mirror, mirror, on the wall: what are we teaching them all? · mirror, mirror, on the wall: what...
TRANSCRIPT
![Page 1: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/1.jpg)
Mirror, Mirror, On the Wall: What are we teaching them all?
Characterising the Focus of Cybersecurity Curricular Frameworks
Joseph Hallett
![Page 2: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/2.jpg)
There are lots of Cyber Security Curricular Frameworks
![Page 3: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/3.jpg)
A couple of questions…
![Page 4: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/4.jpg)
1. Are they all the same?2. What are they all teaching?3. Which one is best?
![Page 5: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/5.jpg)
Are they the same?
![Page 6: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/6.jpg)
Nope.
![Page 7: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/7.jpg)
What are theyall teaching?
![Page 8: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/8.jpg)
Risk management and Security ops mostly…
![Page 9: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/9.jpg)
But it depends on the framework…
We’re going to describe them, and present a method for describing others.
![Page 10: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/10.jpg)
Which one is best?
![Page 11: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/11.jpg)
Nope.
![Page 12: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/12.jpg)
(depends)
![Page 13: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/13.jpg)
They all serve different purposes and we’re not going to be making judgments here.
![Page 14: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/14.jpg)
But we do want to clarify what their content is…
![Page 15: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/15.jpg)
4 Curricular Frameworks
![Page 16: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/16.jpg)
Association forComputing Machinery
ASSOCIATION FORINFORMATION SYSTEMS ifip
CYBERSECURITYCURRICULA 2017
Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity
A Report in the Computing Curricula Series Joint Task Force on Cybersecurity Education
• Association for Computing Machinery (ACM)
• IEEE Computer Society (IEEE-CS)
• Association for Information Systems Special Interest Group on • Information Security and Privacy (AIS SIGSEC)
• International Federation for Information Processing Technical• Committee on Information Security Education (IFIP WG 11.8)Version 1.0 Report
31 December 2017
![Page 17: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/17.jpg)
IISP Knowledge Framework
UK-based non-profit Cybersecurity professional organisation
What knowledge is required to work in information security?
Aims “to provide a foundation for curriculum development, course accreditation and for individual professional certification”
![Page 18: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/18.jpg)
NCSC Certified Masters Programmes in CybersecurityUK framework for cybersecurity degreesLoosely based on IISP Knowledge Framework
Multiple pathways based around a common set of topics:
A: 4 year Computer science with cybersecurityB: 4 year CybersecurityC: 4 year Digital forensicsCNIS: 4 year Computer networks and internet security
Masters: 1 year broad cybersecurity Masters programme
![Page 19: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/19.jpg)
NICE Cybersecurity Workforce Framework
NIST Special Publication 800-181
Aims to describe all cybersecurity work and act as a reference guide for people implementing education programmes.
Big lists (~600) of Knowledge, Skills and Abilities
Each tied and cross-referenced to jobs and roles within cybersecurity
![Page 20: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/20.jpg)
Joint Task Force Cybersecurity Curricula
Collaboration between ACM, IEEE-CS, AIS SIGSEC and IFIP WG 11.8
Aims to “leading resource of comprehensive cybersecurity curricular content for global academic institutions seeking to develop a broad range of cybersecurity offerings at the post-secondary level”
![Page 21: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/21.jpg)
NCSC Certifed Masters NICE Cybersecurity Workforce Framework JTF Curriculum Guidelines
IISP Knowledge Framework
Security Discipline
Skills Group
Indicative Topic
Speciality Area
Work Role
K S A
Topic
Knowledge Units
Knowledge Area Learning Outcome
Level
Skill Area
Security Discipline
![Page 22: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/22.jpg)
NCSC Certifed Masters NICE Cybersecurity Workforce Framework JTF Curriculum Guidelines
IISP Knowledge Framework
Security Discipline
Skills Group
Indicative Topic
Speciality Area
Work Role
K S A
Topic
Knowledge Units
Knowledge Area Learning Outcome
Level
Skill Area
Security Discipline
![Page 23: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/23.jpg)
NCSC Certifed Masters NICE Cybersecurity Workforce Framework JTF Curriculum Guidelines
IISP Knowledge Framework
CyBOK
Security Discipline
Skills Group
Indicative Topic
Speciality Area
Work Role
K S A
Topic
Knowledge Units
Knowledge Area Learning Outcome
Level
Skill Area
Security Discipline
![Page 24: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/24.jpg)
NCSC Certifed Masters NICE Cybersecurity Workforce Framework JTF Curriculum Guidelines
IISP Knowledge Framework
CyBOK
Security Discipline
Skills Group
Indicative Topic
Knowledge Area
Speciality Area
Work Role
K S A
Topic
Knowledge Units
Knowledge Area Learning Outcome
Level
Skill Area
Security Discipline
Category
![Page 25: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/25.jpg)
![Page 26: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/26.jpg)
Cybersecurity Body
of Knowledge
![Page 27: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/27.jpg)
