acm joint task force to develop global cybersecurity ... · model. stakeholders were invited to...

15
Report: ACM Joint Task Force Survey to Develop Global Cybersecurity Curricular Guidelines http://csec2017.org October 2016 1 ACM Joint Task Force to Develop Global Cybersecurity Curricular Guidelines Survey Report – October 2016 INTRODUCTION The ACM Joint Task Force on Cybersecurity Education (JTF) launched in September 2015 to develop the first set of global curricular guidelines in cybersecurity education. Cybersecurity is defined here as: “A computing-based discipline involving technology, people, information, and processes to enable assured operations. It involves the creation, operation, analysis, and testing of secure computer systems. It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries.” The JTF is a collaboration between major international computing societies: Association for Computing Machinery (ACM), IEEE Computer Society (IEEE CS), Association for Information Systems Special Interest Group on Security (AIS SIGSEC), and International Federation for Information Processing Technical Committee on Information Security Education (IFIP WG 11.8). The JTF grew out of the foundational efforts of the Cyber Education Project (CEP). After a year of community engagement and developmental work, the JTF launched a survey in September 2016 to solicit broad input on the proposed curricular thought model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational and scientific forums, social media outreach via the JTF website and LinkedIn, and invitations sent through the distribution lists of participating professional associations. This report summarizes the 229 completed survey responses received during the survey period of September 16 – October 3, 2016. RESPONDENT DEMOGRAPHICS Gender: Approximately 71% (162) of respondents were male, 26% (60) were female, and six respondents did not indicate gender. Geographic distribution: Nearly 88% (201) of survey respondents reported the United States as their primary work location. The remaining 22% of survey respondents were distributed as follows 1 : Australia (6), Norway (3), Italy (2), South Africa (2), and Sweden (2); with one completed survey from each of the following countries: Bulgaria, Canada, China, Hong Kong, India, Netherlands, New Zealand, Portugal, Qatar, Singapore, Slovenia, Spain, and Thailand. 1 The number of respondents per country is shown in the parentheses.

Upload: others

Post on 27-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

1

ACMJointTaskForcetoDevelopGlobalCybersecurityCurricularGuidelinesSurveyReport–October2016

INTRODUCTION

TheACMJointTaskForceonCybersecurityEducation(JTF)launchedinSeptember2015todevelopthefirstsetofglobalcurricularguidelinesincybersecurityeducation.Cybersecurityisdefinedhereas:

“Acomputing-baseddisciplineinvolvingtechnology,people,information,andprocessestoenableassuredoperations.Itinvolvesthecreation,operation,analysis,andtestingofsecurecomputersystems.Itisaninterdisciplinarycourseofstudy,includingaspectsoflaw,policy,humanfactors,ethics,andriskmanagementinthecontextofadversaries.”

TheJTFisacollaborationbetweenmajorinternationalcomputingsocieties:AssociationforComputingMachinery(ACM),IEEEComputerSociety(IEEECS),AssociationforInformationSystemsSpecialInterestGrouponSecurity(AISSIGSEC),andInternationalFederationforInformationProcessingTechnicalCommitteeonInformationSecurityEducation(IFIPWG11.8).TheJTFgrewoutofthefoundationaleffortsoftheCyberEducationProject(CEP).Afterayearofcommunityengagementanddevelopmentalwork,theJTFlaunchedasurveyinSeptember2016tosolicitbroadinputontheproposedcurricularthoughtmodel.Stakeholderswereinvitedtoparticipateinthesurveythroughdirectinvitations,announcementsinpubliceducationalandscientificforums,socialmediaoutreachviatheJTFwebsiteandLinkedIn,andinvitationssentthroughthedistributionlistsofparticipatingprofessionalassociations.Thisreportsummarizesthe229completedsurveyresponsesreceivedduringthesurveyperiodofSeptember16–October3,2016.

RESPONDENTDEMOGRAPHICS

Gender:Approximately71%(162)ofrespondentsweremale,26%(60)werefemale,andsixrespondentsdidnotindicategender.

