<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2025-10-2-0-4</article-id><article-id pub-id-type="publisher-id">3820</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;THE FEATURES OF DESIGNING BACHELOR&amp;#39;S&amp;nbsp;AND SPECIALIST&amp;#39;S DEGREE CURRICULA&amp;nbsp;IN INFORMATION SECURITY&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;THE FEATURES OF DESIGNING BACHELOR&amp;#39;S&amp;nbsp;AND SPECIALIST&amp;#39;S DEGREE CURRICULA&amp;nbsp;IN INFORMATION SECURITY&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Prokushev</surname><given-names>Yaroslav Evgenievich</given-names></name><name xml:lang="en"><surname>Prokushev</surname><given-names>Yaroslav Evgenievich</given-names></name></name-alternatives><email>prokye@list.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Zalivin</surname><given-names>Alexander Nikolaevich</given-names></name><name xml:lang="en"><surname>Zalivin</surname><given-names>Alexander Nikolaevich</given-names></name></name-alternatives><email>zalivin@bsuedu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Ponomarenko</surname><given-names>Sergey Vladimirovich</given-names></name><name xml:lang="en"><surname>Ponomarenko</surname><given-names>Sergey Vladimirovich</given-names></name></name-alternatives><email>kaf-otzi-spec@bukep.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Ponomarenko</surname><given-names>Sergey Vladimirovich</given-names></name><name xml:lang="en"><surname>Ponomarenko</surname><given-names>Sergey Vladimirovich</given-names></name></name-alternatives><email>www.major@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2025</year></pub-date><volume>10</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2025/2/НР.ИТ_10.2_4.pdf" /><abstract xml:lang="ru"><p>Currently, information technology is one of the most important factors in ensuring the stable development of Russia. In this regard, ensuring information security is one of the priority areas of activity. In order to successfully counter threats to information security, it is necessary to ensure the training of qualified specialists in this field. The quality of their education is largely determined by how well the training program has been developed. An analysis of publications on this issue showed that aspects such as the choice of academic subjects, methods and technologies of conducting classes were considered in detail, and comparisons were made between the disciplines of curricula from universities around the world. However, according to the authors of the article, insufficient attention was paid to the consideration of such an important problem as determining the sequence of study of the subjects taught within the framework of the created curriculum. This circumstance determines the relevance of the subject of the article. The purpose of writing this article is to develop a set of models that describe not only an approximate set of disciplines, but also the sequence of their study. The result of the research presented in the article is a set of graphical models that demonstrates the approximate composition of disciplines, their continuity, interrelation and sequence of study. The proposed method of describing the interrelationship of academic disciplines can be used to analyze existing curricula, as well as to design new ones.</p></abstract><trans-abstract xml:lang="en"><p>Currently, information technology is one of the most important factors in ensuring the stable development of Russia. In this regard, ensuring information security is one of the priority areas of activity. In order to successfully counter threats to information security, it is necessary to ensure the training of qualified specialists in this field. The quality of their education is largely determined by how well the training program has been developed. An analysis of publications on this issue showed that aspects such as the choice of academic subjects, methods and technologies of conducting classes were considered in detail, and comparisons were made between the disciplines of curricula from universities around the world. However, according to the authors of the article, insufficient attention was paid to the consideration of such an important problem as determining the sequence of study of the subjects taught within the framework of the created curriculum. This circumstance determines the relevance of the subject of the article. The purpose of writing this article is to develop a set of models that describe not only an approximate set of disciplines, but also the sequence of their study. The result of the research presented in the article is a set of graphical models that demonstrates the approximate composition of disciplines, their continuity, interrelation and sequence of study. The proposed method of describing the interrelationship of academic disciplines can be used to analyze existing curricula, as well as to design new ones.