CYBER SECURITY IN A DIGITAL LEARNING ENVIRONMENT
PDF (Ukrainian)

Keywords

cyber security
digital environment
educational activity
human factor
cognitive hazard
social engineering

How to Cite

[1]
V. Y. Bykov, O. Y. Burov, and N. P. Dementievska, “CYBER SECURITY IN A DIGITAL LEARNING ENVIRONMENT”, ITLT, vol. 70, no. 2, pp. 313–331, Apr. 2019, doi: 10.33407/itlt.v70i2.2876.

Abstract

The article discusses the problems of cyber-security of participants of the educational process, emphasizes the fact that these problems are not limited to the technical aspects of the protection of information resources, they must include in their entirety the following types of protection: legal, technical, informational, organizational and psychological. Among the psychological tools for securing cyber-security, it is proposed to distinguish cognitive ones, as the general population, and especially children and youth, increasingly become targets of cyber-attacks, first of all, their cognitive sphere, becoming the most vulnerable (weak) link in the network. In anthropocentric networks, which make up an ever-increasing share among common networks, the network itself acquires new properties, acting as an independent component (in addition to factors such as the network node, interface and links). Threats to participants in the educational process from the cyberspace should be regarded as passive and active, developing adequate means of protection and viability of the system "subject of educational process-learning-environment". The most significant among cyber-threats for the participants of the educational process are the social engineering methods, which knowledge and resistance can be the most effective for providing cyber-security. As part of the training of participants in the educational process on cyber-security, it is proposed to use "cyber vaccination", that is the formation of a conscious cognitive experience of staying under the influence of a cyber threat and counteracting it as a system of training activities that include, in addition to traditional methods, training of "cyber attacks", as well as the formation of knowledge and skills of resilience (recovery) in relation to cyber-threats. Further research is suggested to focus on the detailed development of types of threats to participants in the education process, as well as methods of counteraction. A special place should be a problem of resistance to cyber-threats, which can use the experience of training operators in emergent industries, including assessing the current state of the person and necessary adjustments in order to optimize its performance.
PDF (Ukrainian)

References

ДСТУ 3899-99. Дизайн та ергономіка. Терміни та визначення. Київ, Держстандарт України, 33, 1999 (in Ukrainian).

«Education and Training 2020 Work programme. Thematic Working Group 'Assessment of Key Competences' Literature review, Glossary and examples». European Commission, Directorate-General for Education and Culture, November, 52, 2012 .

Національна доповідь про стан і перспективи розвитку освіти в Україні. НАПН України, К.: Педагогічна думка, 448 с., 2016.

В. Ю. Биков, О. М. Спірін, та О. П. Пінчук, “Загальна середня освіта як базова ланка в системі безперервної освіти“. Наукове забезпечення розвитку освіти в Україні: актуальні проблеми теорії і практики (до 25-річчя НАПН України) [Текст] : збірник наукових праць, Киiв : Видавничий дім "Сам", 175-245, 2017.

В.Ю.Биков, Суспільство знань і освіта. [Електронний ресурс]. Доступно:https://www.youtube.com/watch?v=cDIytlESUz4. Дата звернення: 22.03.2019.

Закон № 2163-VІІІ “Про основні засади забезпечення кібербезпеки України” (Відомості Верховної Ради), № 45, с. 403, 2017.

European Commission, Digital Single Market News, “EU Cybersecurity Plan to Protect Open Internet and Online Freedom and Opportunity — Cybersecurity Strategy and Proposal for a Directive”, February 7, 2013.

NATO Cooperative Cyber Defense Centre of Excellence. [Електронний ресурс]. Доступно: https://ccdcoe.org/ . Дата звернення: 17.08.2018.

B. Lété, and P. Pernik, “EU–NATO Cybersecurity and Defense Cooperation: From Common Threats to Common Solutions”. The German Marshall Fund of the United States. Policy Brief, # 38, 2017.

ISO/IEC 27032:2012 Information technology - Security techniques - Guidelines for cybersecurity, 50 pp., 2012

“Gartner Says Worldwide Information Security Spending Will Grow 7 Percent to Reach $86.4 Billion in 2017”. [Електронний ресурс]. Доступно:https://www.gartner.com/en/newsroom/press-releases/2017-08-16-gartner-says-worldwide-information-security-spending-will-grow-7-percent-to-reach-86-billion-in-2017. Дата звернення: 17.08.2018.