Geographicdistribution:Nearly88%(201)ofsurveyrespondentsreportedtheUnitedStatesastheirprimaryworklocation.Theremaining22%ofsurveyrespondentsweredistributedasfollows1:Australia(6),Norway(3),Italy(2),SouthAfrica(2),andSweden(2);withonecompletedsurveyfromeachofthefollowingcountries:Bulgaria,Canada,China,HongKong,India,Netherlands,NewZealand,Portugal,Qatar,Singapore,Slovenia,Spain,andThailand. 1Thenumberofrespondentspercountryisshownintheparentheses.

Page 2: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

2

Thechartsbelowprovideadditionalinformationonthebackgroundofsurveyrespondents.

*Respondentswerepermittedtoselectallapplicablestakeholdergroups.

0

50

100

150

200

250 210

3919

4623 15

StakeholderCommunity*

0

20

40

60

80

100

120

140

160

Doctorate Masters Bachelors Associates NoResponse

154

60

8 2 5

HighestDegreeAMained

Page 3: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

3

^Degreefieldsrepresentalldegreelevels(doctorate,masters,bachelors,andassociates).

Manyrespondentsreportedholdingmultiplecertifications.Themostfrequentlyheldcertificationsincluded:theCertifiedInformationSystemsSecurityProfessional(CISSP),Security+,CertifiedEthicalHacker(CEH),CertifiedInformationAuditor(CISA),CertifiedInformationSecurityManager(CISM),RiskandInformationSystemControl(RISC),ComputerHackingForensicInvestigator,CiscoCertifiedNetworkAssociate,andMicrosoftCertifiedSystemsEngineer.Certificationsheldbythreeorfewerrespondents

010203040506070

15

70

123

14 122

12 82

12 133 3 3 7

DegreeFields^

05

10152025303540

3832

12 116 5 4 4 4

CerOficaOonsHeld

Page 4: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

4

includedCertifiedCyberForensicsProfessional,ProjectManagementProfessional,CiscoCertifiedNetworkAssociate(Security),orCertifiedCouldSecurityProfessional.Ofthe229respondents,31reportedthattheydidnotholdasecurity-relatedcertification.

FEEDBACKONTHEPROPOSEDTHOUGHTMODEL

SurveyparticipantswereaskedtoprovidefeedbackontheJTFcurricularthoughtmodel.ThecurricularthoughtmodelwaspresentedasamodificationofU.S.NationalResearchCouncilNextGenerationScienceStandards(nextgenscience.org).Surveyrespondentswereaskedtocommentspecificallyon(1)thegraphicalrepresentationand(2)thefourstructuralelementsofthethoughtmodel:CoreIdeas,FocusAreas,Practices,andCross-CuttingConceptsforcybersecurityeducation.

• CoreIdeasareknowledgeareasordomains;• FocusAreasaredifferentprofessionalpracticecontexts;• Practicesarethecombinationofknowledgeandskillsthatculminateinto

competencywhenconnectedwithaparticularfocusarea;and• Cross-CuttingConceptsbridgecoreideaspracticeandfocusareas.

Feedbackoneachcomponentisprovidedbelow.

(1)GraphicalRepresentation

Surveyrespondentswereaskedtoconsidertheproposedgraphicandrespondtothe3questionslistedinthetablebelow.

Page 5: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

5

StronglyAgree

Agree Neutral Disagree StronglyDisagree

Q1-TheabovegraphicclearlycommunicatesthatengagingincybersecurityinvestigationrequiresnotonlyskillbutalsoknowledgethatisspecifictoeachPractice

47(20.5%)

81(35.4%)

31(13.5%)

53(23.1%)

17(7.4%)

Q2--TheabovegraphicclearlycommunicatesthatCross-CuttingConceptsbridgeCoreIdeas,Practices,andFocusAreas.

72(31.4%)

91(39.7%)

23(10%)

33(14.4%)

10(4.4%)

Q3--TheabovegraphicclearlycommunicatesthatCoreIdeashavethepowertofocuscybersecuritycurriculum,instructionandassessments.

