Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Cybersecurity Framework

Global Cyber Security Labor Shortage and International Business Risk
Risk based approach to managing cybersecurity risk. This framework includes the framework core, implementation tiers, and profiles.
Published in Chapter:
How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?
Sandra Blanke (University of Dallas, USA), Paul Christian Nielsen (University of Dallas, USA), and Brian Wrozek (University of Dallas, USA)
DOI: 10.4018/978-1-5225-5927-6.ch007
Abstract
The need for cybersecurity professionals extends across government and private industries. Estimates place the shortage of cybersecurity professionals at 1.8 million by 2022. This chapter provides aspiring cybersecurity students a clear understanding of the various educational pathways they can choose to achieve their goals. The authors describe educational categories and include an assessment of each that students will want to consider based on their own situation. The authors discuss how the study of cybersecurity can be accomplished from a computer science, engineering, and business perspective. Students with STEM skills can accomplish their goals in numerous cybersecurity roles including cyber engineer, architect, and other technical roles. Finally, students with cyber business interest can accomplish their goals with a focus on strategy, compliance, awareness, and others. Organizations need employees with all these skills. This chapter concludes with the recommendation for continual learning, the value of networking, and the encouragement for students to start creating a cyber career.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Audits in Cybersecurity
Particular set of rules to plan, implement, validate and audit cybersecurity controls in different organizational areas.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR