Main content

Home

Menu

Loading wiki pages...

View
Wiki Version:
# Cybersecurity Fundamentals Cybersecurity has strong roots in computer science. This means that the traditional starting point for cybersecurity problems and solutions comes from a computer science perspective, which is quite technical and will be perceived as very technical by non-computer scientists. As a result, the technological underpinnings and terminological idiosyncrasies of cybersecurity research may initially be inaccessible to psychology students. However, without a proper understanding of the technical foundations, common terminology, and key concepts in cybersecurity, it is difficult to understand the role of psychology in cybersecurity, to contribute to the scientific debate on cybersecurity, and to engage in interdisciplinary exchanges on a common basis of understanding and communication. Speaking the language of cybersecurity is necessary for high-impact contributions from psychology in cybersecurity, for cybersecurity as a career perspective for psychologists, and for fruitful interdisciplinary exchange. Therefore, psychologists need a basic understanding of the terminology, key concepts, and technical foundations of cybersecurity. ## Content The existing learning modules aim to provide psychologists with a better understanding of the technological underpinnings of cybersecurity from a layperson's perspective. To this end, the modules explain the fundamentals of cybersecurity at a basic level, using everyday examples that lay people can relate to, so that a working understanding can be developed for psychologists without requiring prior in-depth knowledge of computer science cybersecurity. Using a modular approach, the content is designed in such a way that teachers can select content according to their needs and interests to design their own courses. Based on the [ACM curriculum](https://cybered.hosting.acm.org/wp/) recommendations for cybersecurity, this module provides knowledge on the following domains of cybersecurity: - [Introduction](https://osf.io/qukj4/wiki/Module%201:%20Introduction/) - [Data Security](https://osf.io/qukj4/wiki/Module%202%2C%20Part%201:%20Introduction/) - [Software Security](https://osf.io/qukj4/wiki/Module%203%2C%20Part%201:%20Introduction/) - [Component Security](https://osf.io/qukj4/wiki/Module%204%2C%20Part%201:%20Introduction/) - [Connection Security](https://osf.io/qukj4/wiki/Module%205%2C%20Part%201:%20Introduction/) - [Systems Security](https://osf.io/qukj4/wiki/Module%206%2C%20Part%201:%20Introduction/) - [Human Security](https://osf.io/qukj4/wiki/Module%207%2C%20Part%201:%20Introduction/) - [Organizational Security](https://osf.io/qukj4/wiki/Module%208%2C%20Part%201:%20Introduction/) - [Societal Security](https://osf.io/qukj4/wiki/Module%209%2C%20Part%201:%20Introduction/) ## Contents of Every Module Each module contains the following information - A brief **summary** of the module and the topics it covers - A description of the **learning objectives** of the current module - The **learning materials** for the module, including references and digressions on how human behaviour and experience play a role in this topic - Further information such as references to (scientific) review articles that are easy to understand that are easy to understand and references to videos, blog posts, etc. Each paragraph is short and concise to allow teachers to easily create slides from the materials. ## Conclusion Have fun! Please contact [Rudolf Siegel](https://osf.io/dfbpr/) for further information or if there is a need to change something in the learning materials. ## Funding !["EU Logo Funding"](https://osf.io/download/ga4sb/)
OSF does not support the use of Internet Explorer. For optimal performance, please switch to another browser.
Accept
This website relies on cookies to help provide a better user experience. By clicking Accept or continuing to use the site, you agree. For more information, see our Privacy Policy and information on cookie use.
Accept
×

Start managing your projects on the OSF today.

Free and easy to use, the Open Science Framework supports the entire research lifecycle: planning, execution, reporting, archiving, and discovery.