31(13.5%)

67(29.3%)

53(23.1%)

55(24%)

23(10%)

Asindicatedbytheresponsestoeachquestion,surveyrespondentsweregenerallyfavorableaboutthegraphic.However,asummaryofthe73commentsofferedasrespondentnarratives,suggestseveralareasforimprovement:

• IncludespecificPracticeAreasandrevisethegraphictoshowthatmultiplepracticeareasexist.

• Expandthedefinitionofeachofthemodelelementsandclarifythedistinctionbetweenthem.

• Alignthegraphicalrepresentationandthemodelmoretightly.Thecurrentrepresentationisnotintuitiveoreasilyunderstoodwithoutthemodel.

• Simplifythediagram.

Page 6: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

6

(2)StructuralElementsoftheThoughtModel

Summaryfeedbackoneachthefourstructuralelementsofthethoughtmodel:CoreIdeas,FocusAreas,Practices,andCross-CuttingConceptsforcybersecurityeducation;isprovidedbelow.

CoreIdeas

CoreIdeasaredefinedasknowledgeareasordomains.SurveyrespondentswereaskedtoreviewtheCoreIdeaslistedbelowand(A)indicateifeachlistedCoreIdeashouldbeincludedinthecurricularvolume;(B)suggestanychangestothedefinitionoftheCoreIdeaandrecommendtheadditionofCoreIdeasnotcurrentlyincluded.

CoreIdeas:

1. InformationSecurity[Includes:informationconfidentiality,dataintegrity,availability,cryptographyandcryptanalysis]

2. SoftwareSecurity[Includes:securesoftwareengineering,softwarereverseengineering,malwareanalysis]

3. SystemSecurity[Includes:availability,authentication,accesscontrols,securesystemsdesign,computernetworkdefenseandCNA/penetrationtesting,reverseengineering(hardware),cyberphysicalsystems,digitalforensics,supplychainmtg]

4. UsableSecurity[Includes:identitymanagement,socialengineering,socialnetworks,human-computerinteraction]

5. OrganizationalSecurity[Includes:riskmanagement,missionassurance,disasterrecovery,businesscontinuity,securityevaluations/compliance,organizationalbehavior,intelligence,economics]

6. SocietalSecurity[Includes:cybercrime,cyberlaw,ethics,policy,privacy,intellectualproperty,professionalresponsibility,globalsocietalimpacts]

Page 7: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

7

A.PercentageofrespondentsaffirmingCoreIdea

(B)SummaryCommentsontheCoreIdeas

SurveyrespondentsmadeseveralrecommendationsregardingthelistofCoreIdeas.TherecommendationssummarizedbelowreflectthethemesforeachCoreIdea.

InformationSecurity

• Reconsidertheinclusionofcryptographyandcryptanalysis.ThesetopicsshouldberemovedasCoreIdeasandinsteadincludedastopicsforspecificgroups.

• ProvideamorethoroughrationaleforthesetofCoreIdeasincludedinthemodel.Astheyarepresented,thebreadthoftopicsdoesnotprovidesufficientcurricularfocus.

• Includetopicsofprivacyauthenticationandnon-repudiation.Ifthesetopicsareaddressedintheexistingcategories,clarifytheirplacement.

SoftwareSecurity

• Manyofthetopicsincludedinthecategoryarespecializedandmightnotberelevantfortheallportionsofthebroadaudiencetobeservedbythisdocument.Giventhis,shouldthetopicsherebere-classified.

• Reconsidertheinclusionoftopicsthatseemmorerelatedtopractice.Forexample,malwareanalysisandreverseengineeringmightbemoreappropriatelyclassifiedasapracticeratherthanacoreidea.

• Provideastrongerreferenceto,andconsiderrelabelingthiscategoryas,thesecuritysoftwaredevelopmentlifecycle.

