Skip to main content

Currently Skimming:

Computer Security Training for Professional Specialists and Other Personnel Associated with Preventing and Responding to Computer Attacks--Anatoly A. Malyuk, Nikolai S. Pogozhin, and Aleksey I. Tolstoy
Pages 119-128

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 119...
... This report reviews the characteristics of the information security personnel training system in Russia, defines the basic areas of educational activity, and highlights the most promising of them, which are associated with continuing education. The report also discusses the basic problems that need to be resolved in order to ensure that the necessary level of training is provided for specialists and other personnel at facilities where information technologies could be subject to computer attacks.
From page 120...
... , created by organizations actively operating in the information protection services market and licensed to conduct their training activities by local governmental authorities responsible for education Participants • university students and other course participants being trained at higher educational institutions, regional training and scientific centers, and continuing education training centers • instructors at the various educational institutions and centers • administrative personnel organizing and facilitating the training process Educational and Methodological Resource Support • state educational standards for higher professional education in the seven specialties included in the information security classification • educational plans for training specialists in the specific specialties • educational programs for specific training courses in the seven specialties • educational programs for continuing education or retraining courses aimed at allowing participants to obtain additional qualifications • textbooks, educational and methodological handbooks, and practical laboratory training exercises • informational materials supporting the training process Management Subsystem • Russian Federation Ministry of Education, which issues licenses for educational activities conducted by higher educational institutions
From page 121...
... • problems of professional orientation for incoming students owing to the difficulty of instituting strict principles for the selection of personnel to be trained in information security specialties. The existing educational system is oriented toward the training of young people, beginning from the first year in
From page 122...
... • flexibility and possibility of changing educational programs • ease of implementing targeted training geared to the interests of specific enterprises • possibility of meeting quantitative needs for trained specialists Therefore, we might expect that this form of educational activity will find broader application in the training of professional specialists and other personnel involved in combating computer attacks. This activity is oriented toward the utilization of specific information technologies and information protection systems.
From page 123...
... It is appropriate to follow the principle of a differentiated approach aimed at determining the categories of students working at specific enterprises. These categories could include the following: • information technology specialists working in units responsible for the operation of hardware and software • specialists who use information technologies in units involved in carrying out an enterprise's primary mission • information protection specialists working in information security units • information security administrators responsible for monitoring the level of information protection • physical security specialists.
From page 124...
... " makes it possible to define the technological requirements involved in implementing continuing education programs. Most training centers in Russia generally use traditional educational technologies (lectures, seminars, practical exercises)
From page 125...
... . ." Therefore, the system for personnel training in information security must be viewed as part of the unified educational sector of Russia, understood as "the totality of organizational measures, informational and methodological resources, and modern educational and information technologies that ensure the high quality of education in all regions of Russia and the effective utilization of the country's scientific and pedagogical potential." Consequently, management of the modern personnel training system for the information security sphere must take into account the following points: • standardized educational and methodological resources • existing infrastructure of system facilities • availability of modern information and educational technologies in the system • existence of a tri-level system for the management of education in Russia (Ministry of Education or Regional Administrative Agency -- Educational Methodology Association -- Educational Institution or Training Center)
From page 126...
... Degree programs are offered for specialists in the fields of comprehensive protection of information technologies and comprehensive information security for automated systems. Graduates of these programs are qualified as information protection specialists, and the course of study takes five and a half years to complete.
From page 127...
... • Information Security (including international participants; June, Taganrog, State Radiotechnical University) • Methods and Technical Means of Ensuring Information Security (October, St.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.