Cybersecurity Skills to Address Today's Threats

被引:6
作者
Caulkins, Bruce [1 ]
Marlowe, Tiffani [1 ]
Reardon, Ashley [1 ]
机构
[1] Inst Simulat & Training, Orlando, FL 32826 USA
来源
ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, AHFE 2018 | 2019年 / 782卷
关键词
Cybersecurity; Human factors; Cognitive skills;
D O I
10.1007/978-3-319-94782-2_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recruiting, retaining, and maintaining a validated number of cyber-security professionals in the workspace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked aspect of nontechnical, managerial-related jobs in the cyber sector. For years, much of the focus within cyberspace has been on the technical needs of the underlying networks and services. Outside of mandating the attainment and maintenance of specific commercial cyber-related certifications for cyberspace security employment, very little emphasis has been placed on the human dimension of cybersecurity. Cyber-related organizations and teams lack a generalized understanding for the effect of human characteristics on the proficiency of cybersecurity professionals. A designed survey examines the cognitive attributes that are most prevalent in high-performing cybersecurity professionals. This survey draws upon the recent operational experiences of government cybersecurity professionals with special focus on the non-technical, cognitive skill sets required in the workplace.
引用
收藏
页码:187 / 192
页数:6
相关论文
共 10 条
[1]   Characterizing cybersecurity jobs: Applying the Cyber Aptitude and Talent Assessment Framework [J].
Campbell, Susan G. ;
Saner, Lelyn D. ;
Bunting, Michael F. .
SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, :25-27
[2]  
Caulkins B. D, 2016, INT C CYB CONFL CYCO
[3]  
Conti G., 2014, Small Wars J
[4]  
Gartner: 2017 State of Cybersecurity in Florida, 2018, STAT CYB FLOR REP FL
[5]  
Gutzwiller RS, 2016, 2016 IEEE INTERNATIONAL MULTI-DISCIPLINARY CONFERENCE ON COGNITIVE METHODS IN SITUATION AWARENESS AND DECISION SUPPORT (COGSIMA), P14, DOI 10.1109/COGSIMA.2016.7497780
[6]  
Hentea M, 2006, J INF TECHNOL EDUC-R, V5, P221
[7]  
Line Maria B, 2014, P ACM C COMPUTER COM, P13, DOI [10.1145/2667190.2667192, DOI 10.1145/2667190.2667192]
[8]  
Newhouse William, 2017, NIST SPECIAL PUBLICA
[9]   Leveraging behavioral science to mitigate cyber security risk [J].
Pfleeger, Shari Lawrence ;
Caputo, Deanna D. .
COMPUTERS & SECURITY, 2012, 31 (04) :597-611
[10]  
Watkins B., 2014, IMPACT CYBER ATTACKS, P12