Anda di halaman 1dari 14

RUNNING HEAD: CYBER SECURITY K-12 EDUCATION BECAUSE EDUCATION IS

PROTECTION

Cyber Security K-12 Education Because Education is Protection

Suzanne Zainea

Central Michigan University


CYBER SECURITY K-12 EDUCATION

In February, a United States research group published their statistics on cyber hacking.

Three hacks per minute are astonishing but they also estimated over 30 million hacks per day

(NextGov, 2017) (Hackmageddon, 2017). Cyber security is an ever-growing threat to us

personally and to the global economy. Who is being targeted? Hackmageddon reported,

business/industry, The U.S. Government, educational institutions, healthcare databases and the

United States Military are the top targets. The only prevention is cybersecurity.

What is cyber security? The National Initiative for Cybersecurity Education (NICCE)

Workforce Framework defines cybersecurity as The activity or process, ability or capability, or

state whereby information and communications systems and the information contained therein

are protected from and/or defended against damage, unauthorized use or modification, or

exploitation (NICCE, 2017).

Policy Report

Hackers take our information and thus, take our control. They steal our identities, break

into our banking systems, hack medical devices, transportation modes and even threaten our

national security. Are you concerned? If you are not concerned, let us take a look and the link

for the NORSE Attack Map (NORSE Attack). This map illustrates the rank in order of attack

origin, type and target. The filter will also display the IP Addresses of attack and the display of

each country being attacked. Other satellite cybersecurity breach maps include Kaspersky, Check

Point and Fire Eye. Cyber hacks are the most critical threat our nation is facing; the problem

grows each year with more cybersecurity breaches reported continuously. The hackers are

becoming more sophisticated and their reach is covering the globe (CyberHeist, Sjouwerman,

2016).
CYBER SECURITY K-12 EDUCATION

How does this happen? We have many questions surrounding cybersecurity. First, we

must understand code. Computer coding is the language that makes the computer operate. More

or less it is lines of text that perform an operation or a function. When these lines of text or code

are altered, copied or stolen, unknowingly or unwillingly, a cybersecurity hack occurs. If we only

we understood coding then we can prevent hacking. Though acquired knowledge of coding and

hacking we can protect our futures, and ourselves but we must prepare now! Our changing world

demands are in need of a just in time training program.

Current Policy

Recent Legislation

A bill in 2002 was brought forth for the education of cybersecurity technology under the

directive of the Homeland Security Act, and was approved by the House at that time. The bill

recognized the need for cyber education through the Educational at Workforce Initiative. As

recent as February 7, 2017 an amendment to this bill called forth by Shelia Jackson Lee, of

Texas, which included research of K-12 science and technology education board of Advisors to

make new recommendations regarding a K-12 curriculum to initiate guidelines for future

technology curriculum. The new curriculum is to include K-12 cybersecurity by the 2017-2018

school year (Summary: H.R.935 115th Congress (2017).

Equity and Diversity

This bill also includes federal funding for guest speakers, curriculum materials and

funding for low income school districts and minorities specifically mentioned primarily;

African-American, American Indian, Latino and Asian heritage districts.


CYBER SECURITY K-12 EDUCATION

Implementation has NOT yet been decided. But the issue is current, the issue is now and

a call to action has begun with the new implementation of H.R. 935. The next steps will be to

form an advisory committee for the formation of glicks, duties, tasks and outcomes. Then

formulate K-12 curriculum based on the outcomes of the advisory committee(s). Prepare funding

thought the federal government, as promised in the bill, and though grants. Train administrators

educators and presenters before implementation, which may take years.

Research

Policy Players In Action

There are currently several grass roots groups, small interest groups of people working in

conjunction for the same outcome. grass roots. I was paying close attention because I was

speaking next, but more importantly, because we grassroots grant makers both ask and are asked

that question regularly, and what we hear varies tremendously. But the best quote from

Richardson is, A grassroots organization is a seed that grows. (Richardson, 2015)

This is exactly what had happened in K-12 cyber security. Many grass root groups have

formed across the United States to ask for more education to be taught in our schools for

cybersecurity. However, the group NICE has emerged as a leader, bringing this issue before the

courts last year through the Department of Homeland Security and the Department of Defense.

