Premium Content

Access "Why information security education isn’t making the grade "

Doug Jacobson and Julie A. Rursch Published: 25 Mar 2013

At least we’re consistent. When it comes to information security in industry or education, we are not taking a holistic approach. Information security is a bolt-on feature. (See our recent column, “The bolt-on information security trend needs to end.” Business executives on down to the IT staff continue to treat security as a separate issue, handled by IT specialists. Rarely do software or system engineers approach the design of a product with the intent to include security from the start.  It is no different in security education: we don’t educate our computer engineers and computer scientists to take a holistic approach to security. We teach information security in a separate class or, if students are lucky, classes; and these courses are usually electives. Is it any wonder when these individuals leave our hallowed halls to enter the workforce, they treat information security in the same vein? Why do we do such a poor job in information security education? It is the approach we take to teaching computer engineering, software engineering and computer ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Managing identities in hybrid worlds by Peter H. Gregory

      Are you losing control of access management as SaaS and mobile devices take hold? To achieve better operational consistency and scale, consider a centralized IAM system.

    • Address IPv6 security before your time runs out by Fernando Gont

      Most networks have partial deployment of IPv6 often without IT realizing it. It’s time to take stock of the security implications before attackers do.

    • Botnet takedowns: A dramatic defense by Kathleen Richards

      The infections and cyberattacks that botnets are used to launch remain hard-to-detect malware threats that have moved beyond PCs to mobile devices.

More Premium Content Accessible For Free

  • Strategies for a successful data protection program
    data_protection_2014.png
    E-Handbook

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...

  • Devices, data and how enterprise mobile management reconciles the two
    ISM_supp_1014.png
    E-Zine

    The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...

  • Putting security on auto-pilot: What works, what doesn't
    security_auto-pilot.png
    E-Handbook

    For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...