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>training of information security specialists</kwd><kwd>organization of the educational process on information security</kwd><kwd>development of curricula on information security</kwd></kwd-group><kwd-group xml:lang="en"><kwd>training of information security specialists</kwd><kwd>organization of the educational process on information security</kwd><kwd>development of curricula on information security</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Belov E.B., Los V.P., Zaitseva O.M., Kuzora I.V. On the need to update professional standards in the field of information security and information technology / Methods and technical means of ensuring information security.&amp;nbsp;&amp;ndash; 2020. No 29. pp. 119-120.</mixed-citation></ref><ref id="B2"><mixed-citation>Belov E.B., Horev A.A. A conceptual approach to assessing the levels of formation of professional competencies in the field of information security. Information counteraction to terrorist threats. &amp;ndash; 2015. &amp;ndash; Т. 2. &amp;ndash;</mixed-citation></ref><ref id="B3"><mixed-citation>No 25. pp. 53-62.</mixed-citation></ref><ref id="B4"><mixed-citation>Belov E.B., Los V.P., Malyuk A.A. The digital economy and actual problems of the improvement of the training system in the field of information security. IT Security (Russia), [S.l.], v. 25, pp. 6-22.</mixed-citation></ref><ref id="B5"><mixed-citation>Asghar M.R., Luxton-Reilly A. Proceedings of the 51st ACM Technical Symposium on Computer Science Education: A Case Study of a Cybersecurity Program: Curriculum Design, Resource Management, and Reflections. Portland, USA. 2020.</mixed-citation></ref><ref id="B6"><mixed-citation>Bishop M., Miloslavskaya N., Theocharidou M. Proceedings of the 10th World Conference on Information Security Education &amp;ndash; WISE10: Information Security Education Across the Curriculum. Rome, Italy. 2015.</mixed-citation></ref><ref id="B7"><mixed-citation>Cabaj K., Domingos D., Kotulski Z., Resp&amp;iacute;cio A. Cybersecurity education: evolution of the discipline and analysis of master programs. Computers &amp;amp; Security, 75(3), 24-35. 2018.</mixed-citation></ref><ref id="B8"><mixed-citation>Chen H., Maynard S.B., Ahmad A. Proceedings of the 11th Australian Information Security Management Conference: A comparison of information security curricula in China and the USA. Churchlands, Australia: Edith Cowan University. 2013.</mixed-citation></ref><ref id="B9"><mixed-citation>Dawson M., Wang P., William K. Proceedings of the 15th International Conference on Information Technology &amp;laquo;Information Technology &amp;ndash; New Generations&amp;raquo;: The Role of CAE-CDE in Cybersecurity Education for Workforce Development. 2018. Vol. 738. Springer.</mixed-citation></ref><ref id="B10"><mixed-citation>Endicott-Popovsky B.E. Popovsky V.M. Application of pedagogical fundamentals for the holistic development of cybersecurity professionals. ACM Inroads, 2014. Vol. 5, № 1, рр. 57-68.</mixed-citation></ref><ref id="B11"><mixed-citation>Henry A.P. Mastering the cyber security skills crisis: realigning educational outcomes to industry requirements. Technical Report. ACCS Discussion paper. 2017. Retrieved from https://www.unsw.adfa.edu.au/unsw-canberra-cyber/sites/accs/files/uploads/ ACCS-Discussion-Paper-4-Web.pdf</mixed-citation></ref><ref id="B12"><mixed-citation>Joint Task Force on Cybersecurity Education. Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. 2018. New York, NY, U.S: Association for Computing Machinery.</mixed-citation></ref><ref id="B13"><mixed-citation>Kessler G.C., Ramsay J. Paradigms for cybersecurity education in a homeland security program. Journal of Homeland Security Education, 2013. 2, pp. 35-44.</mixed-citation></ref><ref id="B14"><mixed-citation>Lehto M. Proceedings of the 14th European Conference on Information Warfare and Security: Cyber security competencies &amp;ndash; cyber security education and research in Finnish universities. Hatfield, United Kingdom. 2015.</mixed-citation></ref><ref id="B15"><mixed-citation>Mouheb D., Abbas S., Merabti M. Cybersecurity Curriculum Design: A Survey. Pan Z., Cheok A.D., Mueller W., Transactions on Edutainment XV. Lecture Notes in Computer Science. Berlin, Germany: Springer. 2019. vol 11345. рр. 93-107.</mixed-citation></ref><ref id="B16"><mixed-citation>Tsado L., Cybersecurity Education: The need for a topdriven, multidisciplinary, school-wide approach. Journal of Cybersecurity Education, Research and Practice, 2019. Vol. 2019. № 1, рр. 37-56.</mixed-citation></ref><ref id="B17"><mixed-citation>Ward P. Proceedings of the 54th Hawaii International Conference on System Sciences: Constructing a Methodology for Developing a Cybersecurity Program. 2021. рр.44-53.</mixed-citation></ref><ref id="B18"><mixed-citation>Yuan X., Yang L., Jones B., Yu H., Chu B. Secure Software Engineering Education: Knowledge Area, Curriculum and Resources. Journal of Cybersecurity Education, Research and Practice, Vol. 2016. No 1, 31-54.</mixed-citation></ref><ref id="B19"><mixed-citation>Federal State educational standard of higher education &amp;ndash; bachelor&amp;#39;s degree in the field of training 10.03.01 &amp;quot;Information security&amp;quot;. URL: https://fgosvo.ru/fgosvo/151/150/24/10</mixed-citation></ref></ref-list></back></article>