HomeAsia Pacific Journal of Management and Sustainable Developmentvol. 13 no. 1 Part 3 (2025)

Gearing Up for Cyberwarfare: A Feasibility Study for a Bachelor of Science in Cybersecurity Program

Maria Cristina M. Ramos

Discipline: Information Technology

 

Abstract:

The digital age has brought forth unparalleled opportunities but also significant vulnerabilities, with cyberspace emerging as the new battlefield for nation-states, criminal organizations, and other actors. This research explores the technical, resource, and feasibility requirements necessary to establish a Bachelor of Science (BS) program in Cybersecurity, focusing on assessing financial, market, infrastructure, and target audience considerations. A mixed-method approach was employed to design a comprehensive cybersecurity curriculum. Initial qualitative content analysis of threat intelligence reports, industry publications, and expert interviews provided insights into current cyber threats, guiding the identification of essential skills, such as network security, ethical hacking, and digital forensics. In the second phase, surveys and document reviews helped evaluate existing programs, faculty expertise, and resources, while case studies informed the development of a program framework integrating hands-on learning and industry collaboration. This research also examined the financial, market, and technical feasibility of implementing the program at Lyceum of the Philippines University-Batangas (LPU-Batangas), an institution known for its academic excellence. Key findings include the identification of critical competencies required for cybersecurity professionals, the need for curricula that incorporate emerging trends and technologies, and the importance of industry partnerships. The study underscores the urgency of equipping students with the skills needed to combat evolving cyber threats. By integrating industry best practices and real-world training, the proposed BS Cybersecurity program at LPU-Batangas aims to contribute to addressing the growing demand for skilled cybersecurity professionals and enhancing regional digital security preparedness.



References:

  1. Chabani, Z. (2024). Going Global in the Digital Age Keeping up and Staying Ahead in Today’s Tech-Driven Society. In Islamic Finance: New Trends in Law and Regulation (pp. 421-430). Cham: Springer Nature Switzerland.
  2. Kruti, A., Butt, U., & Sulaiman, R. B. (2023). A review of SolarWinds attack on Orion platform using persistent threat agents and techniques for gaining unauthorized access. arXiv preprint arXiv:2308.10294.
  3. Aljaidi, M., Alsarhan, A., Samara, G., Alazaidah, R., Almatarneh, S., Khalid, M., & Al-Gumaei, Y. A. (2022, November). Nhs wannacry ransomware attack: Technical explanation of the vulnerability, exploitation, and countermeasures. In 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI) (pp. 1-6). IEEE.
  4. Montenegro, K. R. ETHICAL PERSPECTIVES ON HACKTIVISM: THE ROLES AND ACTIONS OF HACKER ACTIVIST GROUPS (Doctoral dissertation, De La Salle University).
  5. Lee, N. (2024). Cyberattacks, Prevention, and Countermeasures. In Counterterrorism and Cybersecurity: Total Information Awareness (pp. 295-342). Cham: Springer International Publishing.
  6. Salem, M., Samara, K., & Al-Tamimi, A. K. (2024). Navigating Challenges in Online Cybersecurity Education: Insights from Postgraduate Students and Prospects for a Standardized Framework. ACM Transactions on Computing Education.
  7. AZUBUIKE, C. F., AKINWUMI, O. I., & EZEAMU, E. O. (2024). Assessing the Global Economic Impact of Ransomeware Attacks and Strategic Global Response. Nnamdi Azikiwe Journal of Political Science, 9(4), 1-17.
  8. Verizon, B. U. S. I. N. E. S. S. (2008). Data breach investigations report. http://www.verizonbusiness.com/resources/security/databreachreport.pdf.
  9. Dean, A. T. (2019). The growth of ransomware and its impact on city governments (Master's thesis, Utica College).
  10. Husnain, M., Zhang, L., & Song, H. (2022). Advanced malware detection techniques in cybersecurity. *International Journal of Information Security*, *21*(3), 195-210. https://doi.org/10.1007/s10207-022-00516-9
  11. Bertino, E., & Islam, N. (2019). Botnets and internet of things security. *Computer*, *50*(2),
  12. Cha, S. Y. (2022). The art of cyber security in the age of the digital supply chain: detecting and defending against vulnerabilities in your supply chain. In The Digital Supply Chain (pp. 215-233). Elsevier.
  13. Abiodun, O. I., Abiodun, E. O., Alawida, M., Alkhawaldeh, R. S., & Arshad, H. (2021). A review on the security of the internet of things: Challenges and solutions. Wireless Personal Communications, 119, 2603-2637.
  14. Parikh, A. (2019). Cloud security and platform thinking: an analysis of Cisco Umbrella, a cloud-delivered enterprise security (Doctoral dissertation, Massachusetts Institute of Technology).
  15. Bobish, M. (2023). Sharing Cyber Threat Information Between the United States’ Public and Private Sectors (Master's thesis, Utica University).
  16. OpenVAS. (2021). *OpenVAS: Open-source vulnerability assessment scanner*. https://www.openvas.org
  17. Kolecki, J. R. (2025). Efficacy of vulnerability detection techniques in non-traditional devices (Doctoral dissertation, Purdue University Graduate School).
  18. OConnor, T. J., & Stricklan, C. (2021, June). Teaching a hands-on mobile and wireless cybersecurity course. In Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V. 1 (pp. 296-302).
  19. Wei-Kocsis, J., Sabounchi, M., Mendis, G. J., Fernando, P., Yang, B., & Zhang, T. (2023). Cybersecurity education in the age of artificial intelligence: A novel proactive and collaborative learning paradigm. IEEE transactions on education, 67(3), 395-404.
  20. Adejuwon, F. E., & Ojeagbase, I. O. (2023, May). Role of Cybersecurity Education in Promoting Ethical and Responsible Use of Technology for Sustainable Development. In Lead City University Postgraduate Multidisciplinary Conference Proceedings (Vol. 1, No. 3, pp. 163-186).