NICE has developed a possible Strategic Plan: for Early STEM Strategies from which a K-12

curriculum could be derived. The diagram found on the following page depicts the arms of

NICE and their primary objective. By involving NICE the policy process for change ran

through the courts at a rapid pace, bypassing many political pathways a mandated curriculum
CYBER SECURITY K-12 EDUCATION

would typically take. It is time for the state and local agencies to catch up and that is now

underway.

NICE Model

Their Primary Objective

Help the cybersecurity workforce to partner with local schools, thus providing content

Mr. Robin, Montana, Williams is the Chief Operating /Information/Security/Risk

Officer & Cyber Evangelist at Cyber World Institute, based in Las Vegas, Nevada - Information

Technology and Services and is currently part of Cyber World Institute, with operations in

Nevada and Michigan, and is previously associated with California State University, University

of Nevada-Las Vegas, College of Southern Nevada, Texas A&M, San Bernardino, ISACA, the

United State Department of Homeland Security and the Office of the Director of National

Intelligence. In a recent cyber clip interview Mr. Williams stated,

Our current education and training methods are

primarily knowledge-based delivery models, little to no skill-

based training and assessment occurs in the education, training,

and certification phases because they rarely leverage each other.


CYBER SECURITY K-12 EDUCATION

Skill and ability development has been left to the employer causing

a significant expenditure in time and resources. According, to a

2016 Intel Security and Center for Strategic and International

Studies survey only 1 in 4 organizations feel that recent

graduates from existing academic and certification programs

are fully prepared to execute given tasks. Because current

models do not address the three components require to perform a

given task: knowledge, skills, and abilities. (Williams, March 29,

2017).

Policy Recommendations for Change

I am proposing three educational solutions through a K-12 cybersecurity curriculum

implementation to help solve this current and growing problem. The Federal Government has

already decided to provide funding for awareness and resources regarding cybersecurity

education. We know that this is important because we all want and need to be safe on the Internet

and we want our information to be safe on the Internet.

1. K-12 Cybersecurity Awareness As an addition to current computer curriculum

Proposing a K-12 cyber hacking curriculum implementation within the school setting, as

part of computer classes already in place is one solution. We teach children as young as pre-
CYBER SECURITY K-12 EDUCATION

school about stranger danger. Yet, the stranger may be sitting on the other side of his electronic

device. Through curriculum policy changes in the K-12 setting, we could better equip our

students by teaching them safe Internet practices. The Stop-Think-and-Connect program, for

safety on the Internet was used this year, successfully, across the United States for voluntary

participating schools through NICE. The National Cyber Security Alliance Group has provided

ideas for topics of instruction for elementary cybersecurity ideas.

2A. Coding - Middle School Implementation and High School


At the middle school level we can begin teaching beginning programming and coding

through lessons in SCRATCH, https://scratch.mit.edu/, (MIT, Media Lab, n.d.) HTML hyper text

mark up language and simple BASIC Programming. Simple dBase applications could be taught

in the middle school curriculum and the manipulation of dBase would give the student an

understanding of how the dBase operates. Access usually comes with the Microsoft Office

package and is easily available and relatively low in cost. Safety on the Internet would continue

in a more sophisticated curriculum.

Cyber World Institute has been a forerunner in cyber security education and certification

of the Department of Defense. Although most of their interest lies in the postsecondary level

they did touch upon the idea of a K-12 cybersecurity curriculum. Cyber World does express a

deep interest in a K-12 cybersecurity curriculum and had this to offer during a personal

interview with President, Linda Montgomery. An excellent idea! We should start exposing our

American children to programming as soon as possible. We are so far behind the Chinese and
CYBER SECURITY K-12 EDUCATION

the Russians in this regard. They have cyber schools set up for children who learn to code as

young as middle school (Montgomery, February 19, 2017).


In a recent article the United Kingdom announced that they would be introducing

cybersecurity and hacking prevention courses to keep up with the China and Russia. The article

continues that children between the ages of 14-18 will be taught hacking and cybersecurity

(Dearden, 2017).
Can you imagine what they can do by the time they are in high school? It is not only

necessary but also imperative that we catch up. I love the idea of introducing programming

technology through Scratch. The children think that they are playing a game and dont even

realizing that they are learning how to use and manipulate code. They can also learn HTML at

this age (Montgomery, February 19, 2017).

As the students enter high school we would begin to teach higher level programming

languages such as C, Java, Java Script and Python, to name a few. The intrinsic idea is that as the

student learns to code and the process of coding he/she will then be able to understand the

mechanics of the cyber hack and thus, cybersecurity. At the local level we could propose a pilot

district to spearhead the curriculum. This proposed solution might require implementation

mandated at the state level. On a larger scale at the Federal level our nation would benefit by

producing true cybersecurity skills to all cyber users. In the long run we would create the first

cyber secure generation of technology users.

High School age curriculum advocates in the political and the educational arena are

interested in cybersecurity. At the October 2015 North American Cyber Security Conference,

Governor John Bel Edwards joking said, Either we are producing a state of fantastic

programmers or maybe a state of little hackers. Those opposed to teaching programming at


CYBER SECURITY K-12 EDUCATION

lower levels are concerned about the responsibility of children that may become cyber hackers

in an unethical manner. That is a possibility, however ethical usage of a computer would be part

of the cyber security curriculum.


2B. Vocational Technical Education Centers. Through Vocational Technical Centers and the

IT (Information Technology) curriculum a student could advance toward earning one of the top

5 Information Security Certifications while still a high school student. Included is a list of

certifications below. The first two are feasible, the third would be much too costly for schools

and the third group would require many years of study beyond the scope of high school

(Montgomery, February 19, 2017).


CYBERSECURITY CERTIFICATIONS

Feasible at the High School Vocational Education Level


CompTIA Security+
CEH: Certified Ethical Hacker

Too costly for High Schools ($10,000 per student)

GSEC: SANS GIAC Security Essentials.

Requiring Higher Education


CISSP: Certified Information Systems Security
Professional.
CISM: Certified Information Security Manager. (Both of
these require 5 years working experience to be certified.)
(Cyberheist, 2017).

A better track for high school would be A+ to Net+ to Sec+ to CEH to a specialty area

such as forensics, incident response, etc. Focus on the beginning/novice certs at the high school
CYBER SECURITY K-12 EDUCATION

Vocational Technical level, as this is applicable to a senior entering IT at the entry level

(Montgomery, February 19).

Vocational Technical Centers provide high school students the opportunity to acquire

skills that will result in their employment. The core purpose of the role of education at the

Vocational Technical Center is job training. What are the projections for the future job market

for cyber security certified student? The (United State Bureau of Labor Statistics, 2015)

estimate and 18% increase in the need for cybersecurity workers. This is one of the fastest

growing technical areas with a much higher than average growth rate.

The annual income for cyber security specialist is also comfortable salary. INFOSEC

Institute reports that the average payout to a Certified Ethical Hacker is $71,000 per year.

Remember, this is the lowest certification offered in cybersecurity. This school also offers

Ethical Boot Camps. The Boot Camps will provide intense training. 40 hours of instruction

concluding with a test for certification (Training Camp CEG v9 Boot Camp, 2017).

This career is in very high demand and the pay would be very enticing for high school

students. This program would fulfill the increase demand for cybersecurity workers in the

workforce, security our cyber user information while training our students at the same time for

gainful employment. In Michigan the programming language can take the place of the

requirement for foreign language. A topic many foreign language advocates do not like.

However, we can easily see that the employability and the need for security argument can be

made to offset this argument.


CYBER SECURITY K-12 EDUCATION

10

In the state of Michigan, Mr. Thomas Knight, is overseeing the development of

curriculum for a CTE (Career Technical Education) program, The Office of Career and

Technical Education would like to announce the addition of a new CTE program for

Cybersecurity. The new CTE program will operate under the CIP code and title of 11.1003

Computer and Information Systems Security/Information Assurance. (Knight, April 11, 2017).

Little change would be needed to implement this curriculum in the Vocational Technical

arena, since the equipment is already in place. The original implementation would be more

expensive at the planning and development stage than at the maintenance and updating stage.

3. Coalition of Business and Industry with Parent Interest Groups


A consideration for a solution was the implementation of a K-12 cybersecurity

curriculum taught by business and industry, parent groups and community leaders, such as

police.