“Элементы для создания глобальной культуры кибербезопасности. Документы ООН”. [Електронний ресурс]. Доступно: http://www.un.org/ru/documents/decl_conv/conventions/elements.shtml

А. И. Згоба, Д. В. Маркелов, та П. И. Смирнов, «Кибербезопасность: угрозы, вызовы, решения», Вопросы кибербезопасности, №5(8), 30-39, 2014.

B. Bystrova, “Comparative analysis of curricula for bachelor’s degree in cyber security in the USA and Ukraine”, Comparative professional pedagogy, 7(4), 114–119, 2017.

О. Ju. Burov, «Educational Networking: Human View to Cyber Defense», Information Technologies and Learning Tools, 52, 144—156, 2016.

М. Либицки, «Кибербезопасность: проблемы и пути их решения». [Електронний ресурс]. Доступно:http://www.pitsasinsurances.com/ru/article/cyber-risk-problems-solutions-insurance/. Дата звернення: 18.08.2018.

В. Ю. Биков, та М. П. Лещенко, «Цифрова гуманістична педагогіка відкритої освіти», Теорія і практика управління соціальними системами: філософія, психологія, педагогіка, соціологія, № 4, 115-130, 2016.

Кібербезпека. аспект 1: соціальні мережі. Міністерство оборони України. [Електронний ресурс]. Доступно:http://www.mil.gov.ua/ukbs/shhodenni-kiberzagrozi/kiberbezpeka-aspekt-1-soczialni-merezhi.html. Дата звернення: 21.03.2019.

UNESCO, «Partnering for prosperity: education for green and inclusive growth; Global education monitoring report», 2016. [Електронний ресурс]. Доступно:https://unesdoc.unesco.org/ark:/48223/pf0000246918. Дата звернення: 21.03.2019.

O. Burov, "Virtual Life and Activity: New Challenges for Human Factors/Ergonomics", in Symp. Beyond Time and Space STO-MP-HFM-231, STO NATO, 2014, pp. 8-1…8-8.

R. F. Mansour, "Understanding how big data leads to social networking vulnerability", Comput.Hum.Behav., 57, 348-351, Elsevier Ltd, 2016.

М. Кузнецов, «Социальная инженерия и социальные хакеры», Петербург: БХВ-Петербург, 2007.

В. Ю. Биков, "Теоретико-методологічні засади створення і розвитку сучасних засобів та е-технологій навчання". Розвиток педагогічної і психологічної наук в Україні 1992 – 2002. Збірник наукових праць до 10–річчя АПН України . Академія педагогічних наук України. Частина 2. Харків: “ОВС”, 2002. С. 182-199.

О. П. Пінчук, С. Г. Литвинова, та О. Ю. Буров, "Синтетичне навчальне середовище – крок до нової освіти", Інформаційні технології та засоби навчання , 4(60), 28-45, ISSN 2076-8184. [Електронний ресурс]. Доступно: https://journal.iitta.gov.ua/index.php/itlt/article/view/1831, 2017.

Z.Yan, T. Robertson, R. Yan, Sung Yong Park, S. Bordoff, Q. Chen, and E. Sprissler, “Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?”, Computers in Human Behavior, ISSN: 0747-5632, Vol: 84, Page: 375-382, 2018.

A. Klimburg et al., “National cyber security framework manual”. NATO CCD COE Publications (December 2012), [Електронний ресурс]. Доступно: http://belfercenter.hks.harvard.edu/files/hathaway-klimburg-nato-manualch-1.pdf, 2012.

О. Ю. Буров, В. В. Камишин, Н. І. Поліхун, та А. Т. Ашеров, Технології використання мережевих ресурсів для підготовки молоді до дослідницької діяльності : Монографія, О. Ю. Буров, Ред. К.: ТОВ «Інформаційні системи», 2012.

Т. Савчук, «Соціальна інженерія: як шахраї використовують людську психологію в інтернеті», 30 серпня 2018. [Електронний ресурс]. Доступно:https://www.radiosvoboda.org/a/socialna-inzhenerija-shaxrajstvo/29460139.html. Дата звернення: 18.08.2018.

Н. П. Дементієвська, "Професійний розвиток вчителів щодо компетентностей, пов’язаних з безпечним і відповідальним використанням електронних соціальних мереж". [Електронний ресурс]. Звітна наукова конференція Інституту інформаційних технологій і засобів навчання НАПН України : матеріали наук. конф., (Київ, 28 бер. 2017 р.). НАПН України, Ін-т інформаційних технологій і засобів навч. К.: ІІТЗН НАПН України, 26-31, [Електронний ресурс]. Доступно: http://lib.iitta.gov.ua/id/eprint/708603, 2017.

