Mathematical model for optimising the contemporary process of training specialists in the field of cybersecurity and information protection
DOI:
https://doi.org/10.20535/2411-1031.2024.12.2.315740Keywords:
cybersecurity, training of specialists, mathematical model, competencies, information securityAbstract
The article examines current issues of training cybersecurity specialists, which are of particular importance in the context of rapid development of information technology and the growing number of cyber threats. It is noted that in Ukraine, as in many other countries, there are problems related to the organisation and management of the process of training such specialists. Traditional teaching methods do not always correspond to the specifics of the rapidly changing cyber environment, which makes it difficult for graduates to adapt to real working conditions. There is also a lack of uniform methodological approaches to regulating the educational processes in the field of cybersecurity, which leads to different quality of training in different educational institutions. Emphasises the need to develop a mathematical model for optimising the modern educational process of cybersecurity specialists, which would provide an integrated approach to planning and managing the training of cybersecurity specialists. Analyses the latest scientific researches and publications on the education of cybersecurity specialists, which investigated the problems and ways of improving cyber-education both in Ukraine and abroad. The purpose of the article is to develop a mathematical model for optimising the modern educational process of training cybersecurity specialists. This model takes into account the interaction between students, teachers and employers, as well as the dynamic development of students' competences. The authors propose to define the main roles of the participants in the educational process and their strategies. The model allows to take into account the transition probabilities of the development of students' competences and possible risks associated with the choice of certain educational pathways. The proposed mathematical model makes it possible to optimise the process of training specialists, which will help to improve their professional competence and ability to respond to current challenges in the field of cybersecurity. Such an integrated approach makes it possible to ensure effective decision-making at each stage of the educational process, which is extremely important for training qualified personnel in the field of cybersecurity, capable of countering modern cyber threats and ensuring high levels of information security.
References
S. Melnyk, S. Voskoboinikov, and D. Stupak, “Optimisation of professional training of future cybersecurity specialists based on innovative pedagogy and integrated approach in the system of implementation of key security competencies in the information society”, Vtoky pedagogicheskoho mastership, no. 21, pp. 125-129, 2018. [Online]. Available: http://dspace.pnpu.edu.ua/bitstream/123456789/11641/1/Melnyk.pdf. Accessed on: Aug. 15, 2024.
Y. Danik, and A. Zinchenko, “Cyber education and its features”, Military Education, no. 2, pp. 67-84, 2018. doi: https://doi.org/10.33099/2617-1783/2018-2/67-84.
Y.I. Hrytsiuk, and Z.P. Stashevskyi, “Model of the process of forming the competence of the SES of Ukraine personnel for the implementation of IT projects on information security”, Scientific Bulletin of the National Technical University of Ukraine, vol. 25, no. 9, pp. 373-390, 2015. doi: https://doi.org/10.15421/40250958.
D.D. Aistrakhanov, “Mathematical models of professional competence of a future specialist”, Vestnik Vinnytsia Polytechnic Institute, no. 3, pp. 136-140, 2014. [Online]. Available: https://visnyk.vntu.edu.ua/index.php/visnyk/article/view/945/944. Accessed on: Aug. 9, 2024.
B. Sun, “Mathematical models of learning efficiency”, EURASIA J. Math. Sci. Technol. Educ., 13 (7), pp. 4261-4270, 2017. doi: https://doi.org/10.12973/eurasia.2017.00834a.
N. Chowdhury, S. Katsikas, and V. Gkioulos, “Modeling effective cybersecurity training frameworks: A delphi method-based study”, Comput. & Secur., no 113, 15 p., 2022. doi: https://doi.org/10.1016/j.cose.2021.102551.
National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” (May 13, 2024). Educational and professional program First (bachelor's) level of higher education, ID 57879, Security of information resources. [Online]. Available: https://osvita.kpi.ua/sites/default/files/opfiles/125_oppb_bdir_2024.pdf. Accessed on: Aug. 1, 2024.
National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” (May 13, 2024). Educational and professional program Second (master's) level of higher education, ID 57881, Security of information resources. [Online]. Available: https://osvita.kpi.ua/sites/default/files/opfiles/125_oppm_bdir_2024.pdf. Accessed on: Aug. 1, 2024.
Head of the structural unit for information security and cyber defense, Professional standard. [Online]. Available: https://register.nqa.gov.ua/uploads/0/576-kerivnik_strukturnogo_pidrozdilu_z_pitan_bezpeki_informacii_ta.pdf. Accessed on: Aug. 7, 2024.
S. Horlichenko, “Features of modern conceptual and terminological apparatus in the field of training of cyber security specialists”, Cybersecurity: Education, Science, Technology, vol. 3, no. 23, pp. 171-181, 2024. doi: https://doi.org/10.28925/2663-4023.2024.23.171181.
V.D. Romanenko, Ed. Game theory: a course of lectures. Kyiv, Ukraine: Igor Sikorsky Kyiv Polytechnic Institute, 2022. [Online]. Available: https://ela.kpi.ua/bitstream/123456789/49092/1/Teoriia_ihor.pdf. Accessed on: Aug. 7, 2024.
The Python tutorial. [Online]. Available: https://docs.python.org/3/tutorial/index.html Accessed on: Aug. 5, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Collection "Information Technology and Security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).