-19 operates on an exclusive agenda, one that cannot be changed or rescheduled, and in aberration of the new world order, demanding total obedience and submission to God’s last pronouncement across the globe. In compliance with the new world order, global communities, including villages, cities, counties, local regions, states, and national organizations, are urged to assume equal responsibility for the reorganization and restructuring of functional rehabilitation by approving matching budgets for establishing well-suited pandemic hospitals, health-care facilities with well-matched medical equipment and supplies, and educational systems with well-suited instructional equipment and learning tools that are parallel to national military weapons budgets.
In light of President John F. Kennedy’s assertion that you should ask what you can do for your country, not what your country can do for you, today, the COVID-19 pandemic is ringing each nation’s doorbell. World leaders are charged with doing what they can do for their countries, that is, to become effective, efficient, dependable, defensive, and offensive commanding officers who place their priority on a substantive increase in the budgets for education, health care, and the military. Amid the COVID-19 pandemic, the only unchallenged and all-inclusive concerns are the global health-care security of vulnerable private citizens and the fact that education systems all over the world have been closed with the learning process obstructed. I must admit, the health-care professionals and other frontline responders we have seen rise to the challenge during the COVID-19 pandemic are unquestionably the direct products