Virtual Laboratory for Modeling of Processes in Informational and Cyber Securities as a form of Forming Practical Skills of Students
Journal: Cybersecurity: Education, Science, Technique (Vol.2, No. 2)Publication Date: 2019-03-03
Authors : Volodymyr L. Buriachok Svitlana M. Shevchenko Pavlo M. Skladannyi;
Page : 98-104
Keywords : virtual laboratory; learning process; specialists in information and cybersecurity; practical experience;
Abstract
The number of hacker attacks and material damage that lately has hit the world is increasing every year. All this indicates that the need for specialists capable of detecting and assessing signs of third-party cyber-impacts, modeling the possible situations of such influence and forecasting their possible consequences, organizing and supporting a set of measures to ensure information and cybersecurity and counteract the unauthorized penetration of the opposing sides to their own IT systems and networks, provide cryptosecurity of their own information resource, etc. - will grow. This article focuses on the fact that the issue of cyber-security of data was particularly acute in Ukraine. Indeed, the quality of the information we receive depends on our future, including the future of our state. At the same time, the article stresses that no pedagogical theory will be implemented in educational activities, unless an appropriate algorithm is developed for its implementation - the algorithm of forming the professional competences of future specialists in the field of information and cyber security. On the basis of scientific pedagogical literature, the article defines the concept of "virtual laboratory" and its significance in the educational process of the institution of higher education. The relevance of the implementation of the laboratory for modeling processes in information and cybersecurity is substantiated. The virtual "cyberpolygon training" laboratory of the Borys Grinchenko University of Kyiv and the possibility of its use by students in the process of learning technologies in information and cybernetic security are presented.
Other Latest Articles
- Method of Efficient Representation and Protection of Dynamic Objects in Video Streams based on the Technology of Their Movement Compensation
- Network-Centric Monitoring for Cyber Incidents in Sectors of Critical State Infrastructure
- Model of Investment Strategies of Transport Situational Centers in Cyber Security Systems
- Classification of Cyber Cruise of Informational Resources of Automated Banking Systems
- Comparison of Possible Approaches for the Development of Low-Budget Spectrum Analyzers for Sensor Networks in the Range of 2.4–2.5 GHz
Last modified: 2019-03-03 20:57:40