Cyberesecurity 11
Cyberesecurity 11
SECURITY BENEFITS
SOCIETY
Module Code:
Class/Group:
Module Title: Assessment Type: Tutor:
Student ID Number:
Date of Submission:
INTRODUCTION
1. Main skills?
3. Types and
2. Main benefits?
effectiveness?
FINDINGS:
RESEARCH QUESTION 1: WHAT MAIN SKILLS DO I NEED
FOR CYBER SECURITY?
• The paper by Potter and Vickers (2015) provides a real-world criterion for cybersecurity skills.
• Employers in Australia value technical skills such as network security, cryptography, and
programming, experience with OSs, databases, and networks.
• Furnell's et al. (2017) article emphasizes the industry's increasing demand for cybersecurity
professionals, assessment of risk, vulnerability management, incident handling, and security
awareness are crucial skills. As well as expertise in governance, compliance, and regulation is
also important.
• Network security fundamentals, including firewalls, intrusion detection systems, and encryption
techniques, are essential as well as proficiency in cryptography is necessary for securing
communication channels and protecting confidential information.
FINDINGS:
RESEARCH QUESTION 2: WHAT ARE THE TYPES OF CYBER
SECURITY AND HOW EFFECTIVE ARE THEY?
• Cyber-attacks on critical infrastructure can have severe consequences. For example, the
2015 cyber-attack on Russian and Ukrainian power systems caused widespread
blackouts, affecting hundreds of thousands of consumers.
• Data breaches pose significant risks to individuals and organizations and as cloud
computing and the Internet of Things (IoT) become more prevalent, addressing security
challenges in these areas is paramount.
FINDINGS:
RESEARCH QUESTION 3: WHAT ARE THE MAIN BENEFITS
OF STUDYING CYBER SECURITY?
• In 2017, Maersk, a multinational shipping business, fell victim to the NotPetya ransomware
attack. Li and Tsiponen (2022) emphasize the social significance of security and privacy in
their work.
• They argue that studying cyber dangers and countermeasures equips students with the
necessary tools to navigate the complexities of the digital world.
• The National Institute of Standards and Technology's Special Publication 800-181 presents
the Cybersecurity Workforce Framework, outlining the knowledge, skills, and abilities
required for various cybersecurity professions (Petersen et al., 2020).
REFLECTION
• Cybersecurity training equips individuals with the information and abilties needed to count on and reply to
evolving cyber threats.
• As technology keeps to advance, understanding the risks and countermeasures will become increasingly
critical.
• Cybersecurity education empowers individuals to conform to digital risks effectively.
• Cybersecurity studies permit people to make contributions to the protection and security of virtual
structures.
• Protecting critical infrastructure, facts, and privacy helps create a safer on line environment for
individuals, agencies, and society as an entire.
• By obtaining cybersecurity knowledge, people play an energetic function in building a steady digital
world.
REFERENCES
• Ahmad, W., Rasool, A., Javed, A. R., Baker, T., & Jalil, Z. (2021). Cyber Security in IoT-Based Cloud
Computing: A Comprehensive Survey. Electronics, 11(1), 16. https://doi.org/10.3390/electronics11010016
• Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues
in the wake of Covid-19: A survey. Journal of King Saud University - Computer and Information
Sciences, 34(10). https://doi.org/10.1016/j.jksuci.2022.08.003
• Furnell, S., Fischer, P., & Finch, A. (2017). Can’t get the staff? The growing need for cyber-security
skills. Computer Fraud & Security, 2017(2), 5–10. https://doi.org/10.1016/s1361-3723(17)30013-1
• G
reenberg, A. (2018, August 22). The Untold Story of NotPetya, the Most Devastating Cyberattack in
History. WIRED. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
• Hallman, R., Bryan, J., Palavicini, G., Divita, J., & Romero-Mariona, J. (2017). IoDDoS — The Internet of
Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based
Botnets. Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security.
https://doi.org/10.5220/0006246600470058
REFERENCES
• Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). Artificial Intelligence for Cybersecurity: Literature
Review and Future Research Directions. Information Fusion, 101804.
• Krause, T., Ernst, R., Klaer, B., Hacker, I., & Henze, M. (2021). Cybersecurity in Power Grids:
Challenges and Opportunities. Sensors, 21(18), 6225. https://doi.org/10.3390/s21186225
• Li, Y., Xin, T., & Siponen, M. (2022). Citizens' cybersecurity behavior: Some major challenges. IEEE
Security & Privacy, 20(1).
• Petersen, R., Santos, D., Smith, M. C., Wetzel, K. A., & Witte, G. (2020). Workforce Framework for
Cybersecurity (NICE Framework). https://doi.org/10.6028/nist.sp.800-181r1
• Potter, L. E., & Vickers, G. (2015). What Skills do you Need to Work in Cyber Security? Proceedings
of the 2015 ACM SIGMIS Conference on Computers and People Research.
https://www.academia.edu/28495331/What_Skills_do_you_Need_to_Work_in_Cyber_Security_A_Loo
k_at_the_Australian_Market
THANK YOU