Abstract
This paper aims at proposing an original curriculum of sandwich training in cybersecurity in France responding to the context of the European shuffle on cybersecurity enforcement. Indeed, May of this year sets the milestone of the cybersecurity process in Europe and especially in France as it is the deadline for the transposition of the Network and Information Security (NIS) European Directive on cybersecurity. This European Directive is in line with the global crucial transition operating at all scales in the world. As a global concern, the cybersecurity capacity building of the next generations is at stakes. In order to formulate a viable and efficient training that meets real needs and challenges, we first analyze the current strategic and policy frameworks at many scales concerning the cybersecurity enforcement and awareness development. Once the best practices are outlined, we would then analyze the current trainings provided in France in that field. Noting the lack of transversality of most of the existing trainings, we formulate an innovative proposition of training including a holistic approach by including a larger range of skills thus better in line to the international overhaul and contributing to the effective capacity building in cybersecurity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Goal 17: “Strengthen the capacity to implement and revitalize the Global Partnership for Sustainable Development.” For technology especially: “17.6 Enhance access to and triangular regional and international cooperation in science, technology and innovation and North-South and South-South cooperation in these areas and improve knowledge-sharing through mutually agreed modalities, including through better coordination of existing mechanisms, in particular at the United Nations level, and through a global technology facilitation mechanism. 17.7 Promote the development, transfer and diffusion of environmentally sound technologies to developing countries on favorable, including concessional and preferential, mutually agreed terms. 17.8 Ensure that the technology bank and the mechanism for strengthening the scientific and technological and innovation capacities of the least developed countries are fully operational by 2017 and strengthen the use of key technologies, in particular information and communications technology.”
- 2.
According to figures from the Council of Europe and the European Union
- 3.
Framework of Experiential Learning to Enhance Student Skill Collaborative Learning
- 4.
Defined by Article R1332–1 of the Defense Code. In France, an operator of vital importance (OVI) is an organization identified by the state as having essential or dangerous activities for the population.
References
Ali, B., Lu, M. X., & Diane, M. (2015). Cybersecurity curriculum development: Introducing specialties in a graduate program. Information Systems Education Journal, 13(3), 99–110.
Australian Government. (2016). Australia’s cyber security strategy.
Brave, S., & Nass, C. (2002). Emotion in human–computer interaction . no. Cmc (pp. 53–68).
Cabinet, E. Y. (2017). Les formations et les compétences en France sur la cybersecurité.
Cyber Security Agency of Singapore. (2016). Simgapore’s Cyber Security Strategy, no. 12, p. 27.
European Parliament and Council of the European Union. (2016, July). Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union, vol. 2014, pp. 1–30.
European Parliament; Council of the European Union. (2013). Proposal for a Directive of the european Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union, Brussels.
French Network and Information Security Agency. (s.d.). “Glossaire.” [Online]. Available: https://www.ssi.gouv.fr/entreprise/glossaire/c/. Accessed 20 Aug 2003.
House of representative of the U.S. Congress. (2017). Cybersecurity and Infrastructure Security Agency Act of 2017.
Institut des Hautes Etudes de la Securité et de la Justice. (2015). “La Loi de Programmation Militaire appliquée à la Cybersécurité.
International Telecomunication Union. (2014). Resolution 130 (Rev . BUSAN, 2014) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies, Busan.
International Telecomunication Union, Global cybersecurity index & cyberwellness profiles-Global Cybersecurity Index (GCI) 2017. 2015.
Journal Official. (2018). LOI n° 2018–133 du 26 février 2018 portant diverses dispositions d’adaptation au droit de l’Union européenne dans le domaine de la sécurité (1).
Minister of Information and Communications Technology. (2014). Qatar National Cyber Security Strategy.
National Information Systems Security Agency of the Secretary General for Defence and National Security. (2018). Formations labellisées SecNumedu, [Online]. Available: https://www.ssi.gouv.fr/particulier/formations/secnumedu/formations-labellisees-secnumedu/.
Patrick, H., & Fields, Z. (2017). A need for cyber security creativity (pp. 42–61). Pennsylvania, USA: IGI Global.
Republic of Mauritius. (2014). National cyber security strategy 2014–2019: For resilent and secure Mauritius.
The White House and Office of the Press secretary. (2016). Facts sheets: Cybersecurity national action plan. [Online]. Available: https://www.whitehouse.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan.
Willemant, R., & Foulgoc, S. (2016). Aspects Juridiques de la Cyber-sécurité. Action Canada Fr., 25, 18–19.
Acknowledgment
This publication was made possible by NPRP grant # NPRP 7-1883-5-289 from the Qatar National Research Fund (a member of Qatar Foundation) toward which the authors would like to express their gratitude. The statements made herein are solely the responsibility of the authors.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
El Melhem, J., Bouras, A., Ouzrout, Y. (2019). Toward a Holistic Approach of Cybersecurity Capacity Building Through an Innovative Transversal Sandwich Training. In: Abdulwahed, M., Bouras, A., Veillard, L. (eds) Industry Integrated Engineering and Computing Education. Springer, Cham. https://doi.org/10.1007/978-3-030-19139-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-19139-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19138-2
Online ISBN: 978-3-030-19139-9
eBook Packages: EducationEducation (R0)