{"id":364,"date":"2024-11-25T03:30:45","date_gmt":"2024-11-25T03:30:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sbrow121\/?p=364"},"modified":"2024-11-25T03:30:45","modified_gmt":"2024-11-25T03:30:45","slug":"political-implications-and-the-need-for-cybersecurity-strategy-to-be-included-in-the-standards-of-learning","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/sbrow121\/2024\/11\/25\/political-implications-and-the-need-for-cybersecurity-strategy-to-be-included-in-the-standards-of-learning\/","title":{"rendered":"Political Implications and The Need for Cybersecurity Strategy to be Included in the Standards of Learning"},"content":{"rendered":"\n<p>Susan Brown-Clukey<\/p>\n\n\n\n<p>CYSE425W<\/p>\n\n\n\n<p>Professor Bora Aslan<\/p>\n\n\n\n<p>The necessity and urgency of including cybersecurity as part of the standards of learning for school-aged children&nbsp;is due to the growing threat of cyberattacks that target students and schools. If an attack occurred, it would create&nbsp;significant privacy concerns, disrupt education delivery, and compromise sensitive personal data, leading to political pressure to address these issues through policy changes and increased funding for cybersecurity education initiatives in K-12 systems.&nbsp;<\/p>\n\n\n\n<p>Critical reasons for political implications:&nbsp;<\/p>\n\n\n\n<p>Student Privacy Concerns:<\/p>\n\n\n\n<p>With the substantial amount of sensitive student data, students are highly vulnerable to cybercriminals. Whether it&#8217;s a data breach caused by staff or students, the aftermath could be severe, leading to financial fraud, damage to students&#8217; reputations, and even identity theft.<\/p>\n\n\n\n<p>Disruption of Education:<\/p>\n\n\n\n<p>A cyberattack can potentially significantly disrupt school operations. It can impact teaching and learning, restrict access to learning platforms, and potentially lead to demands for accountability from parents and the community.<\/p>\n\n\n\n<p>Public Perception:<\/p>\n\n\n\n<p>Any major cyber-attack involving student data could lead to distrust in the school district&#8217;s ability to protect the student&#8217;s sensitive data, leading to political pressure for improved security measures.&nbsp;<\/p>\n\n\n\n<p>Political Actions that might be taken:&nbsp;<\/p>\n\n\n\n<p>Legislation Mandating Cybersecurity Education:<\/p>\n\n\n\n<p>Legislation must be introduced mandating schools to incorporate cybersecurity education into their curriculum at various grade levels. This is a proactive step towards protecting our students and schools from cyber threats&nbsp;and creating government ACTS and task forces such as CIPA and ICAC.&nbsp;Children\u2019s Internet Protection Act (CIPA)was enacted by Congress in 2000 to address concerns about children\u2019s access to obscene or harmful content over the Internet. Schools and libraries that receive funding from the CIPA E-rate program must follow specific Internet policies that address and certify that they comply with the following: 1. Minors access&nbsp;to inappropriate matters on the Internet. 2. The safety and security of minors when using electronic mail, chat rooms, and other forms of direct electronic communications. 3. Unauthorized access, including so-called \u201chacking\u201d and other unlawful activities by minors online. 4. Unauthorized disclosure, use, and dissemination of personal information regarding minors. 5. Measures restricting minors&#8217; access to materials harmful to them.&nbsp;((CIPA), n.d.)<\/p>\n\n\n\n<p>The Internet Crimes Against Children Task Force Program (ICAC) was developed in 1998 in response to the ever-increasing number of children and teenagers using the Internet. The ICAC Task Force has helped state and local law enforcement agencies in approximately 184,700 investigations, leading to 10,800 arrests in 2023. In 2024, ICAC made over 3,000 arrests and over 4,100 online safety presentations and events in the first quarter alone. (Internet Crimes Against Children (ICAC) Task Force Program, n.d.)<\/p>\n\n\n\n<p>Funding for Cybersecurity Initiatives:<\/p>\n\n\n\n<p>Schools could and should receive increased funding to train their educators better in cybersecurity and improve their network security infrastructure. The FCC media released information regarding a \u201cSchools and Libraries Cybersecurity Pilot Program,\u201d which would award up to $200 million to selected participants over three years to fund universal support with cybersecurity services and equipment to protect schools and libraries.&nbsp;(FCC, fcc.gov cybersecurity pilot program, 2024)<\/p>\n\n\n\n<p>Cybersecurity Awareness Campaigns:<\/p>\n\n\n\n<p>By launching and conducting various awareness campaigns, such as those of&nbsp;the government agencies and private agencies listed below, they will not only raise public awareness but also educate parents and students about online safety and responsible digital behavior.&nbsp;<\/p>\n\n\n\n<p>CISA.gov, \u201cThe CISA Cybersecurity Awareness Program is a national public awareness effort aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. Cybersecurity is a shared responsibility, and we each have a part to play. When we all take simple steps to be safer online \u2013 at home, in the workplace, and our communities \u2013 it makes using the Internet a more secure experience for everyone.\u201d Exploring this site further, a link to <a href=\"https:\/\/www.schoolsafety.gov\/\">https:\/\/www.schoolsafety.gov\/<\/a> will lead to topics that cover cybersecurity issues and any problems that might impact students.&nbsp;(Agency, 2022)<\/p>\n\n\n\n<p>Low-Cost Online Cybersecurity Learning Content | NIST: This website provides multiple websites and links for cybersecurity career and professional development, educator training, employee awareness training, and K-12 education and games. (NIST, n.d.)<\/p>\n\n\n\n<p>In conclusion, the various governmental agencies, independent commissions, and bills passed by Congress detail the necessity of protecting children from harmful content and malicious actors on the internet. The need for various hardening strategies for cybersecurity in K-12 institutions has been enumerated, and issues with the current strategies have been&nbsp;highlighted.<\/p>\n\n\n\n<p>(CIPA), F. C. (n.d.). <em>fcc.gov<\/em>. Retrieved from fcc.gov: https:\/\/www.fcc.gov\/consumers\/guides\/childrens-internet-protection-act<\/p>\n\n\n\n<p>Agency, C. &amp;. (2022, Sept 8). <em>Cybersecurity &amp; Infrastructure Security Agency<\/em>. Retrieved from https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-249a-0: https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-249a-0<\/p>\n\n\n\n<p>FCC. (2019, December 30). <em>fcc.gov<\/em>. Retrieved from fcc.gov: https:\/\/www.fcc.gov\/sites\/default\/files\/childrens_internet_protection_act_cipa.pdf<\/p>\n\n\n\n<p>FCC. (2024, October 2). <em>fcc.gov cybersecurity pilot program<\/em>. Retrieved from fcc.gov cybersecurity pilot program: https:\/\/www.fcc.gov\/cybersecurity-pilot-program<\/p>\n\n\n\n<p>FCC. (n.d.). <em>Federal Communications Commission<\/em>. Retrieved from fcc.gov: https:\/\/www.fcc.gov\/consumers\/guides\/childrens-internet-protection-act<\/p>\n\n\n\n<p><em>Internet Crimes Against Children (ICAC) Task Force Program<\/em>. (n.d.). Retrieved from Internet Crimes Against Children (ICAC) Task Force Program: https:\/\/www.icactaskforce.org\/internetsafety<\/p>\n\n\n\n<p>NIST. (n.d.). <em>National Institute of Standards and Technology<\/em>. Retrieved from National Institute of Standards and Technology: https:\/\/www.nist.gov\/<\/p>\n\n\n\n<p>relations, F. n. (2024, October 2). <em>Schoolsafety.gov<\/em>. Retrieved from schoolsafety.gov: https:\/\/www.schoolsafety.gov\/<\/p>\n\n\n\n<p>saferkidsonline. (2022, December 1). <em>saferkidsonline<\/em>. Retrieved from saferkidsonline.com: https:\/\/saferkidsonline.eset.com\/uk\/article\/identifying-common-social-engineering-attacks-to-kids<\/p>\n\n\n\n<p>Valle, G. D. (2024, July 22). <em>msn.com<\/em>. Retrieved from msn.com: https:\/\/www.msn.com\/en-us\/news\/technology\/man-convicted-for-sextortion-of-more-than-100-children-on-omegle-snapchat-and-tiktok\/ar-BB1qqCas<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Susan Brown-Clukey CYSE425W Professor Bora Aslan The necessity and urgency of including cybersecurity as part of the standards of learning for school-aged children&nbsp;is due to the growing threat of cyberattacks that target students and schools. If an attack occurred, it would create&nbsp;significant privacy concerns, disrupt education delivery, and compromise sensitive personal data, leading to political&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sbrow121\/2024\/11\/25\/political-implications-and-the-need-for-cybersecurity-strategy-to-be-included-in-the-standards-of-learning\/\">Read More<\/a><\/div>\n","protected":false},"author":26945,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sbrow121\/wp-json\/wp\/v2\/posts\/364"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sbrow121\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sbrow121\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sbrow121\/wp-json\/wp\/v2\/users\/26945"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sbrow121\/wp-json\/wp\/v2\/comments?post=364"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/sbrow121\/wp-json\/wp\/v2\/posts\/364\/revisions"}],"predecessor-version":[{"id":365,"href":"https:\/\/sites.wp.odu.edu\/sbrow121\/wp-json\/wp\/v2\/posts\/364\/revisions\/365"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sbrow121\/wp-json\/wp\/v2\/media?parent=364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sbrow121\/wp-json\/wp\/v2\/categories?post=364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sbrow121\/wp-json\/wp\/v2\/tags?post=364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}