Skip to main content

2020 | OriginalPaper | Buchkapitel

Skills Engineering in Sustainable Counter Defense Against Cyber Extremism

verfasst von : Vladimir Tomašević, Tatjana Ilić-Kosanović, Damir Ilić

Erschienen in: Sustainable Development and Social Responsibility—Volume 2

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This article identifies and classifies the core and additional soft skills required not only by engineers that design the security measures against cyber extremism but by other professionals in the field of cybersecurity. Furthermore, it recommends steps in how these competencies may be developed and evolved. IT-based solutions rely on the process of cognition-extrapolation-algorithm-programming from problem identification to the final product delivery. In all approaches to problem-solving, regardless of the nature of the challenge, the end product is only as good as the parameters that define the programming scope. The program capability and scope are defined by the creativity of its creators. Thus, when creating robust security measures that are designed to guard against cyberattacks by extremists, IT measures are only as useful as the creativity of the designer in the cognition-extrapolation phases of product design. Unexpectedly, this implies that the technical-based capabilities of technologically engineered solutions rely on soft human skills in order to have a practical application Additionally, as engineered products become more complex, work packages are broken down even further to more significant numbers of programmers and thus are even further devoid of individual creativity which is grounded and substantiated by soft skills.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The term hactivism is coined to define hacking with political motives. See in: Klein, J. J.: Deterring and Dissuading Cyberterrorism. Journal of Strategic Security 8, no. 4 (2015): 23–38. DOI: http://​dx.​doi.​org/​10.​5038/​1944-0472.​8.​4.​1460. Available at: http://​scholarcommons.​usf.​edu/​jss/​vol8/​iss4/​2.
 
2
The term swarming is used for simultaneous accessing a website by hundreds or thousands of people. Weimann, G.: Cyberterrorism How Real Is the Threat? Special Report 219. United States Institute of Peace. Washington DC (2004).
 
