Cybersecurity Career Requirements: A Literature Review
- URL: http://arxiv.org/abs/2306.09599v1
- Date: Fri, 16 Jun 2023 02:58:29 GMT
- Title: Cybersecurity Career Requirements: A Literature Review
- Authors: Mike Nkongolo, Nita Mennega, and Izaan van Zyl
- Abstract summary: The research found that a considerable investment in time is necessary for cybersecurity professionals to reach the required technical proficiency.
It also identified female gender barriers to cybersecurity careers due to the unique requirements of the field.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This study employs a systematic literature review approach to identify the
requirements of a career as a cybersecurity professional. It aims to raise
public awareness regarding opportunities in the Information Security (IS)
profession. A total of 1,520 articles were identified from four academic
databases by searching using the terms "cybersecurity" and "skills". After
rigorous screening according to various criteria, 31 papers remained. The
findings of these studies were thematically analyzed to describe the knowledge
and skills an IS professional should possess. The research found that a
considerable investment in time is necessary for cybersecurity professionals to
reach the required technical proficiency. It also identified female gender
barriers to cybersecurity careers due to the unique requirements of the field
and suggests that females may successfully enter at lower levels and progress
up the tiers as circumstances dictate.
Related papers
- Gender of Recruiter Makes a Difference: A study into Cybersecurity Graduate Recruitment [0.8287206589886881]
The global cybersecurity workforce is only 25% female.
This research reveals differences between the non-technical skills sought by female vs non-female cybersecurity recruiters.
arXiv Detail & Related papers (2024-08-12T02:18:27Z) - Privacy Risks of General-Purpose AI Systems: A Foundation for Investigating Practitioner Perspectives [47.17703009473386]
Powerful AI models have led to impressive leaps in performance across a wide range of tasks.
Privacy concerns have led to a wealth of literature covering various privacy risks and vulnerabilities of AI models.
We conduct a systematic review of these survey papers to provide a concise and usable overview of privacy risks in GPAIS.
arXiv Detail & Related papers (2024-07-02T07:49:48Z) - A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security [11.934344823380615]
Building a comprehensive cyber security knowledge profile is a distinct challenge.
There has been a lack of a well-defined methodology for evaluating an organisation's cyber security knowledge.
We advance a framework leveraging CyBOK, to construct an organisation's knowledge profile.
arXiv Detail & Related papers (2024-06-05T14:34:37Z) - Artificial Intelligence in Industry 4.0: A Review of Integration Challenges for Industrial Systems [45.31340537171788]
Cyber-Physical Systems (CPS) generate vast data sets that can be leveraged by Artificial Intelligence (AI) for applications including predictive maintenance and production planning.
Despite the demonstrated potential of AI, its widespread adoption in sectors like manufacturing remains limited.
arXiv Detail & Related papers (2024-05-28T20:54:41Z) - Cyber Security in Energy Informatics: A Non-technical Perspective [0.0]
This research aims to conduct a literature review focusing on non-technical issues in cyber security in the energy informatics field.
The findings show that there are seven non-technical issues have been discussed in literature, including education, awareness, policy, standards, human, and risks, challenges, and solutions.
arXiv Detail & Related papers (2024-05-03T05:39:23Z) - Requirements for a Career in Information Security: A Comprehensive
Review [0.0]
The primary objective is to increase public awareness regarding the diverse opportunities available in the Information Security (IS) field.
Thematic analysis was conducted on these studies to identify and delineate the crucial knowledge and skills that an IS professional should possess.
The study recognizes the existence of gender-related obstacles for women pursuing cybersecurity careers due to the field's unique requirements.
arXiv Detail & Related papers (2024-01-07T16:41:13Z) - Practical Cybersecurity Ethics: Mapping CyBOK to Ethical Concerns [13.075370397377078]
We use ongoing work on the Cyber Security Body of Knowledge (CyBOK) to help elicit and document the responsibilities and ethics of the profession.
Based on a literature review of the ethics of cybersecurity, we use CyBOK to frame the exploration of ethical challenges in the cybersecurity profession.
Our findings indicate that there are broad ethical challenges across the whole of cybersecurity, but also that different areas of cybersecurity can face specific ethical considerations.
arXiv Detail & Related papers (2023-11-16T19:44:03Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Trustworthy AI [75.99046162669997]
Brittleness to minor adversarial changes in the input data, ability to explain the decisions, address the bias in their training data, are some of the most prominent limitations.
We propose the tutorial on Trustworthy AI to address six critical issues in enhancing user and public trust in AI systems.
arXiv Detail & Related papers (2020-11-02T20:04:18Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.