70%75%80%85%90%95%

100% 96%

87%

96%

82%87% 86%

RespondentsAffirmingCoreIdea

Page 8: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

8

SystemSecurity

• Severaltopics,whileimportantforsomespecializedareas,arenotrelevantforthebroadaudiencetobeservedbythisdocument.Forinstance,CNA,digitalforensics,andsupplychainmanagementshouldnotbelistedasCoreIdeas.

• Reconsidertheinclusionoftopicsthatseemmorerelatedtopractice.Forexample,hardwarereverseengineeringshouldberemoved.

UsableSecurity

• Identitymanagementisacriticaltopicrelatedtoaccesscontrolbutismisplacedinthiscategory.MoveittoOrganizationalSecurity.

• Considerrelabelingthiscategory.Isthethemehere‘user’or‘humanfactors’security?Ifso,considerusingoneoftheselabelstoclarifythemeaningof‘usable’security.

• Manyoftheideasincludedinthiscategoryaretightlycoupledwithpractice.ThiscontentmaybemisclassifiedasaCoreIdea.

OrganizationalSecurity

• Thetopicsincludedinthiscategoryareimportantbutreconsiderwhetherornottheyhavethesamelevelofimportanceastheothercategories.

• Riskmanagementisacriticaltopicbuttheothercontentincludedinthiscategorymaynotbeasimportant.Forexample,iseconomicsimportanttoincludehere.

• Critical,butmissing,topicsincluderesilienceandphysicalsecurity.Thesetopicsshouldbeadded.

SocietalSecurity

• Thetopicsincludedinthiscategoryareimportantbutreconsiderwhetherornottheyhavethesamelevelofimportanceastheothercategories.Privacyistheonlyexceptiontothiscomment.

• Thecategoryisextremelybroad.Identifythespecifictopicstobeincludedhere.

FocusAreas

FocusAreasaredefinedasdifferentprofessionalpracticecontexts.SurveyrespondentswereaskedtoreviewtheFocusAreaslistedbelowand(A)indicateifeachlistedFocusAreashouldbeincludedinthecurricularvolume;(B)suggestanychangestothedefinitionoftheFocusAreaandrecommendtheadditionofFocusAreasnotcurrentlyincluded.

Page 9: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

9

FocusAreas:

1. SecurityandRiskManagement[Includes:Security,Risk,Compliance,Law,Regulations,andBusinessContinuity]

2. CommunicationandNetworkSecurity[Includes:DesigningandProtectingNetworkSecurity]

3. IdentityandAccessManagement[Includes:ControllingAccessandManagingIdentity]

4. SecurityAssessmentandTesting[Includes:Designing,Performing,andAnalyzingSecurityTesting]

5. AssetSecurity[Includes:ProtectingSecurityofAssets]

6. SecurityEngineering[Includes:EngineeringandManagementofSecurity]

7. SecurityOperations[Includes:FoundationalConcepts,Investigations,IncidentManagement,andDisasterRecovery]

8. SoftwareDevelopmentSecurity[Includes:Understanding,Applying,andEnforcingSoftwareSecurity]

(A)PercentageofrespondentsaffirmingFocusArea

0%20%40%60%80%

100%93% 94% 91% 92%

71% 75%91% 88%

RespondentsAffirmingFocusArea

Page 10: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

10

(B)SummaryCommentsontheFocusAreas

SurveyrespondentsmadeseveralrecommendationsregardingthelistofFocusAreas.TherecommendationssummarizedbelowreflectthethemesforeachFocusArea.

SecurityandRiskManagement

• Changethelabelofthiscategoryto“Governance,Risk,andCompliance”inordertohighlighttheimportanceofeachofthesetopics.

• Reconsidertheinclusionofbusinesscontinuity.Whileitisanimportanttopic,isitappropriatelycategorizedhere?

• Addaudittothiscategory.

CommunicationandNetworkSecurity

• ThecontentofthisFocusAreashouldbereclassifiedasaCoreIdea.• Clarifythedefinitionofthecategoryandmorepreciselydescribethecontent.

