Skip Navigation
Celebrating Twenty-Five Years of Progress and Innovation
in Advanced Technological Education

ATE Impacts logo

From the Archive: Cybersecurity

Posted by on .

Associated image

A special thanks to Rachel Flynn for contributing this month’s From the Archive blog post. Rachel is a recent graduate of the University of Wisconsin-Madison iSchool.

With the increasing demand for knowledgeable, skilled cybersecurity technicians in the United States workforce, ATE projects and centers are creating materials that discuss and explore the ways in which educational programs can meet this need. What some may not realize, however, is the variety of industries in which a cybersecurity technician’s skills can be put to use. In this month’s From the Archive blog post, we’re highlighting the work of three ATE projects and centers that have supported the education of technicians working in various sectors of the cybersecurity industry. Resources featured include a series of presentations focused on the topic of autonomous vehicles, with an emphasis on the cybersecurity and ethical concerns surrounding this technology; a community college course for students who are preparing to enter the information technology field of healthcare; and a report that details the results of an effort to map cybersecurity curricula to the National Cybersecurity Workforce Framework 1.0 Knowledge, Skills, and Abilities (KSAs). For more information about these specific resources, explore the links provided below.

2016 CAAT Conference: The Road to Autonomous Vehicles

This resource contains five presentations from the 2016 Center for Advanced Automotive Technology (CAAT) Conference—The Road to Autonomous Vehicles. This conference took place on May 6, 2016 at Macomb Community College's South Campus in Warren, MI and was co-sponsored by the Center for Automotive Research (CAR) and the Design and Manufacturing Alliance (DMA).

The conference theme, The Road to Autonomous Vehicles, addressed the many complexities involved in the development of automated and connected vehicles, including the infrastructure needed to support these high-tech vehicles. Speakers discussed the many legal, insurance, and cybersecurity concerns that must be addressed by the industry and government before full implementation of autonomous vehicles can occur. The conference included a keynote presentation on "The Challenges to the Future of Mobility" by Jeff Klei, President, NAFTA Region, Continental Automotive Divisions, and three Tech Talk Sessions on the challenges, infrastructure, and cybersecurity of automated and connected vehicles. Finally, Robert Feldmaier gave a talk about the current state of CAAT.  

For more archived resources by the Center for Advanced Automotive Technology (CAAT), visit the ATE Central Archive.

Topics in Healthcare Info Tech

River Valley Community College, in association with the Program Development in Cybersecurity with Focus on Business and Healthcare Concepts project, has developed a 4-semester program to prepare students for working in the Information Assurance (IA) field with a focus on Cybersecurity and Healthcare IT. Courses are intended to prepare students for assuring confidentiality, integrity, and availability of IT systems and networks in healthcare settings, where scheduling, storage of images, filling prescriptions, billing, and more are handled and stored using information technology.

This course focuses on topics in healthcare information technology and asks students to consider the Information Technology requirements that command uniquely qualified IT professionals to ensure the security of the Healthcare IT systems. In completing the course, students will be able to: 1) Understand and explain the behavior of a Healthcare organization, 2) Understand, explain, and apply the regulatory requirements of a Healthcare organization, 3) Understand, explain, and evaluate the normal operations of the “Healthcare Business,” 4) Evaluate the Healthcare IT system for security, privacy, and confidentiality, 5) Apply security, privacy, and confidentiality concepts to the Healthcare IT system, and 6) Understand and evaluate the normal operations of a Healthcare IT system.

For more archived resources by the Program Development in Cybersecurity with Focus on Business and Healthcare Concepts project, visit the ATE Central Archive.

Collaborative Curriculum Taskforce: Study of the Cybersecurity Workforce Framework Mapping to Academic Courses

This report, from the National CyberWatch Center, outlines the results of a mapping effort performed by the CyberWatch Curriculum Task Force of cybersecurity curricula to the National Cybersecurity Workforce Framework 1.0 Knowledge, Skills, and Abilities (KSAs). The goal of the study was to build a taxonomy of courses and to identify how the courses aligned with the KSAs specified within the framework, identifying gaps in academic courses and how those gaps could be addressed. This comprehensive 253-page PDF report includes the following sections: Purpose, Methodology, Data Collection, Data Mapping, Analysis, Constraints, Findings, Conclusions, and Recommendations for Further Research. The Bulk of the PDF comes in the Appendices, which include Participating Schools, Courses Mapped, the Mapping Survey Instrument, Coding Instructions, and the Pivot Table. 

For more archived resources by the National CyberWatch Center, visit the ATE Central Archive.

Categories:
  • education
  • technology
From:
    ATE Impacts
See More ATE Impacts

Comments

There are no comments yet for this entry. Please Log In to post one.

ATE Impacts is also a book! Copies are available upon request or at the ATE PI meeting in Washington, DC.

Twitter Join the conversation on Twitter using hashtag #ateimpacts

Email ATE Impacts Have an ATE story to tell?
Email us at impact@ateimpacts.net

Creative Commons License The ATE Impacts blog is licensed under a Creative Commons Attribution-ShareAlike 3.0 License. You are free to share, copy, distribute, transmit, and adapt this work, provided you attribute it to the Internet Scout Research Group. If you alter this work, you may distribute your altered version only under a similar license.