![Page 28: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/28.jpg)
Adversarial Behaviours ForensicsMalware and
Attack Technologies
Security Operations
and Incident Management
Human Factors Law and Regulation Privacy and Online Rights
Risk Management and Governance
Network Security Hardware Security Cyber-Physical Systems Security
Physical Layer Security
Software Security
Web and Mobile Security
Secure Software Lifecycle
CryptographyOperating Systems and Virtualisation
Security
Distributed Systems Security
Authentication, Authorisation
and Accountability
![Page 29: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/29.jpg)
Adversarial Behaviours ForensicsMalware and
Attack Technologies
Security Operations
and Incident Management
Human Factors Law and Regulation Privacy and Online Rights
Risk Management and Governance
Network Security Hardware Security Cyber-Physical Systems Security
Physical Layer Security
Software Security
Web and Mobile Security
Secure Software Lifecycle
CryptographyOperating Systems and Virtualisation
Security
Distributed Systems Security
Authentication, Authorisation
and Accountability
Attacks and Defences
![Page 30: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/30.jpg)
Adversarial Behaviours ForensicsMalware and
Attack Technologies
Security Operations
and Incident Management
Human Factors Law and Regulation Privacy and Online Rights
Risk Management and Governance
Network Security Hardware Security Cyber-Physical Systems Security
Physical Layer Security
Software Security
Web and Mobile Security
Secure Software Lifecycle
CryptographyOperating Systems and Virtualisation
Security
Distributed Systems Security
Authentication, Authorisation
and Accountability
Human Organisational and Regulatory Aspects
![Page 31: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/31.jpg)
Adversarial Behaviours ForensicsMalware and
Attack Technologies
Security Operations
and Incident Management
Human Factors Law and Regulation Privacy and Online Rights
Risk Management and Governance
Network Security Hardware Security Cyber-Physical Systems Security
Physical Layer Security
Software Security
Web and Mobile Security
Secure Software Lifecycle
CryptographyOperating Systems and Virtualisation
Security
Distributed Systems Security
Authentication, Authorisation
and Accountability
Infrastructure Security
![Page 32: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/32.jpg)
Adversarial Behaviours ForensicsMalware and
Attack Technologies
Security Operations
and Incident Management
Human Factors Law and Regulation Privacy and Online Rights
Risk Management and Governance
Network Security Hardware Security Cyber-Physical Systems Security
Physical Layer Security
Software Security
Web and Mobile Security
Secure Software Lifecycle
CryptographyOperating Systems and Virtualisation
Security
Distributed Systems Security
Authentication, Authorisation
and AccountabilitySystems Security
![Page 33: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/33.jpg)
Adversarial Behaviours ForensicsMalware and
Attack Technologies
Security Operations
and Incident Management
Human Factors Law and Regulation Privacy and Online Rights
Risk Management and Governance
Network Security Hardware Security Cyber-Physical Systems Security
Physical Layer Security
Software Security
Web and Mobile Security
Secure Software Lifecycle
CryptographyOperating Systems and Virtualisation
Security
Distributed Systems Security
Authentication, Authorisation
and Accountability
Software Platform Security
![Page 34: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/34.jpg)
Adversarial Behaviours ForensicsMalware and
Attack Technologies
Security Operations
and Incident Management
Human Factors Law and Regulation Privacy and Online Rights
Risk Management and Governance
Network Security Hardware Security Cyber-Physical Systems Security
Physical Layer Security
Software Security
Web and Mobile Security
Secure Software Lifecycle
CryptographyOperating Systems and Virtualisation
Security
Distributed Systems Security
Authentication, Authorisation
and Accountability
![Page 35: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/35.jpg)
Adversarial Behaviours ForensicsMalware and
Attack Technologies
Security Operations
and Incident Management
Human Factors Law and Regulation Privacy and Online Rights
Risk Management and Governance
Network Security Hardware Security Cyber-Physical Systems Security
Physical Layer Security
Software Security
Web and Mobile Security
Secure Software Lifecycle
CryptographyOperating Systems and Virtualisation
Security
Distributed Systems Security
Authentication, Authorisation
and Accountability
![Page 36: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/36.jpg)
Adversarial Behaviours ForensicsMalware and
Attack Technologies
Security Operations
and Incident Management
Human Factors Law and Regulation Privacy and Online Rights
Risk Management and Governance
Network Security Hardware Security Cyber-Physical Systems Security
Physical Layer Security
Software Security
Web and Mobile Security
Secure Software Lifecycle
CryptographyOperating Systems and Virtualisation
Security
Distributed Systems Security
Authentication, Authorisation
and Accountability
![Page 37: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/37.jpg)
Map the topics from the curricular frameworks onto CyBOK Knowledge Areas
![Page 38: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/38.jpg)
Map the topics from the curricular frameworks onto CyBOK Knowledge Areas
Scope Document
![Page 39: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/39.jpg)
—a learning outcome for the IISP Knowledge Framework Skill Area A6.1
“They shall be able to list the major applicable legislation and regulations affecting an example organization and describe their overall purpose.”
