A Holistic View of Cybersecurity Education Requirements

A Holistic View of Cybersecurity Education Requirements

Steven M. Furnell, Ismini Vasileiou
Copyright: © 2022 |Pages: 19
DOI: 10.4018/978-1-6684-3554-0.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter sets the scene for the book as a whole, establishing the need for cybersecurity awareness, training, and education in order to enable us to understand and meet our security obligations. It begins by illustrating key elements that ought to form part of cybersecurity literacy and the questions to be asked when addressing the issue. It then examines the problems that have traditionally existed in terms of achieving awareness and education, both at the user level (in terms of lack of support) and the practitioner level (in terms of a skills shortage). The discussion highlights the importance of a holistic approach, covering both personal and workplace use, and addressing the spectrum from end-users through to cybersecurity specialists.
Chapter Preview
Top

Introduction

From office applications to social media, from electronic business to global communications, the rise of information technology and the Internet has offered numerous benefits to individuals and organizations alike. With all the positives to point at, it is sometimes easy (and certainly convenient) to forget the downside – namely that the technology that we now take for granted (and often depend upon) comes with associated risks. Systems can be attacked. They can fail. Data can be lost or exposed. Users themselves can be targeted. At the same time, cybersecurity is often assumed to be someone else’s problem, with the consequence that the very parties that ought to have a stake in it end up distancing themselves from it instead. For example, end users frequently seem to assume that their employer, their Internet Service Provider, or some other party (any other party!) is taking care of their security needs. In reality of course, they have a role to play as individuals, because no matter what steps may be taken elsewhere, there will be some threats that reach them directly. So, they will find themselves needing to make security-related decisions, and they clearly need a level of awareness and understanding in order to do so. Meanwhile, organizations may look at their employees and assume that they should already have acquired a level of general cybersecurity awareness from somewhere else. While this nicely excuses the organization from taking responsibility, it is often an entirely unrealistic stance. One of the key requirements is therefore for the various parties concerned to recognize their role and take ownership of it.

In fact, there is more to know at all levels of an organization, from the individuals who simply wish to use the technology, through to those that are tasked with providing the infrastructure and safeguards that enable them to do so securely. Indeed, a fundamental challenge is that we are not dealing with a one-size-fits-all situation. SETA needs exist at several levels, from users in personal settings, to users in a workplace context, and from technical specialists through to security professionals. As an illustration of how these levels may be split, and the requirements in each case, we can consider the following groupings:

  • Personal Users: Need to understand how to protect their own data and use the associated technologies (devices and services) in a secure manner. They also need to be aware of why such protection is required.

  • Workplace Users: Similar to the needs of personal users, other than the reason now relates to the need to protect workplace systems and data, in which they may not feel as directly invested.

  • Technical Specialists: Refers to those responsible for designing, developing, implementing and running technology systems. There is a clear need for them to understand where security is required and how to deliver it.

  • Security Professionals: Need a specific security skillset, which may be characterized and supported by specialist academic study and professional certifications.

Complete Chapter List

Search this Book:
Reset