• Corpus ID: 115013596

Development of a Cybersecurity Skills Index: A Scenarios-Based, Hands-On Measure of Non-IT Professionals' Cybersecurity Skills

@inproceedings{Carlton2016DevelopmentOA,
  title={Development of a Cybersecurity Skills Index: A Scenarios-Based, Hands-On Measure of Non-IT Professionals' Cybersecurity Skills},
  author={Melissa Carlton},
  year={2016}
}
iii Acknowledgements v List of Tables ix List of Figures xi Chapters 
An Empirical Assessment of Senior Citizens’ Cybersecurity Awareness, Computer Self-Efficacy, Perceived Risk of Identity Theft, Attitude, and Motivation to Acquire Cybersecurity Skills
ii Acknowledgements iv Dedication vi List of Tables x List of Figures xi
Constructing a Methodology for Developing a Cybersecurity Program
TLDR
The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers and to meet local industry needs for cyber professionals.
Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective
TLDR
The results indicated that the cybersecurity awareness training was effective in increasing the cybersecurity skill level of the senior citizens and empowered them with small but significant improvements in the requisite skills to take mitigating actions against cyberattacks.
Cybersecurity skills: Foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation
Cyber threats have been growing with social engineering and business e-mail compromise reported as the two most rising penetration vectors. Advanced Persistent Threats (APTs) are penetration
Towards understanding cybersecurity capability in Australian healthcare organisations: a systematic review of recent trends, threats and mitigation
ABSTRACT Cybersecurity threats in the Health sector are increasing globally due to the rising value of sensitive health information and availability of digitalised personal health records. This
Key competencies for critical infrastructure cyber-security: a systematic literature review
TLDR
A variety of skills and competencies was found to be necessary for CS assurance in CIs, and it is suggested that more effort should be taken to conciliate current CS curricula in academia with the skills and Competencies required for CS roles in the industry.
On designing a cybersecurity educational program for higher education
TLDR
A methodology for designing a cybersecurity educational program is presented, so that it becomes easier for all interested parties to design such programs, which helps extending the global scale of cybersecurity education.
Social Engineering: How U.S. Businesses Strengthen the Weakest Link against Cybersecurity Threats
The purpose of this transcendental phenomenological qualitative study was to investigate how IS professionals working in U.S. businesses make sense of their lives and experiences as they address and
A Multiplayer Peer-to-Peer Cyber Attack and Defense Infrastructure
TLDR
An infrastructure used for cyber security education includes a set of identical student network environments and each student will have access to one environment to conduct cyber security experiments and a graphic user interface (GUI) application will be designed.

References

SHOWING 1-10 OF 183 REFERENCES
Would cybersecurity professionalization help address the cybersecurity crisis?
TLDR
Evaluating the trade-offs involved in cybersecurity professionalization and the need to consider the risks and rewards of doing so in the context of a rapidly changing environment.
Hackers Wanted: An Examination of the Cybersecurity Labor Market
The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity
Cyber Capabilities and Intent of Terrorist Forces
  • C. Cox
  • Computer Science
    Inf. Secur. J. A Glob. Perspect.
  • 2015
TLDR
The results of investigation into the Websites and Web-based services of identified terrorist groups as well as several interviews with hackers in order to determine capability and intent are included.
Does deterrence work in reducing information security policy abuse by employees?
TLDR
Methods for evaluating and effectively managing the security behavior of employees and how to evaluate and effectively manage the security behaviour of employees are described.
A Role-Based Model for Federal Information Technology/Cybersecurity Training (3rd Draft)
Meeting security responsibilities and providing for the confidentiality, integrity, and availability of information in today's highly networked environment can be a difficult task. Each individual
Qualified to help: In search of the skills to ensure security
The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition
TLDR
This research presents a meta-modelling system that automates the very labor-intensive and therefore time-heavy and therefore expensive and expensive process of manually cataloging and cataloging individual pieces of data to ensure they are safe and reliable.
Information security obedience: a definition
Five dimensions of information security awareness
  • M. Siponen
  • Political Science, Computer Science
    CSOC
  • 2001
TLDR
The dimensions of information security awareness are outlined, namely its organizational, general public, socio-political, computer ethical and institutional education dimensions, along with the categories (or target groups) within each dimension.
Guidelines for usable cybersecurity: Past and present
TLDR
This paper aims to contribute to the field by consolidating a number of existing design guidelines and defining an initial core list for future reference, and provides an up-to-date review of pertinent cybersecurity usability issues and evaluation techniques applied to date.
...
1
2
3
4
5
...