![Page 40: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/40.jpg)
—a learning outcome for the IISP Knowledge Framework Skill Area A6.1
“They shall be able to list the major applicable legislation and regulations affecting an example organization and describe their overall purpose.”
—CyBOK Scope document for the Law and Regulation Knowledge Area
“International and national statutory and regulatory requirements, compliance obligations including data
protection...”
![Page 41: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/41.jpg)
—a learning outcome for the IISP Knowledge Framework Skill Area A6.1
“They shall be able to list the major applicable legislation and regulations affecting an example organization and describe their overall purpose.”
![Page 42: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/42.jpg)
“They shall be able to list the major applicable legislation and regulations affecting an example organization and describe their overall purpose.”
—a learning outcome for the IISP Knowledge Framework Skill Area A6.1
Law and
Regulation
![Page 43: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/43.jpg)
Curricular Framework
Mapped / Total
Mapped Percentage
IISP 215/252 85%
JTF 286/287 100%
NICE 206/630 33%
NCSC 114/118 97%
![Page 44: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/44.jpg)
Curricular Framework
Mapped / Total
Mapped Percentage
IISP 215/252 85%
JTF 286/287 100%
NICE 206/630 33%
NCSC 114/118 97%
![Page 45: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/45.jpg)
—NICE K0015
“Knowledge of computer algorithms.”
![Page 46: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/46.jpg)
—NICE K0015
“Knowledge of computer algorithms.”
Too General
For CyBOK
:-(
![Page 47: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/47.jpg)
Curricular Framework
Mapped / Total
Mapped Percentage
IISP 215/252 85%
JTF 286/287 100%
NICE 206/630 33%
NCSC 114/118 97%
![Page 48: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/48.jpg)
:-(Not CybersecurityResearch skills
Physical security
Intra-personal skills
General Computer Science
![Page 49: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/49.jpg)
34%
35%
13%6%
11%
Attacks & Defences
Hum
an Organisational &
Regulatory A
spectsInfrastructure SecuritySoftw
are & Platform
Security
Sys
tem
s S
ecur
ity
NICE
27%
27%
11%
19%
16%
Attacks & Defences
Hum
an Organisational &
Regulatory A
spects
Infrastructure SecuritySoftw
are & Platform
Security
Sys
tem
s S
ecur
ity
NCSC
20%
33%
15%17%
15%
Attacks & Defences
Hum
an Organisational &
Regulatory A
spects
Infrastructure SecuritySoftw
are & Platform
Security
Sys
tem
s S
ecur
ity
JTF
42%
34%
2%
19%
3%
Attacks & Defences
Hum
an Organisational &
Regulatory A
spects
Infrastructure SecuritySoftw
are & Platform
Security
Sys
tem
s S
ecur
ity
IISP
![Page 50: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/50.jpg)
IISP18 (8%)
11 (5%)
10 (5%)
50 (23%)
6 (3%)
11 (5%)
1 (0%)
54 (25%)
1 (0%)
1 (0%)
2 (1%)
1 (0%)
36 (17%)
4 (2%)
1 (0%)
4 (2%)
1 (0%)
1 (0%)
1 (0%)
Adversarial Behaviours
Forensics
Malware & Attack Technology
Security Operations & Incident Management
Human Factors
Law & Regulation
Privacy & Online Rights
Risk Management & Governance
Cyber-Physical Systems Security
Hardware Security
Network Security
Physical Layer Security
Secure Software Design & Development
Software Security
Web & Mobile Security
Authentication, Authorisation & Accountability
Cryptography
Distributed Systems Security
Operating Systems & Virtualisation Security
![Page 51: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/51.jpg)
87 (9%)
20 (2%)
87 (9%)
146 (14%)
1 (0%)
86 (9%)
113 (11%)
158 (16%)
2 (0%)
130 (13%)
3 (0%)
22 (2%)
41 (4%)
2 (0%)
41 (4%)
40 (4%)
10 (1%)
21 (2%)
