Cyber Security

Modern day requirements for network security talents

I. The Importance and Speciality of Strengthening the Moral Education of Cyber ​​Security Talents

Talent is the first resource of network security. Only by fully realizing the extremely important importance of network security discipline construction and talent training, can we better provide a strong talent guarantee for maintaining national cyber security. Strengthening the moral education of cyber security personnel is a “timely rain” in the context of the national cyber security talent strategy, the establishment of cyber security colleges by universities across the country, and the acceleration of the construction of first-class disciplines in cyber security. In the final analysis is the competition for talents. To build a strong nation on the Internet, there is no outstanding talent team, no talent creativity and vitality, and it is difficult to succeed. Gathering the talents of the world and cultivating them, providing strong talent support for the development of the network security cause, is an effective way to accelerate the filling of the network security talent gap. Dr. Zhang Xiaofei from China Information Security Evaluation Center pointed out that the international cyberspace security strategy has changed from defensive to offensive, and there is fierce competition for cybersecurity talents. Global cybersecurity talent training has entered the fast lane, and talent quality training cannot be ignored. At present, the imbalance between the supply and demand of China’s cyber security talents presents practical problems such as “emphasis on technology and light management”. Throughout the international environment, successive US governments have always attached great importance to the strategy of cyber security talents, and even adopted a more aggressive talent policy in the context of overall weakness, improving the talent system in core key areas to develop cyber security deterrent capabilities. The importance of ideological and political work for network security personnel is also reflected in its particularity. The security of cyber talents is extremely high-risk. In terms of role positioning, not only technical talents, but also national security guards. The unique characteristic of this profession makes cyber security talents like a double-edged sword, and it is easy to become the target of attack or lure by hostile elements. Therefore, we must attach importance to the education of ideals and beliefs, political quality education, and value education of network security personnel, and train a group of qualified builders and reliable successors of cyberspace security. Just as Professor Qin An, director of the China Institute of Cyberspace Strategy, believes that the conversion of cyber offense and defense is easy, and the transformation of positive and evil is also a matter of thought. It is especially important for cyberspace security personnel to maintain caution and independence. The ideological and political work of network security personnel is responsible for the arduous mission of strengthening the political red line, legal bottom line, and moral bottom line in the training of network security personnel.

Second, the purpose of the network security talent Lide Shuren work is to answer “fundamental questions”

Xi Jinping in the country’s ideological and political work conference stressed, what kind of person ideological and political work related to the training, how to train people and the fundamental problem of people for whom culture. Ideological and political work is fundamentally a person’s work. The first and foremost task of cultivating network security personnel is to answer this fundamental question. In fact, judging from the employment requirements of enterprises and institutions for information technology, network security and other talents, political and moral qualities are increasingly placed first. Faced with high-tech work risks, foolproof job requirements, and the temptation of high interests, cyber security personnel must be able to uphold the correct values, have a strong sense of responsibility, and stick to the bottom line of justice. In order to further improve the education system of ideological and political work for the training of cyberspace security personnel, Professor Qin An believes that while training cybersecurity personnel, they must strengthen the core values ​​of socialism while training professional knowledge and skills in cyberspace security, and cultivate a red and specialized network. Qualified builders and cultural successors of the security cause work hard to strengthen their ideals and convictions, to cultivate their patriotism, to strengthen their moral cultivation, and to continuously improve the comprehensive quality and comprehensive ability of network security personnel. According to the characteristics of the training of cyber security talents and the particularity of their ideological and political work, on the question of “how to train people”, we must establish new thinking, attach importance to talent safety, take Lide people as the central link, and strengthen the politics of cyber security talent training Red line, legal bottom line, moral bottom line. On the question of “what kind of people to cultivate”, we must persist in taking Ledgers as a fundamental task, strengthen education in political theory, patriotism, and so on, and constantly strengthen students’ “four consciousnesses” and “four self-confidences.” Cultivate a group of politically qualified, skilled, and talented cybersecurity talents, build a group of loyal guardians who maintain the security of the national cyberspace, active maintainers of the Internet culture, and brave explorers of independent security technologies. On the issue of “cultivating people for whom”, the cultivation of network security personnel must adhere to serving the people wholeheartedly, serving the Chinese Communist Party, governing the country, serving to consolidate and develop the socialist system with Chinese characteristics, and serving the reform, opening up, and socialist modernization. Service, and strive to create a batch of highly qualified and highly qualified cyber security personnel with both morals and talents, and train successors to the cause of the party, the country and the nation.

Third, the basic path to train “red and specialized” cybersecurity talents

(I) Establish a complete talent training program and curriculum system

Global network security personnel training has entered the fast lane, and the ideological and moral qualities of talents cannot be ignored. Colleges and universities, as the main positions and main battlefields for talent training, should actively carry out network security teaching work that integrates ideological and political education to lay the foundation for training excellent information security talents. At the first Cybersecurity Talent Ideological and Political Education Forum, Dr. Zhang Xiaofei used the United States to set professional courses and conduct academic education as an example. He described the plan of the Academic Center of Excellence jointly initiated by the US National Security Agency and the Department of Homeland Security to promote the hierarchical education of cyber security. In the development of universities, universities have implemented a variety of talent training models, selecting and cultivating cybersecurity talents through scholarships, summer camps, and competitions, and improving the technical capabilities and legal moral standards of cybersecurity personnel through the establishment of professional courses and effective academic education. In the network security personnel training model, we must continuously improve the personnel training program and curriculum system, study and formulate first-class professional training programs for network security personnel, and form a content system that promotes and integrates cyber security personnel professional training with ideological and political education. In the form and content of education, we must adapt to the situation, advance with the times, and renew according to the situation, and strive to build a cyberspace security personnel training ideological and political work system that gathers people with advanced culture, inspires people with historical missions, and inspires people with the spirit of the times . In addition, cyber security is a subject that is easy to “cross”. In practice, it is particularly cross-cutting with many humanities and social sciences such as journalism, law, politics, sociology, etc. Therefore, the training of cyber security talents must pay special attention to the integration of other disciplines Knowledge and thinking style, to promote the training of talents from the perspective of multidisciplinary integration.

