Integrating Information Security with Information System Architecture and Administration Curricula

نویسندگان

  • Erik Hjelmås
  • Nils Kalstad Svendsen
  • Stephen D. Wolthusen
چکیده

While the cost and flexibility benefits resulting from distributed and cloud computing environments are clearly evident, this approach also has farreaching implications for the threat surface presented as well as general information security risks, particularly to availability. The design of cloud-based storage services also implies that data once stored with such services may very hard to recall. The ease with which these services can be used implies that system administrators may not only be called upon much more frequently to make decisions that would previously have been the prerogative of system architects, but that such decisions may be based more on momentary expediency than sound architecture unless the implications are understood clearly. As the impact is both technical and legal in nature and can easily have a temporal extent well exceeding the life-time of a given configuration, we argue that the professional education of system and network administrators must take these security aspects into consideration even at the undergraduate level. We therefore outline a curriculum integrating information security and security management topics into a 3-year (180 credit points in the European Credit Transfer System) Bachelor of Science degree in Computer Science with specializations in either Network and System Administration Operations or Information Security intended to enable students to create, operate, and maintain information systems not only fulfilling functional, efficiency, and robustness requirements, but also minimizing information security and liability risks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Estimating the Future of Electronic Health Information System in Society

Background: The health information system provides an integrated platform and an information connection between the actors of the health system regardless of temporal and spatial limitations. Objective This study aims to investigate the factors affecting the development of electronic health record (EHR) system and predict the future of this system in Iran. Methods: In this descriptive study, ...

متن کامل

Presenting a Paradigmatic Model of the Organizational Architecture of Tax Affairs Based on Information Technology Governance by Data Method (Case Study of the State Tax Affairs Administration)

Today it is clear that both modernizing and smartening tax system cause to increase tax revenues and moves the country's economy towards transparency and tax justice. This article aims at presenting a paradigmatic model of the organizational architecture of tax affairs based on the information technology governance in the state tax organization by using data method, a qualitative research metho...

متن کامل

طراحی سیستم اطلاعات مدیریتی بحران‌های طبیعی

Introduction: To cope with natural and unnatural critical events such as air crashes, car accidents, chemicals and earthquakes or floods needs powerful resource management. Some of these critical events are tiny and by using local and available resources management could be resolved, but some cover extended geographical areas and so need a massive, vast resources and high level management for e...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009