Adversarial Behaviours
Forensics
Malware & Attack Technology
Security Operations & Incident Management
Human Factors
Law & Regulation
Privacy & Online Rights
Risk Management & Governance
Cyber-Physical Systems Security
Hardware Security
Network Security
Physical Layer Security
Secure Software Design & Development
Software Security
Web & Mobile Security
Authentication, Authorisation & Accountability
Cryptography
Distributed Systems Security
Operating Systems & Virtualisation Security
NICE
![Page 52: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/52.jpg)
5 (2%)
10 (3%)
12 (4%)
29 (10%)
31 (11%)
23 (8%)
13 (5%)
26 (9%)
6 (2%)
10 (3%)
25 (9%)
2 (1%)
30 (10%)
18 (6%)
2 (1%)
15 (5%)
14 (5%)
5 (2%)
10 (3%)
Adversarial Behaviours
Forensics
Malware & Attack Technology
Security Operations & Incident Management
Human Factors
Law & Regulation
Privacy & Online Rights
Risk Management & Governance
Cyber-Physical Systems Security
Hardware Security
Network Security
Physical Layer Security
Secure Software Design & Development
Software Security
Web & Mobile Security
Authentication, Authorisation & Accountability
Cryptography
Distributed Systems Security
Operating Systems & Virtualisation Security
JTF
![Page 53: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/53.jpg)
2 (2%)
6 (5%)
9 (8%)
14 (12%)
9 (8%)
6 (5%)
4 (4%)
12 (11%)
4 (4%)
1 (1%)
7 (6%)
8 (7%)
4 (4%)
10 (9%)
7 (6%)
7 (6%)
1 (1%)
3 (3%)
Adversarial Behaviours
Forensics
Malware & Attack Technology
Security Operations & Incident Management
Human Factors
Law & Regulation
Privacy & Online Rights
Risk Management & Governance
Cyber-Physical Systems Security
Hardware Security
Network Security
Physical Layer Security
Secure Software Design & Development
Software Security
Web & Mobile Security
Authentication, Authorisation & Accountability
Cryptography
Distributed Systems Security
Operating Systems & Virtualisation Security
NCSC
![Page 54: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/54.jpg)
Median
![Page 55: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/55.jpg)
Median
![Page 56: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/56.jpg)
Median
![Page 57: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/57.jpg)
This doesn’t account for time spent on any topic…
This doesn’t look at how knowledge
in these topics is evaluated…
![Page 58: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/58.jpg)
1. Are they all the same?2. What are they all teaching?3. Which one is best?
![Page 59: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/59.jpg)
Are they the same?
![Page 60: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/60.jpg)
Nope.
![Page 61: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/61.jpg)
What are theyall teaching?
![Page 62: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/62.jpg)
Risk management and Security ops mostly…
![Page 63: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/63.jpg)
But it depends on the framework…
Using CyBOK we can characterise what is in them
![Page 64: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/64.jpg)
Which one is best?
![Page 65: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/65.jpg)
It depends what you want out of it…
![Page 66: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/66.jpg)
But using CyBOK we can see what the emphasis is
![Page 67: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/67.jpg)
…
![Page 68: Mirror, Mirror, On the Wall: What are we teaching them all? · Mirror, Mirror, On the Wall: What are we teaching them all? Characterising the Focus of Cybersecurity Curricular Frameworks](https://reader034.vdocuments.us/reader034/viewer/2022050407/5f84989c1d2311576d303af1/html5/thumbnails/68.jpg)
Any Questions?