IdentityandAccessManagement

• ThecontentofthisFocusAreaisimportant,butmaybetoonarrowlydefinedtostandasaseparatecategory.

SecurityAssessmentandTesting

• Thiscategoryshouldincludecertificationandaudit.• Whileimportanttopics,thiscategoryistoonarrowandshouldbecombinedwith

anotherfocusarea.

AssetSecurity

• Clarifythedefinitionofassets(e.g.digital/physical/information)inthiscategory.• Whileimportanttopics,thiscategoryistoonarrowandshouldbecombinedwith

anotherfocusarea.

SecurityEngineering

• Clarifythedefinitionofsecurityengineeringasafocusarea.• Excludemanagementfromthiscategory.

SecurityOperations

• Clarifythefoundationconceptstobeincludedinthiscategory.• Respondentsaffirmedtheimportanceofthiscontentwithinthiscategorybut

wereconflictedaboutwhetherthecategorywastoobroadlyortoonarrowlydefined.

SoftwareDevelopmentSecurity

• Clarifyhowthiscategorydiffersfromsecurityengineeringandfromsecurityoperations.Shouldthecategoriesbecombined?

Page 11: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

11

OtherComments

• Additionaltopicstoinclude:incidentmanagement,ethics,socialengineering,physicalsecurity,andpolicy.

• Howweretheseareasdetermined?ConsiderusingtheNISTFrameworkandleveragingthecategories:Identify,Protect,Detect,Respond,andRecover.

• Severaloverlappingareasofmanagementshouldbeincluded.

Practice

PracticesarethecombinationofknowledgeandskillsthatculminateintoprofessionalcompetencywhenconnectedwithaparticularFocusArea.Surveyrespondentswereaskedtoconsiderthelistofreferencesbelowand(A)indicateifthepracticesderivedfromthosesourcesshouldbeincludedinthecybersecuritycurricularvolume;and(B)suggestanyadditionalsourcestoinclude.

Practice:

• NationalCybersecurityWorkforceframework–NICE

• NSACenterofAcademicExcellence,KnowledgeUnits-NSAKU

• (ISC)2CertifiedInformationSystemsSecurityProfessional–CISSP

• ACMComputerScienceCurricula2013-CS2013

• ACM/IEEEInformationTechnologyCurriculum2017-IT2017

• SkillsFrameworkfortheInformationAge–SFIA

• InstituteforInformationSecurityProfessionalsFramework2.0-IISP2.0

Page 12: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

12

(A)PercentageofrespondentsaffirmingPracticeReference

(B)SummaryCommentsonPracticeReferences

• Donotleantoheavilyonanyofthesereferences.Therelativequalityandvalueofvariousreferenceswasmixedandmanyrespondentsnotedthatrelevancewilldependontheaudience.

• ThereferencesareheavilyUS-centric.Addadditionalglobalreferencepoints.

• Articulatehowtheinclusionofthesepracticereferencesalignswiththepurposeofthecurricularvolume.Thereferenceshavemanyoverlappingconceptsandtheinclusionofmultipleframeworkswillbeconfusing.Asignificantcontributionofthisvolumewouldbetoprovideaguidetooverlappingpracticesinthese,andotherframeworks.

• Cautiouslydistinguishbetweeneducationandtraining–developingskillsversusunderstandingconcepts.

• Academicinstitutionsofvaryingtypescontinuetostruggleintheprocessofmappingtheircurriculatoanyofthesereferences.Guidanceonthisprocesswouldbevaluabletotheaudienceofthiscurricularvolume–notinghowever,thatthevalueofeachreferenceisdependentuponthespecificaudience.

Cross-CuttingConcepts

Cross-CuttingConceptsbridgecoreideas,practicesandfocusareas.SurveyrespondentswereaskedtoreviewtheCross-CuttingConceptslistedbelowand(A)indicateifeach

0%10%20%30%40%50%60%70%80%90%

NICE CAEKUs CISSP ACMCS2013

ACMIT2017

SFIA IISP

85% 81%76%

68%75%

41%

61%

RespondentsAffirmingPracOceReference

Page 13: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

13

listedCross-CuttingConceptsshouldbeincludedinthecurricularvolume;(B)suggestanychangestothedefinitionoftheCross-CuttingConceptsandrecommendtheadditionofCross-CuttingConceptsnotcurrentlyincluded.

