A Need-based Assessment for Building a National Cyber Security Workforce

被引:0
|
作者
Goodman, Seymour [1 ,2 ]
机构
[1] Georgia Inst Technol, Sam Nunn Sch Int Affairs, Int Affairs & Comp, Atlanta, GA 30332 USA
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the United States alone well over a million organizations have become so dependent on cyberspace that their vital interests are now vulnerable to attack, accidents, and design failures that may compromise those interests. Many experts believe the situation is getting worse; that new vulnerabilities are being pumped into cyberspace, and that the bad guys are coming up with more sophisticated and scalable attacks faster than the good guys are coming up with improved defenses. The technical R& D pipelines do not show much promise for generating solutions that will provide discernable, measureable, readily and massively scalable improvements in cyber security for enormous populations of users. Nor is there much expectation that a broadly operational engineering science of cyber security, nor a set of voluntary standards and calls for information sharing, nor a set of government laws and enforcing institutions, will achieve this end any time soon. Cyberspace is thus an environment where all dependent organizations are vulnerable and at risk. Even NSA admits to its inability to guarantee its own information security. But not all users are equally vulnerable. There are a multitude of products, procedures, standards, and policies that, if appropriately used, can make some users safer and more secure than others in cyberspace. But it takes knowledgeable people to bring these possibilities to bear, and to sustain and update their use. However, many organizations cannot or will not invest in many or any full time cyber security employees. Since millions of organizations worldwide are largely responsible for their own cyber security, this implies a huge workforce need and shortfall. Many organizations may be dependent on personnel who are not full time cyber security professionals to perform security functions or to be able and knowledgeable enough to obtain needed training, products, and services from outside their organizations. A premise of this presentation is that the primary bearer of risk when things go wrong in cyberspace is the organization that has become so dependent on computer-communications systems, not the hardware and software in the computer-communications systems. There are an enormous number and variety of such organizations in national, state, and local governments, in the business and educational sectors, and arguably has come to include most of the organizations that have a payroll, engage in on-line transactions, have their intellectual property and other vital information on computers, or are otherwise strongly reliant on their presence on the worldwide web. They have many different forms of dependencies and risk tolerances. Their customers and the users of their products and services make up extended organizations of dependencies and risk. It will be useful to distinguish need, demand, and supply in the context of the cyber security workforce. Following [ NRC 2013]: " Need is the number ( and skill mix) of cybersecurity workers that are required to provide satisfactory cybersecurity ( a judgment that will vary according to who makes the assessment). Demand is expressed by the desired capabilities stated in job descriptions, the number of such positions that are created and filled, and the salaries offered to those who have those abilities. Demand will fall short of national or societal need to the extent that cybersecurity is a public good-that is, organizations will invest to meet their own requirements but not necessarily to achieve societally desirable overall requirements. Demand can also fall short of an organization's own needs if ( 1) the organization lacks the required resources or ( 2) an organization underestimates the threats it faces. Supply is the number of available qualified workers willing to fill positions, and is a function of the visibility and attractiveness of cybersecurity occupations, the availability of appropriate training and education, and ( as in all fields) the overall labor market in which potential workers respond to salary and other signals about demand."
引用
收藏
页码:IS5 / IS6
页数:2
相关论文
共 50 条
  • [1] A Need-based Assessment for Building a National Cyber Security Workforce
    Goodman, Seymour
    2014 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS (ICE-B), 2014, : IS5 - IS6
  • [2] SOCIAL-SECURITY IS NEED-BASED - REPLY
    BENJAMIN, E
    ACADEME-BULLETIN OF THE AAUP, 1992, 78 (06): : 4 - 4
  • [3] Enhancing Security of Android & IOS by Implementing Need-Based Security (NBS)
    Dar, Muneer Ahmad
    Parvez, Javed
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 728 - 733
  • [4] A NEED-BASED MODEL TO PROJECT NATIONAL DENTAL EXPENDITURES
    GILLINGS, DB
    SOLLECITO, WA
    DOUGLASS, CW
    JOURNAL OF PUBLIC HEALTH DENTISTRY, 1983, 43 (01) : 8 - 25
  • [5] Cyber security and the remote workforce
    Curran K.
    Computer Fraud and Security, 2020, 2020 (06): : 11 - 12
  • [6] Need-based supply
    Rosenberg, H
    BWK, 2005, 57 (7-8): : 30 - 31
  • [7] Building a Sustainable National Cyber Security Strategy: A Global Challenge
    Greiman, Virginia A.
    REGIONAL AND INTERNATIONAL COMPETITIVENESS: DEFINING NATIONAL AND GOVERNMENTAL DRIVERS OF PRODUCTIVITY, EFFICIENCY, GROWTH AND PROFITABILITY, 2015, 24 : 129 - 136
  • [8] Social indicators of substance abuse prevention: A need-based assessment
    Ryan, JA
    Abdelrahman, AI
    French, JF
    Rodriguez, G
    SOCIAL INDICATORS RESEARCH, 1999, 46 (01) : 23 - 60
  • [9] Social Indicators of Substance Abuse Prevention: A Need-Based Assessment
    John A. Ryan
    A.I. Abdelrahman
    John F. French
    Gloria Rodriguez
    Social Indicators Research, 1999, 46 : 23 - 60
  • [10] NATIONAL CYBER SECURITY STRATEGIES: MANAGEMENT, UNIFICATION AND ASSESSMENT
    Stitilis, Darius
    Rotomskis, Irmantas
    Laurinaitis, Marius
    Nadvynychnyy, Sergiy
    Khorunzhak, Nadiya
    INDEPENDENT JOURNAL OF MANAGEMENT & PRODUCTION, 2020, 11 (09): : 2341 - 2354