This final policy change was disregarded after research and interview were conducted

based on the findings and opinion that when business and industry implement a program within

the school system interest fades and programs do not have a great overall follow through. But

with a strong community commitment and an excellent advisory committee that remains in

contact long term, this problem can be resolved. Several reasons exist for this outcome such as

lack of ongoing interest, changes in business owners, financial cuts and overall changes in values

(Fowler, 2013).

Recommendation for Policy Change


CYBER SECURITY K-12 EDUCATION

11

We should implement artful planning even though this topic has arisen out of discourse.

Fowler states discourse in education is expressed in a powerful language that links the issue to

deeply held value, hope, fears, and aspirations. Emotional words and expressions, including

assertions that the issue has a bearing of key national priorities such as military security and

economic growth (Fowler, 2013). The fear, hope and aspirations for a safe cyber world for the

United States are certainly the driving force behind the push for cybersecurity K-12 policy.

From my research and interviews, I have concluded that the best avenue for advancing

the K-12 cybersecurity curriculum is twofold. First, we must begin very young and the

elementary level to teach generalized safety on the Internet practices. Therefore K-12 awareness

must be a continual theme though out the curriculum. Second, programming should be

implemented at the middle school grades until high school graduation.

My final and strongest recommendation for policy change, is to expand the current

information technology programming career paths at the vocational technical centers and offer

certifications in CompTIA Security+ and CEH: Certified Ethical Hacker. We will see changes

soon and produce the first globally competitively safe, tech savvy, cyber secure aware United

States citizens.

Reference:
CYBER SECURITY K-12 EDUCATION

12

Department of Homeland Security. (2017). NICCS glossary. National initiative for cybersecurity

careers and studies. Washington D.C: U.S. Retrieved from https://niccs.us-

cert.gov/glossary

Deardon, L. (2017). British teenagers to be taught 'cyber curriculum' to defend UK against threat.

The Independent Magazine. Retrieved from https://www.msn.com/en-

gb/news/uknews/british-teenagers-to-be-taught-cyber-curriculum-to-defend-uk-against-

threat-of-hacking-attacks/ar-AAmPzZ2?li=BBoPRmx

Deruy, E. (2016). A plan to teach every child computer science. The Atlantic Monthly Group.

Retrieved from https://www.theatlantic.com/education/archive/2016/10/a-plan-to-teach-

every-child-computer-science/504587/

Education and the Workforce; Science, Space, and Technology; Homeland Security, 2017 H.R.,

H.R. 935, 112tg Cong (2002), Amended, Cybersecurity and Infrastructure Protection

(2017)

Fowler, F. (2013). Policy studies for educational leaders (4th ed). (pp. 137-138, 159) New Jersey:

Pearson.

Fung, B. (2013). How many cyber attacks hit the United States last year? NextGov. Retrieved

from http://www.nextgov.com/voices/brian-fung/6868/

MIT Media Lab. (n.d.). Scratch online creativity lab. Lifelong Kindergarten Group. Retrieved

from https://scratch.mit.edu/about
CYBER SECURITY K-12 EDUCATION

13

National cyber security alliance brings new learning resources to K-12 classrooms. (2011).

Wireless News. Retrieved from http://

proquest.com.cmich.idm.oclc.org/docview/898820291?accountid=10181

Passeri, P. (2017). Insider threat protection. Hackmageddon. Retrieved from

http://www.hackmageddon.com/category/security/cyber-attacks-statistics/

Richardson, J. (2015). Characteristics that grassroots groups share. Grassroots Grantmakers.

Retrieved from www. grassrootsgrantmakers.org

Sjouwerman, S. (2017). Security awareness cyber attack maps. Fortiguard. Retrieved

https://blog.knowbe4.com/ cyber-attack-maps...accurate-or-just-eye-candy

Training Camp CEG v9 Boot Camp. (2017). Knowledge Key Associations. Retrieved from

http://www.trainingcamp.com/global/training/ec-council-courses,aspx.

United States Department of Labor Statistics. (2015). Retrieved from

http://www.bls.gov/oes/current/oes151122.htm

Anda mungkin juga menyukai