Элементы для создания глобальной культуры кибербезопасности.[Електронний ресурс]. Доступно: http://www.un.org/ru/documents/decl_conv/conventions/elements.shtml

Н. П. Дементієвська, "Формування навичок критичного оцінювання веб-ресурсів і проблема безпеки учнів в інтернеті", Комп'ютер у школі та сім'ї , 7, 46-51, 2015.


REFERENCES (TRANSLATED AND TRANSLITERATED)

DSTU 3899-99. Design and definirions. Kyiv, Derzhstandart Ukrainy, 33, 1999 (in Ukrainian).

«Education and Training 2020 Work programme. Thematic Working Group 'Assessment of Key Competences' Literature review, Glossary and examples». European Commission, Directorate-General for Education and Culture, November, 52, 2012 . (in English)

National report on the state and prospects of education in Ukraine. NAPN Ukrainy, K.: Pedahohichna dumka, 448 с., 2016. (in Ukrainian).

V. Yu. Bykov, O. M. Spirin, and O. P. Pinchuk, “General secondary education as the basic link in the system of continuous education“. Naukove zabezpechennia rozvytku osvity v Ukraini: aktualni problemy teorii i praktyky (do 25-richchia NAPN Ukrainy) [Tekst] : zbirnyk naukovykh prats, Kyiv : Vydavnychyi dim "Sam", 175-245, 2017. (in Ukrainian).

V. Yu. Bykov, Society of knowledge and education. [online]. Available:https://www.youtube.com/watch?v=cDIytlESUz4. Accessed on: 22.03.2019. (in Ukrainian).

Law № 2163-VІІІ “About the basic principles of providing cyber security of Ukraine” (Vidomosti Verkhovnoi Rady), № 45, с. 403, 2017. (in Ukrainian).

European Commission, Digital Single Market News, “EU Cybersecurity Plan to Protect Open Internet and Online Freedom and Opportunity — Cybersecurity Strategy and Proposal for a Directive”, February 7, 2013. (in English)

NATO Cooperative Cyber Defense Centre of Excellence. [online]. Available: https://ccdcoe.org/. Accessed on: 17.08.2018. (in English)

B. Lété, and P. Pernik, “EU–NATO Cybersecurity and Defense Cooperation: From Common Threats to Common Solutions”. The German Marshall Fund of the United States. Policy Brief, # 38, 2017. (in English)

ISO/IEC 27032:2012 Information technology - Security techniques - Guidelines for cybersecurity, 50 pp., 2012. (in English)

“Gartner Says Worldwide Information Security Spending Will Grow 7 Percent to Reach $86.4 Billion in 2017”. [online]. Available: https://www.gartner.com/en/newsroom/press-releases/2017-08-16-gartner-says-worldwide-information-security-spending-will-grow-7-percent-to-reach-86-billion-in-2017. Accessed on: 17.08.2018. (in English)

“Elements for creating a global culture of cybersecurity. UN documents”. [online]. Available: http://www.un.org/ru/documents/decl_conv/conventions/elements.shtml. Accessed on: 22.03.2019. (in Russian)

A. Y. Zghoba, D. V. Markelov, and P. Y. Smyrnov, «Cybersecurity: threats, challenges, solutions», Voprosy kyberbezopasnosty, №5(8), 30-39, 2014. (in Russian).

B. Bystrova, “Comparative analysis of curricula for bachelor’s degree in cyber security in the USA and Ukraine”, Comparative professional pedagogy, 7(4), 114–119, 2017.

О. Ju. Burov, «Educational Networking: Human View to Cyber Defense», Information Technologies and Learning Tools, 52, 144—156, 2016.

M. Lybytsky, «Cybersecurity: problems and solutions to them». [online]. Available: http://www.pitsasinsurances.com/ru/article/cyber-risk-problems-solutions-insurance/. Accessed on: 18.08.2018. (in Russian).

V. Yu. Bykov, ta M. P. Leshchenko, «Digital humanistic pedagogy of open education», Teoriia i praktyka upravlinnia sotsialnymy systemamy: filosofiia, psykholohiia, pedahohika, sotsiolohiia, № 4, 115-130, 2016. (in Ukrainian).

Syber security. Aspect 1: Social Networks. Ministry of ce of Ukraine. [online]. Available: http://www.mil.gov.ua/ukbs/shhodenni-kiberzagrozi/kiberbezpeka-aspekt-1-soczialni-merezhi.html. Accessed on: 21.03.2019. (in Ukrainian).

