Bridging Cybersecurity Practice and Law: a Hands-on, Scenario-Based Curriculum Using the NICE Framework to Foster Skill Development

πŸ“… 2025-09-21
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
Small and medium-sized businesses (SMBs) struggle to effectively identify, respond to, and mitigate cyber threats using the NIST NICE Framework. Method: This study introduces the first contextualized cybersecurity capability model tailored for SMBs, uniquely integrating technical cybersecurity competencies with legal and regulatory compliance responses. Grounded in the NIST NICE Framework, the model informs a threat-informed curriculum design incorporating realistic attack scenarios, simulation-based exercises, and real-world incident case studies. Contribution/Results: The resulting framework supports SMB workforce assessment, recruitment, and academic curriculum development. It demonstrably enhances learners’ ability to detect, respond to, and legally coordinate incident handling in authentic operational environments. By bridging technical skills, compliance requirements, and practical experience, the model delivers an actionable, scalable cybersecurity talent development solution specifically designed for resource-constrained SMBs.

Technology Category

Application Category

πŸ“ Abstract
In an increasingly interconnected world, cybersecurity professionals play a pivotal role in safeguarding organizations from cyber threats. To secure their cyberspace, organizations are forced to adopt a cybersecurity framework such as the NIST National Initiative for Cybersecurity Education Workforce Framework for Cybersecurity (NICE Framework). Although these frameworks are a good starting point for businesses and offer critical information to identify, prevent, and respond to cyber incidents, they can be difficult to navigate and implement, particularly for small-medium businesses (SMB). To help overcome this issue, this paper identifies the most frequent attack vectors to SMBs (Objective 1) and proposes a practical model of both technical and non-technical tasks, knowledge, skills, abilities (TKSA) from the NICE Framework for those attacks (Objective 2). The research develops a scenario-based curriculum. By immersing learners in realistic cyber threat scenarios, their practical understanding and preparedness in responding to cybersecurity incidents is enhanced (Objective 3). Finally, this work integrates practical experience and real-life skill development into the curriculum (Objective 4). SMBs can use the model as a guide to evaluate, equip their existing workforce, or assist in hiring new employees. In addition, educational institutions can use the model to develop scenario-based learning modules to adequately equip the emerging cybersecurity workforce for SMBs. Trainees will have the opportunity to practice both technical and legal issues in a simulated environment, thereby strengthening their ability to identify, mitigate, and respond to cyber threats effectively.
Problem

Research questions and friction points this paper is trying to address.

Addressing difficulties small-medium businesses face implementing cybersecurity frameworks
Developing practical scenario-based curriculum for cybersecurity skill development
Bridging technical and legal aspects of cybersecurity through hands-on training
Innovation

Methods, ideas, or system contributions that make the work stand out.

Scenario-based curriculum using NICE Framework
Model integrating technical and non-technical tasks
Hands-on learning with realistic cyber threat scenarios
πŸ”Ž Similar Papers
No similar papers found.
C
Colman McGuan
Department of Electrical and Computer Engineering, Washkewicz College of Engineering, Cleveland State University
A
Aadithyan V. Raghavan
Department of Electrical and Computer Engineering, Washkewicz College of Engineering, Cleveland State University
K
Komala M. Mandapati
Department of Computer Science, Washkewicz College of Engineering, Cleveland State University
Chansu Yu
Chansu Yu
Cleveland State University
Mobile computingQuantum computingCybersecurity
B
Brian E. Ray
College of Law, Cleveland State University
D
Debbie K. Jackson
Department of Instructional Excellence, Administration Center, Cleveland State University
S
Sathish Kumar
Department of Computer Science, Washkewicz College of Engineering, Cleveland State University