Название: The Cybersecurity Workforce of Tomorrow Автор: Michael Nizich Издательство: Emerald Publishing Limited Год: July 31, 2023 Страниц: 224 Язык: английский Формат: pdf, epub (true) Размер: 10.1 MB
The field of cybersecurity - the protection of electronic data - offers one of the fastest growing job markets today. As the sector grows in importance there will be a rapidly growing demand for qualified analysts, cryptographers, engineers, architects, managers, and executive leaders.
The Cybersecurity Workforce of Tomorrow discusses the current requirements of the cybersecurity worker and analyses the ways in which these roles may change in the future as attacks from hackers, criminals and enemy states become increasingly sophisticated. The author's predictions are based on the inevitable changes that will come for the cybersecurity industry including:
More rigid federal, state, and global security requirements and accountability The increasing complexity and quality of cyber-attacks and the skillsets of the attackers The expansion and acceptance of the dark web as a marketplace for stolen data
The increasing use of cyber-attacks in political and economic confrontations between nation states.
The dark web refers to sites that are not indexed and only accessible via specialized web browsers. The dark web, however, is a very concealed portion of the deep web that few will ever interact with or even see. One way to look at it is that the deep web covers everything under the surface that's still accessible with the right software, including the dark web, and this makes the dark web very attractive to criminals in that there is no webpage indexing by surface web search engines, there are virtual traffic tunnels that are only inaccessible by traditional browsers like Chrome or Firefox, and finally, it's further hidden by various network security measures like firewalls and encryption. For the cybersecurity workforce of the future, professionals will need to be far more familiar with the workings of the dark web than they are required to be today. This not only includes a knowledge of the technical aspects of the dark web but also a willingness to work with law enforcement at city, state, and federal levels as there will be an increased push to identify and penalize cybersecurity offenders.
So what is a malicious cyberattack? A malicious cyberattack, if successful, allows unwanted access to unauthorized actors, resulting in potential loss of information integrity. There are also nonmalicious acts that threaten the confidentiality, integrity, and availability of information within a system. For instance, if access is mistakenly granted to an unauthorized employee outside a project team, any intentional or unintentional change in the data leading to serious implications is counted as a cyber breach. There are different forms of cyberattacks which might cause damage or disrupt the assets. The different threats include intellectual property theft, degradation of assets, malware, viruses, worms, and spyware. It is critical to protect information security assets, both physical and virtual, against malicious attacks. Similar to physical assets in which they can provide protection to occupants against threats, IT infrastructure assets should also provide security to users against potential threats and attacks. Cyberattacks can happen for many reasons and may be executed by many different types of attackers, each with very different goals and purposes. The type of cyberattack is not as important as the goals of the attacker. In other words, if an attacker has a goal of secretly recording keystrokes of a high-level government employee, there are several methods or attacks to achieve this, but the attack would not be considered disruptive or chaotic because nobody would know that it is happening.
Experienced practitioner and academic Michael Nizich examines the current and future human resources requirements of the cybersecurity market. His focus on workforce preparation, education and emerging technologies is essential reading for executives and cybersecurity professionals alike.