Literatur
Zurück zum Zitat Brunst, P.W.: Terrorism and the internet: new threats posed by cyberterrorism and terrorist use of the internet. In: Wade, M., Maljević (eds.) A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications. Springer Science + Business Media, LLC (2010). https://doi.org/10.1007/978-0-387-89291-7_2 Brunst, P.W.: Terrorism and the internet: new threats posed by cyberterrorism and terrorist use of the internet. In: Wade, M., Maljević (eds.) A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications. Springer Science + Business Media, LLC (2010). https://​doi.​org/​10.​1007/​978-0-387-89291-7_​2
Zurück zum Zitat Carlton, M., Levy, Y.: Cybersecurity skills: foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation. Online J. Appl. Knowl. Manag. 5(2) (2017). A Publication of the International Institute for Applied Knowledge Management Carlton, M., Levy, Y.: Cybersecurity skills: foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation. Online J. Appl. Knowl. Manag. 5(2) (2017). A Publication of the International Institute for Applied Knowledge Management
Zurück zum Zitat Chenoweth, J.H.: Situational tests – a new attempt at assessing police candidates. J. Crim. Law Criminol. Police 52(2) (1961)CrossRef Chenoweth, J.H.: Situational tests – a new attempt at assessing police candidates. J. Crim. Law Criminol. Police 52(2) (1961)CrossRef
Zurück zum Zitat College of Policing: Fast track national assessment centre for serving constables. Overview for candidates. College of Policing Limited, UK (2015) College of Policing: Fast track national assessment centre for serving constables. Overview for candidates. College of Policing Limited, UK (2015)
Zurück zum Zitat Deloitte Center for Industry Insights: The cybersecurity talent shortage. an emerging challenge for consumer products companies. Deloitte Development LLC (2018) Deloitte Center for Industry Insights: The cybersecurity talent shortage. an emerging challenge for consumer products companies. Deloitte Development LLC (2018)
Zurück zum Zitat Denning, D.E.: Activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. In: Arquilla, J., Ronfeldt, D.F. (eds.) Networks and Netwars: The Future of Terror, Crime, and Militancy, pp. 239–288 (2001) Denning, D.E.: Activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. In: Arquilla, J., Ronfeldt, D.F. (eds.) Networks and Netwars: The Future of Terror, Crime, and Militancy, pp. 239–288 (2001)
Zurück zum Zitat Dessler, G.: Human Resources Management. Global Edition, Pearson (2013) Dessler, G.: Human Resources Management. Global Edition, Pearson (2013)
Zurück zum Zitat Harvard Business Review: Hiring and Keeping the Best People. Harvard Business School Press, Boston, MA (2003) Harvard Business Review: Hiring and Keeping the Best People. Harvard Business School Press, Boston, MA (2003)
Zurück zum Zitat HM Government: Cyber security skills: A guide for business. Getting involved with skills and research initiatives. London, UK (2014) HM Government: Cyber security skills: A guide for business. Getting involved with skills and research initiatives. London, UK (2014)
Zurück zum Zitat House of Lords House of Commons. Joint Committee on the National Security Strategy: Cyber Security Skills and the UK’s Critical National Infrastructure. Second Report of Session 2017–19 (2018) House of Lords House of Commons. Joint Committee on the National Security Strategy: Cyber Security Skills and the UK’s Critical National Infrastructure. Second Report of Session 2017–19 (2018)
Zurück zum Zitat Jerman-Blažic, B., Klobucar, T.: Missing solutions in the fight against cybercrime and cyberterrorism – the new EU research agenda. In: 2016 European Intelligence and Security Informatics Conference. IEEE (2016) Jerman-Blažic, B., Klobucar, T.: Missing solutions in the fight against cybercrime and cyberterrorism – the new EU research agenda. In: 2016 European Intelligence and Security Informatics Conference. IEEE (2016)
Zurück zum Zitat Keith, S.: Fear-mongering or fact: the construction of ‘cyber-terrorism’ in U.S., U.K, and Canadian news media. A paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities sponsored by the Oxford Internet Institute, 8–10 Sept 2005. Oxford, England (2005) Keith, S.: Fear-mongering or fact: the construction of ‘cyber-terrorism’ in U.S., U.K, and Canadian news media. A paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities sponsored by the Oxford Internet Institute, 8–10 Sept 2005. Oxford, England (2005)
Zurück zum Zitat Lutz, J.M., Lutz, B.J.: Definitions, classifications, and causes. In: Terrorism. Palgrave Macmillan, New York (2005) Lutz, J.M., Lutz, B.J.: Definitions, classifications, and causes. In: Terrorism. Palgrave Macmillan, New York (2005)
Zurück zum Zitat Moteff, J.D.: Critical Infrastructures: Background, Policy, and Implementation. Congressional Research Service, Washington, DC (2015) Moteff, J.D.: Critical Infrastructures: Background, Policy, and Implementation. Congressional Research Service, Washington, DC (2015)
Zurück zum Zitat Özeren, S.: Cyberterrorism and international cooperation: general overview of the available mechanisms to facilitate an overwhelming task. In: Responses to Cyber Terrorism Centre of Excellence Defence Against Terrorism, Ankara, Turkey (ed.). IOS Press (2008) Özeren, S.: Cyberterrorism and international cooperation: general overview of the available mechanisms to facilitate an overwhelming task. In: Responses to Cyber Terrorism Centre of Excellence Defence Against Terrorism, Ankara, Turkey (ed.). IOS Press (2008)
Zurück zum Zitat Parks, R.C., Duggan, D.P.: Principle of cyber-warfare. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001) Parks, R.C., Duggan, D.P.: Principle of cyber-warfare. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)
Zurück zum Zitat Rollins, J., Wilson, C.: Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Washington, DC (2007) Rollins, J., Wilson, C.: Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Washington, DC (2007)
Zurück zum Zitat Tomić, D., Ilić-Kosanović, T., Ilić, D.: Selekcija kadrova i njihova uloga u inženjeringu protivterorističke odbrane. Zbornik radova. Beograd: Visoka škola strukovnih studija za ekonomiju i upravu, Centar za ekonomska istraživanja (CEIB), 2015, str. 137-142. (Selection of candidates and its role in engineering antiterrorist defence. College for economics and management. Centre for economic research) Tomić, D., Ilić-Kosanović, T., Ilić, D.: Selekcija kadrova i njihova uloga u inženjeringu protivterorističke odbrane. Zbornik radova. Beograd: Visoka škola strukovnih studija za ekonomiju i upravu, Centar za ekonomska istraživanja (CEIB), 2015, str. 137-142. (Selection of candidates and its role in engineering antiterrorist defence. College for economics and management. Centre for economic research)
Zurück zum Zitat United Nations Counter-Terrorism Implementation Task Force: Countering the use of the internet for terrorist purposes - legal and technical aspects. United Nations Department of Political Affairs Counter-Terrorism Implementation Task Office Working Group Compendium (2011) United Nations Counter-Terrorism Implementation Task Force: Countering the use of the internet for terrorist purposes - legal and technical aspects. United Nations Department of Political Affairs Counter-Terrorism Implementation Task Office Working Group Compendium (2011)
Zurück zum Zitat United Nations: Measures to eliminate international terrorism. A/RES/51/210 88th plenary meeting, 17 Dec 1996 (1996) United Nations: Measures to eliminate international terrorism. A/RES/51/210 88th plenary meeting, 17 Dec 1996 (1996)
Zurück zum Zitat United States Department of Justice, Federal Bureau of Investigation: Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001. United States Department of Justice, Federal Bureau of Investigation, Washington DC (2004) United States Department of Justice, Federal Bureau of Investigation: Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001. United States Department of Justice, Federal Bureau of Investigation, Washington DC (2004)
Zurück zum Zitat Workforce Intelligence Network for Southeast Michigan: Cybersecurity skills gap analysis. National and Advance Michigan Regional Data. Workforce Intelligence Network, Michigan (2017) Workforce Intelligence Network for Southeast Michigan: Cybersecurity skills gap analysis. National and Advance Michigan Regional Data. Workforce Intelligence Network, Michigan (2017)
Metadaten
Titel
Skills Engineering in Sustainable Counter Defense Against Cyber Extremism
verfasst von
Vladimir Tomašević
Tatjana Ilić-Kosanović
Damir Ilić
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-32902-0_25