Requirements for a Career in Information Security: A Comprehensive
Review
- URL: http://arxiv.org/abs/2402.03324v1
- Date: Sun, 7 Jan 2024 16:41:13 GMT
- Title: Requirements for a Career in Information Security: A Comprehensive
Review
- Authors: Mike Nkongolo, Nita Mennega, Izaan van Zyl
- Abstract summary: The primary objective is to increase public awareness regarding the diverse opportunities available in the Information Security (IS) field.
Thematic analysis was conducted on these studies to identify and delineate the crucial knowledge and skills that an IS professional should possess.
The study recognizes the existence of gender-related obstacles for women pursuing cybersecurity careers due to the field's unique requirements.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This research paper adopts a methodology by conducting a thorough literature
review to uncover the essential prerequisites for achieving a prosperous career
in the field of Information Security (IS). The primary objective is to increase
public awareness regarding the diverse opportunities available in the
Information Security (IS) field. The initial search involved scouring four
prominent academic databases using the specific keywords "cybersecurity" and
"skills," resulting in the identification of a substantial corpus of 1,520
articles. After applying rigorous screening criteria, a refined set of 31
relevant papers was selected for further analysis. Thematic analysis was
conducted on these studies to identify and delineate the crucial knowledge and
skills that an IS professional should possess. The research findings emphasize
the significant time investment required for individuals to acquire the
necessary technical proficiency in the cybersecurity domain. Furthermore, the
study recognizes the existence of gender-related obstacles for women pursuing
cybersecurity careers due to the field's unique requirements. It suggests that
females can potentially overcome these barriers by initially entering the
profession at lower levels and subsequently advancing based on individual
circumstances.
Related papers
- Privacy Risks of General-Purpose AI Systems: A Foundation for Investigating Practitioner Perspectives [47.17703009473386]
Powerful AI models have led to impressive leaps in performance across a wide range of tasks.
Privacy concerns have led to a wealth of literature covering various privacy risks and vulnerabilities of AI models.
We conduct a systematic review of these survey papers to provide a concise and usable overview of privacy risks in GPAIS.
arXiv Detail & Related papers (2024-07-02T07:49:48Z) - A Framework for Mapping Organisational Workforce Knowledge Profile in Cyber Security [11.934344823380615]
Building a comprehensive cyber security knowledge profile is a distinct challenge.
There has been a lack of a well-defined methodology for evaluating an organisation's cyber security knowledge.
We advance a framework leveraging CyBOK, to construct an organisation's knowledge profile.
arXiv Detail & Related papers (2024-06-05T14:34:37Z) - The Last Decade in Review: Tracing the Evolution of Safety Assurance
Cases through a Comprehensive Bibliometric Analysis [7.431812376079826]
Safety assurance is of paramount importance across various domains, including automotive, aerospace, and nuclear energy.
The use of safety assurance cases allows for verifying the correctness of the created systems capabilities, preventing system failure.
arXiv Detail & Related papers (2023-11-13T17:34:23Z) - Information Forensics and Security: A quarter-century-long journey [66.16120845232525]
Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes.
For over a quarter century since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information era.
arXiv Detail & Related papers (2023-09-21T15:13:35Z) - Cybersecurity Career Requirements: A Literature Review [0.0]
The research found that a considerable investment in time is necessary for cybersecurity professionals to reach the required technical proficiency.
It also identified female gender barriers to cybersecurity careers due to the unique requirements of the field.
arXiv Detail & Related papers (2023-06-16T02:58:29Z) - Understanding metric-related pitfalls in image analysis validation [59.15220116166561]
This work provides the first comprehensive common point of access to information on pitfalls related to validation metrics in image analysis.
Focusing on biomedical image analysis but with the potential of transfer to other fields, the addressed pitfalls generalize across application domains and are categorized according to a newly created, domain-agnostic taxonomy.
arXiv Detail & Related papers (2023-02-03T14:57:40Z) - Principled Data-Driven Decision Support for Cyber-Forensic
Investigations [3.2823784475650077]
We introduce a principled approach for data-driven decision support for cyber-forensic investigations.
We propose a Monte Carlo tree search based method, which relies on a k-NN regression over prior incidents to estimate state-transition probabilities.
We evaluate our proposed approach on multiple versions of the MITRE ATT&CK dataset.
arXiv Detail & Related papers (2022-11-23T23:18:56Z) - A Review of Topological Data Analysis for Cybersecurity [1.0878040851638]
Topological Data Analysis (TDA) studies the high level structure of data using techniques from algebraic topology.
We hope to highlight to researchers a promising new area with strong potential to improve cybersecurity data science.
arXiv Detail & Related papers (2022-02-16T13:03:52Z) - Artificial Intelligence for IT Operations (AIOPS) Workshop White Paper [50.25428141435537]
Artificial Intelligence for IT Operations (AIOps) is an emerging interdisciplinary field arising in the intersection between machine learning, big data, streaming analytics, and the management of IT operations.
Main aim of the AIOPS workshop is to bring together researchers from both academia and industry to present their experiences, results, and work in progress in this field.
arXiv Detail & Related papers (2021-01-15T10:43:10Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Differentially Private and Fair Deep Learning: A Lagrangian Dual
Approach [54.32266555843765]
This paper studies a model that protects the privacy of the individuals sensitive information while also allowing it to learn non-discriminatory predictors.
The method relies on the notion of differential privacy and the use of Lagrangian duality to design neural networks that can accommodate fairness constraints.
arXiv Detail & Related papers (2020-09-26T10:50:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.