For the third year, the Warwick Manufacturing Group (WMG) at the University of Warwick will run the Enterprise Cyber Security (ECS) module, which is part of the institution’s Master of Science in Cyber Security and Management program.

The individual degree modules offer students a solid set of security skills, culminating with the ECS module, which is taught by IBM Security professionals in the U.K. It consolidates the individual degree modules to help students visualize cybersecurity as an integrated system.

A Lesson in Systems Integration for Cybersecurity Degree Students

Cybersecurity is often discussed as individual products, technologies or processes to be deployed for protection. In reality, it is a set of interrelated security components that comprise an integrated system. Without each element operating effectively, the strength of the control environment is much weaker. IT professionals need a holistic approach to designing security systems, and the module aims to instill just that.

The program also encourages students with a range of different qualifications to develop cybersecurity skills. This approach is supported by ISC2’s “2017 Global Information Security Workforce Study,” which demonstrated the importance of hiring professionals with nontechnical degrees. We also designed the module to allow students with various levels of experience to practice cybersecurity techniques at the enterprise and solution architecture levels.

Actors, Processes and Data

When implementing a security program, analysts should always start by creating an inventory or registry of information asset records. Then, perform a risk assessment to guide the security controls that protect the data.

In the past, it was simple: Data was created and then processed in a mainframe, so it was easy to locate. Today, information travels between many systems, and it can be difficult to determine where it comes to rest. As data is processed, new metadata is created and transmitted to additional systems for storage.

A Realistic Use Case

When we think about security controls, we must think about the actors in a system that initiate processes, including the creation of new metadata. The course starts with the simple practice of drawing a system context diagram to help identify the data to protect in transit and at rest.

To help cybersecurity degree students think about this problem, we created a scenario to bring some business context to their thinking. Last year, we generated a city council portal and challenged students to deal with transactions requiring payment card industry (PCI) compliance.

This year, we used a medical device scenario that included FDA regulations. We asked the students to think about the implications of where the data flows with the added complication of sending personal data from a European country to a cloud infrastructure hosted in the U.S.

We added some nonfunctional requirements by specifying cloud applications with 99.999 percent availability, which then implicitly requires consideration about the availability of the security controls. With the added complication of out-of-support technology, we injected a bit more realism. It certainly made the students think!

Reinforcing the Lesson With Practices and Artifacts

There is nothing like practice to reinforce learning, so each unit consists of a lecture, followed by an exercise to create an artifact using the techniques discussed and team presentations of the resulting output. Each artifact is based on practices we use in our work with clients. Cybersecurity degree students should leave with a kit of tools and techniques they can use in their postgraduation roles.

When creating a security solution, it’s critical to document the architectural thinking process, so we took the students through the essential project toolkit of a security architect. They learned about the definition of architectural decisions and how to document risks, issues, assumptions and dependencies (RAID) in a log.

For yet another layer of realism, we encouraged the class to use Mural for virtual whiteboards and Box Notes for shared document creation. It made the feedback sessions much easier and enabled the students to experience the way we work within IBM.

Considering People, Process, Technology and Information

Throughout the week, we mixed the perspectives, starting with people, process and data, with the system context. We gave the students some practice in enterprise architecture, taught them to communicate at the C-level, and explained the definition of process flows for identity and access management (IAM), which can be applied in many different scenarios.

We used the NIST Cyber Security Framework as a starting point for technical controls and went on to consider how the technical components are integrated with the added complexity of a hybrid cloud environment.

The effectiveness of security detection and response depends on good security intelligence. We discussed how this intelligence is collected and explained how tools such as Jupyter help analysts manage the data. We even got to discuss quantum computing and its potential impact on cryptography.

Sharing Cybersecurity Experiences

The course is developed and taught by security professionals who are thought leaders in their field. The students hear from practitioners who can recount their actual experiences working on real business problems.

In teaching the course, my colleagues and I enjoyed working with the next generation of enthusiastic cybersecurity professionals. In fact, we are already thinking about ways to make next year’s course even better — and make the future of cybersecurity that much brighter.

More from Data Protection

Resilient Companies Have a Disaster Recovery Plan

Historically, disaster recovery (DR) planning focused on protection against unlikely events such as fires, floods and natural disasters. Some companies mistakenly view DR as an insurance policy for which the likelihood of a claim is low. With the current financial and economic pressures, cutting or underfunding DR planning is a tempting prospect for many organizations. That impulse could be costly. Unfortunately, many companies have adopted newer technology delivery models without DR in mind, such as Cloud Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS)…

Millions Lost in Minutes — Mitigating Public-Facing Attacks

In recent years, many high-profile companies have suffered destructive cybersecurity breaches. These public-facing assaults cost organizations millions of dollars in minutes, from stock prices to media partnerships. Fast Company, Rockstar, Uber, Apple and more have all been victims of these costly and embarrassing attacks. The total average cost of a data breach has increased by 2.6% since 2021 and is now $4.35 million. Organizations that don't deploy zero trust security models also incur an average of $1 million more in…

How the Mac OS X Trojan Flashback Changed Cybersecurity

Not so long ago, the Mac was thought to be impervious to viruses. In fact, Apple once stated on its website that "it doesn't get PC viruses". But that was before the Mac OS X Trojan Flashback malware appeared in 2012. Since then, Mac and iPhone security issues have changed dramatically — and so has the security of the entire world. In this post, we'll revisit how the Flashback incident unfolded and how it changed the security landscape forever. What…

How Do Data Breaches Impact Economic Instability?

Geopolitical conflict, inflation, job market pressure, rising debt — we've been hearing about economic headwinds for a while now. Could data breaches have anything to do with this? According to a recent IBM report, the average cost of a data breach has reached an all-time high. Like any other business liability, these costs must be absorbed somehow. Given the rising risk and costs, cyberattacks have undoubtedly evolved into market stressors. The magnitude of the problem might surprise you.  Despite the…