UNESCO, «Partnering for prosperity: education for green and inclusive growth; Global education monitoring report», 2016. [online]. Available: https://unesdoc.unesco.org/ark:/48223/pf0000246918. Accessed on: 21.03.2019. (in English).

O. Burov, "Virtual Life and Activity: New Challenges for Human Factors/Ergonomics", in Symp. Beyond Time and Space STO-MP-HFM-231, STO NATO, 2014, pp. 8-1…8-8. (in English).

R. F. Mansour, "Understanding how big data leads to social networking vulnerability", Comput.Hum.Behav., 57, 348-351, Elsevier Ltd, 2016. (in English).

M. Kuznetsov, « Social engineering and social hackers», Peterburh: BKhV-Peterburh, 2007. (in Russian).

V. Yu. Bykov, "Theoretical and methodological principles of creation and development of modern means and e-technologies of training". Rozvytok pedahohichnoi i psykholohichnoi nauk v Ukraini 1992 – 2002. Zbirnyk naukovykh prats do 10–richchia APN Ukrainy . Akademiia pedahohichnykh nauk Ukrainy. Chastyna 2. Kharkiv: “OVS”, 2002. P. 182-199. (in Ukrainian).

O. P. Pinchuk, S. H. Lytvynova, O. Yu. Burov, "Synthetic educational environment – a footpace to new education", Informatsiini tekhnolohii ta zasoby navchannia, 4(60), 28-45. ISSN 2076-8184. [online]. Available:https://journal.iitta.gov.ua/index.php/itlt/article/view/1831. Accessed on: 26.04.2018. (in Ukrainian).

Z.Yan, T. Robertson, R. Yan, Sung Yong Park, S. Bordoff, Q. Chen, and E. Sprissler, “Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?”, Computers in Human Behavior, ISSN: 0747-5632, Vol: 84, Page: 375-382, 2018. (in English).

A. Klimburg et al., “National cyber security framework manual”. NATO CCD COE Publications (December 2012), [online]. Available: http://belfercenter.hks.harvard.edu/files/hathaway-klimburg-nato-manualch-1.pdf, 2012. (in English).

O. Iu. Burov, V. V. Kamyshin, N. I. Polikhun, А. Т. Asherov. “Technologies of network resources’ use for young people training for research activity”: Monograph, O. Iu. Burov (Eds.), К.: TOV «Informatsiini Systemy», 416 p., 2012 (in Ukrainian).

T. Savchuk, «Social engineering: how fraudsters use human psychology on the Internet», 30 serpnia 2018. [online]. Available: https://www.radiosvoboda.org/a/socialna-inzhenerija-shaxrajstvo/29460139.html (in Ukrainian).

N. P. Dementiievska, "Teacher Professional Development on Competences Related to Safe and Responsible Use of Electronic Social Networks". Zvitna naukova konferentsiia Instytutu informatsiinykh tekhnolohii i zasobiv navchannia NAPN Ukrainy : materialy nauk. konf., (Kyiv, 28 ber. 2017 r.). NAPN Ukrainy, In-t informatsiinykh tekhnolohii i zasobiv navch. K.: IITZN NAPN Ukrainy, 26-31. [online]. Available: http://lib.iitta.gov.ua/id/eprint/708603, 2017 (in Ukrainian).

Elements for creating a global culture of cybersecurity. [online]. Available: http://www.un.org/ru/documents/decl_conv/conventions/elements.shtml. (in Russian).

N. P. Dementiievska, "Formation of the skills of critical evaluation of web resources and the problem of student safety on the Internet", Kompiuter u shkoli ta simi , 7, 46-51, 2015 (in Ukrainian).

Authors who publish in this journal agree to the following terms:

  1. Authors hold copyright immediately after publication of their works and retain publishing rights without any restrictions.
  2. The copyright commencement date complies the publication date of the issue, where the article is included in.

Content Licensing

  1. Authors grant the journal a right of the first publication of the work under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others freely to read, download, copy and print submissions, search content and link to published articles, disseminate their full text and use them for any legitimate non-commercial purposes (i.e. educational or scientific) with the mandatory reference to the article’s authors and initial publication in this journal.
  2. Original published articles cannot be used by users (exept authors) for commercial purposes or distributed by third-party intermediary organizations for a fee.

Deposit Policy

  1. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) during the editorial process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (see this journal’s registered deposit policy at Sherpa/Romeo directory).
  2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
  3. Post-print (post-refereeing manuscript version) and publisher's PDF-version self-archiving is allowed.
  4. Archiving the pre-print (pre-refereeing manuscript version) not allowed.

Downloads

Download data is not yet available.