Cross-CuttingConcepts:

1. AdversarialThinking

2. Risk

3. Confidentiality

4. Integrity

5. Availability

6. Accesscontrol

(A)PercentageofrespondentsaffirmingCross-CuttingConcept

(B)SummaryCommentsonCross-CuttingConcepts

SurveyrespondentsmadeseveralrecommendationsregardingthelistofCross-CuttingConcepts.TherecommendationssummarizedbelowreflectthethemesforeachCross-CuttingConcepts.

84%86%88%90%92%94%96%

89%

95%92% 92%

89% 88%

RespondentsAffirmingCross-CuYngConcepts

Page 14: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

14

AdversarialThinking

• Clarifythedefinitionofadversarialthinking.Basedonthedefinition,thisconceptcouldbefoundationaloritcouldbemoreorientedtowardattacker/offensivethinking.

Risk

• Clarifythedefinitionofrisk.IsthisconceptrelatedtoITmanagementorconsideredmorebroadlywithabusiness/organizationalfocus?

Confidentiality

• Theconceptislistedascross-cuttingandasaCoreIdea.Clarifythedistinctionandthedefinitionoftheterm.

Integrity

• Theconceptislistedascross-cuttingandasaCoreIdea.Clarifythedistinctionandthedefinitionoftheterm.

Availability

• Theconceptislistedascross-cuttingandasaCoreIdea.Clarifythedistinctionandthedefinitionoftheterm.

Accesscontrol

• Accesscontrolisnotatthesamelevelofimportanceastheothercross-cuttingconcepts.

• Clarifythedefinitionofaccesscontrol.Isitmorethanamechanismoratechnology?

OverallComments

• Clarifythedefinitionofcross-cuttingconcepts.Whatistheunderlyingprinciplethatguidesthecontentofthissection?Istheintenttoprovidefoundationalknowledgeorcross-cuttingideas?Rethinktheleveloftheconceptsandthebreadthoftopicsincludedinthecategory.

• Consideraddingethics,privacy,non-repudiationandhuman-factors/people-orientedideas.

SummaryCommentsontheThoughtModel

Generalfeedbackonthethoughtmodelprovidedadditionalinsightforthedevelopmentprocess.Summarycommentsinclude:

• Clarifytheintendedaudienceofthecurricularvolume.• Clarifythedefinitionsanddistinguishbetweentheelements.• Provideadditionalinformationonthecontentofeachofthecategories.

Page 15: ACM Joint Task Force to Develop Global Cybersecurity ... · model. Stakeholders were invited to participate in the survey through direct invitations, announcements in public educational

Report:ACMJointTaskForceSurveytoDevelopGlobalCybersecurityCurricularGuidelines http://csec2017.org October2016

15

• Simplifythemodel.• Providealogicalplacementforemergingtopics.

Thisreportprovidesanoverviewofthefeedbackreceivedfromthestakeholdersurveyonthedevelopmentofthefirstsetofglobalcybersecuritycurricularguidelines.TheJointTaskForcecontinuestoreviewandincorporatethedetailedfeedbackintothedevelopmentprocess.

ThefirstdraftoftheCybersecurityCurricularVolumewillbereleasedtothepublicinlate2016.Communityengagementopportunitieswillbecontinuouslyupdatedonthecsec2017.orgwebsiteandcommunitymembersarewelcometoprovidespecificfeedbacktotheJTFviathatwebsiteatanytime.

TheJointTaskForcewillholdaSpecialSessionattheACMSIGCSEMeeting,March8-11,2017inSeattle,WashingtonUSAtodiscussthedraftdocument.Detailsonthespecifictimeandlocationofthespecialsessionareforthcoming.Pleaseplantoattend.