(B) Strengthen the integration of technology and ethics in the training of cybersecurity personnel

Network security personnel educators must innovate ideological and political work methods, continuously promote the high integration of traditional ideological and political work advantages with network information technology, and actively promote the reform of teaching concepts, teaching models, and educational carriers. Dr. Zhang Xiaofei believes that through online security on-the-job education, training and qualification activities for information security personnel are carried out, and attention is paid to the systematic nature of network information security personnel training content. Establish a complete knowledge system including information security assurance, information security technology, information security standards and regulations, information security management, and information security engineering. To explore the new mode of merging technology and morality of cyberspace security personnel training, we must first establish a correct view of cyberspace security personnel. The training of network security personnel must comprehensively consider the entire network security industry ecological chain, continuously improve and optimize the “open door and skid lock” type offensive and defensive competitions that are quick and effective, and standardize the training of cyberspace security personnel from the three levels of military-civilian integration, national management, and self-improvement. Second, build a cyberspace security community for talent training. At the national and military levels, we will train cutting-edge talents and overall offensive and defensive talents for confrontation between nations. At the international level, a cyberspace maintenance force is established to create a cyberspace security community of interest, a community of responsibility, and a community of destiny. Thirdly, it is necessary to build an assessment system for cyberspace security talents, adopt a “ethical performance system” model, establish an evaluation system supported by specific indicators, and master the technical aspects of moral, legal, and political problems. Understand and grasp the moral, legal, and political requirements of cybersecurity personnel in practice, integrate moral requirements into technical points, and pursue a high level of prudence and independence. In network security science and technology, we must strengthen the spirit of collective operations and cooperation in tackling key problems. We must have a platform and sharing consciousness. We must not place our hopes on fighting alone.

(3) Comprehensively promote the construction of “course ideology and politics”.

Adhere to the party’s leadership in the training of cybersecurity personnel, adhere to the principle of educating all staff, educating the entire process, educating in all directions, increasing work input, improving work forms, and innovating working methods, and exerting the synergy between the professional and ideological and political teachers effect. On the one hand, some teachers of professional courses should strengthen the study of ideological and political theory, consciously strengthen the interaction with ideological and political teachers, and understand the key points and difficulties of ideological and political work in a targeted manner, so as to achieve the same pace with the ideological and political teachers. . On the other hand, it focuses on the legal education and political standing of professional and technical classroom teaching, innovates the talent training mode of combining corporate mentors and academic mentors, exerts the exemplary role of the backbone forces of the Party, the League, academic organizations, and scientific and technological societies, and guards ideology Position, inspire students’ potential for self-education; give full play to social forces, strengthen communication with cybersecurity departments, strengthen cooperation with cybersecurity companies, strengthen communication between universities and research institutions, explore ways of cooperation, and guide the healthy growth of cybersecurity talents . In view of the ambivalence of moral self-discipline and moral competence faced by the training of cyber security talents, we should also strengthen the education of role models in science and technology, and integrate the “Qian Xuesen spirit” and “two bombs and one star” advanced deeds into the ideology and politics of cyber security personnel In education, strengthen the combination of information technology literacy education and network moral model education. Promote the simultaneous development of the concept and technology of network security through the combination of the cultivation of scientific and technological innovation talents and the cultivation of moral model talents.

4. Innovative education and teaching methods oriented to practical needs

In the era of network information, to strengthen and improve the moral education of network security personnel, we must pay more attention to the cultivation of special talents in network security and innovate the ideological and political work methods of network security. Since the 1980s, companies such as Microsoft and IBM have trained a large number of scientists in the field of network security in combination with case practice teaching. “At present, the United States has vigorously improved the cross-domain applicability of cyber warfare commanders through the ‘military-industrial complex’ and joint training of cyber warfare commanders to ordinary command and combat positions.” Process hackers and other negative events is the best material to strengthen the ideological and political education network security professionals, network security incidents in China and the world, such as Facebook user data leakage, South Korea Pyeongchang Winter Olympics suffered hacker attacks, etc. can be developed Cheng teaching cases are used in teaching to familiarize students with cyber security hidden danger prevention and control points and troubleshooting methods. “For example, the” Cyber ​​Storm “exercise organized by the US Department of Defense and the Department of Homeland Security, and the Digital Forensics Challenge organized by the Department of Defense Cybercrime Center. Advertising and other methods to select and train cyber security talents who can work for the government. ” On the other hand, through living case teaching and educational penetration, students have formed a psychological and cultural identity that they “do not want to be black, cannot be black, and dare not be black”. For example, network vulnerability information often give criminals an opportunity to exploit, especially hackers by virtue of a higher level of computer network technology computer network system for the purpose of destruction of unauthorized access to a computer network system. But how did hacking happen? Social, national and even cause others what kind of loss? How do we simulate the actual prevention based on the incident? It is a very effective way to carry out case and event process analysis teaching with these questions. In addition, colleges and universities need to leverage on enterprise technical experts with rich practical experience to teach courses and serve as mentors. Based on the latest needs of the cyber security industry, conduct internships and practical exercises in cyber security companies, and establish collaborative training of cyber security talents. Mechanisms.

Muhammad Zeeshan

Freelancer and a blogger with a focus on technology.

Related Articles

Back to top button

Ad Blocker Detected

Please consider supporting us by disabling your ad blocker