1. bookVolume 57 (2020): Issue 1-2 (April 2020)
Journal Details
License
Format
Journal
eISSN
2255-8896
First Published
18 Mar 2008
Publication timeframe
6 times per year
Languages
English
access type Open Access

Information System Cyber Threats and Telecommunications Engineering Courses

Published Online: 11 May 2020
Page range: 52 - 61
Journal Details
License
Format
Journal
eISSN
2255-8896
First Published
18 Mar 2008
Publication timeframe
6 times per year
Languages
English
Abstract

The article discusses the issue of training of telecommunications engineers. The architecture of telecommunications solutions is changing very quickly. Obviously, training programmes must also change. Cybersecurity issues are one of the main drivers of change in telecommunications solutions and, therefore, training programmes. They have become the main issues in all processes related to digital transformation. At the same time, it is clear that the development of education in telecommunications clearly lags behind modern requirements. Such issues come to the fore in relation to the development of digital economy programmes. Cyber security issues for military telecommunications solutions are discussed separately.

Keywords

1. Miladinovic, I., Schefer-Wenzl, S., & Hirner, H. (2019). Curriculum of a Telecommunications Study Program—A Matter of Trends? In Proc. CONTEL2019. The 15th International Conference on Telecommunications, 3–5 July 2019, Graz, Austria.10.1109/ConTEL.2019.8848529Search in Google Scholar

2. Global Telecom Crime Undermining Internet Security: Cyber-Telecom Crime Report. (21 March 2019). Available at https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/global-telecom-crime-undermining-internet-security-cyber-telecom-crime-reportSearch in Google Scholar

3. ThreatMetrix. (15 January 2019). Telco Fraud: Why this Industry is Unique in the Cybercrime Landscape. Available at https://www.threatmetrix.com/digital-identity-blog/cybercrime/telco-fraud-why-industry-unique-cybercrime-landscape/Search in Google Scholar

4. Europol’s European Cybercrime Centre. (21 March 2019). Cyber-Telecom Crime Report 2019. Available at https://www.europol.europa.eu/publications-documents/cyber-telecom-crime-report-2019Search in Google Scholar

5. ETSI TS 123 501 V15.2.0. (2018-06). 5G; System Architecture for the 5G System (Release 15). Available at https://www.etsi.org/deliver/etsi_ts/123500_123599/123501/15.02.00_60/ts_123501v150200p.pdfSearch in Google Scholar

6. United States Government Accountability Office. (9 October 2018). GAO-19-128. Weapon Systems Cybersecurity. DOD Just Beginning to Grapple with Scale of Vulnerabilities. Report to the Committee on Armed Services. Available at https://www.gao.gov/products/GAO-19-128Search in Google Scholar

7. Osborn, Ch. (16 May 2018). Defense Information Systems Network (DISN). An Essential Weapon for the Nation’s Defense. Available at file:///G:/Pentagon-book+/Osborn_%20DISN%20An%20Essential%20Weapon2018.pdf/Search in Google Scholar

8. Williams, L.C. (5 February 2019). DOD Cloud Strategy Puts JEDI at the Center. Available at https://defensesystems.com/articles/2019/02/06/dod-cloud-strategy.aspx/Search in Google Scholar

9. Keelan, T. (21 March 2019). The Pentagon’s JEDI Cloud Strategy is Ambitious, but Can it Work?. Available at https://www.c4isrnet.com/opinion/2019/03/21/the-pentagons-jedi-cloud-strategy-is-ambitious-but-can-it-work/Search in Google Scholar

10. Department of Defense. (December 2018). DoD Cloud Strategy Readiness for Artificial Intelligence (Al).Available at https://media.defense.gov/2019/Feb/04/2002085866/-1/-1/1/DOD-CLOUD-STRATEGY.PDFSearch in Google Scholar

11. U.S. Department of Defense. (12 February 2019). Summary of the 2018 Department of Defense Artificial Intelligence Strategy: Harnessing AI to Advance Our Security and Prosperity. Available at https://media.defense.gov/2019/Feb/12/2002088963/-1/-1/1/SUMMARY-OF-DOD-AI-STRATEGY.PDF/Search in Google Scholar

12. Li, T. (7 October 2015). What are Some Criticisms, if any, against Software-Defined Networking? Available at https://www.quora.com/What-are-some-criticisms-if-any-against-software-defined-networkingSearch in Google Scholar

13. Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., … & Wang, C. (2018). Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access, 35365–35381. DOI 10.1109/ACCESS.2018.283695010.1109/ACCESS.2018.2836950Search in Google Scholar

14. Digital Economy of the Russian Federation. Order of the Government of the Russian Federation of 28 July 2017 No. 1632-p (Tsifrovaya ekonomika Rossiyskoy Federatsii. Rasporyazheniye Pravitel’stva RF ot 28.07.2017 N 1632-r). Available at http://ac.gov.ru/en/projects/014097.htmlSearch in Google Scholar

15. Namiot, D., & Sneps-Sneppe, M. (2017). On Internet of Things and Big Data in University Courses. International Journal of Embedded and Real-Time Communication Systems, 8 (1), 18–30.10.4018/IJERTCS.2017010102Search in Google Scholar

16. Sneps-Sneppe, M., Sukhomlin, V., & Namiot, D. (2018). On Cyber-Security of Information Systems. In Proc. Distributed Computer and Communication Networks. 21st International Conference, DCCN 2018 (pp. 201–211), 17–21 September 2018, Moscow, Russia.10.1007/978-3-319-99447-5_17Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo