Prelims

Michael Nizich (New York Institute of Technology, USA)

The Cybersecurity Workforce of Tomorrow

ISBN: 978-1-80382-918-0, eISBN: 978-1-80382-915-9

Publication date: 31 July 2023

Citation

Nizich, M. (2023), "Prelims", The Cybersecurity Workforce of Tomorrow (The Future of Work), Emerald Group Publishing Limited, Leeds, pp. i-xxix. https://doi.org/10.1108/978-1-80382-915-920231011

Publisher

:

Emerald Group Publishing Limited

Copyright © 2023 Michael Nizich. Published under exclusive licence by Emerald Publishing Limited


Half Title Page

The Cybersecurity Workforce of Tomorrow

Series Title Page

The Future of Work

The future of work is a vital contemporary area of debate both in business and management research and in wider social, political, and economic discourse. Globally relevant issues, including the aging workforce, rise of the gig economy, workplace automation, and changing forms of business ownership, are all regularly the subject of discussion in both academic research and the mainstream media, having wider professional and public policy implications.

The Future of Work series features books examining key issues or challenges in the modern workplace, synthesizing prior developments in critical thinking, alongside current practical challenges in order to interrogate possible future developments in the world of work.

Offering future research agendas and suggesting practical outcomes for today's and tomorrow's businesses and workforce, the books in this series present a powerful, challenging, and polemical analysis of a diverse range of subjects in their potential to address future challenges and possible new trajectories.

The series highlights what changes still need to be made to core areas of business practice and theory in order for them to be forward-facing, more representative, and able to fulfill the industrial challenges of the future.

Other Titles in the Series

Careers: Thinking, Strategising and Prototyping

Ann M. Brewer

Algorithms, Blockchain and Cryptocurrency: Implications for the Future of the Workplace

Gavin Brown and Richard Whittle

HR Without People? Industrial Evolution in the Age of Automation, AI, and Machine Learning

Anthony R. Wheeler and Ronald M. Buckley

The Healthy Workforce: Enhancing Wellbeing and Productivity in the Workers of the Future

Stephen Bevan and Cary L. Cooper

Cooperatives at Work

George Cheney, Matt Noyes, Emi Do, Marcelo Vieta, Joseba Azkarraga and Charlie Michel

Forthcoming Titles

Spending Without Thinking: The Future of Consumption

Richard Whittle

Inspiring Workplace Spirituality

Judi Neal

Title Page

The Cybersecurity Workforce of Tomorrow

By

Michael Nizich

New York Institute of Technology, USA

United Kingdom – North America – Japan – India – Malaysia – China

Copyright Page

Emerald Publishing Limited

Howard House, Wagon Lane, Bingley BD16 1WA, UK

First edition 2023

Copyright © 2023 Michael Nizich.

Published under exclusive licence by Emerald Publishing Limited.

Reprints and permissions service

Contact:

No part of this book may be reproduced, stored in a retrieval system, transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without either the prior written permission of the publisher or a licence permitting restricted copying issued in the UK by The Copyright Licensing Agency and in the USA by The Copyright Clearance Center. Any opinions expressed in the chapters are those of the authors. Whilst Emerald makes every effort to ensure the quality and accuracy of its content, Emerald makes no representation implied or otherwise, as to the chapters' suitability and application and disclaims any warranties, express or implied, to their use.

British Library Cataloguing in Publication Data

A catalogue record for this book is available from the British Library

ISBN: 978-1-80382-918-0 (Print)

ISBN: 978-1-80382-915-9 (Online)

ISBN: 978-1-80382-917-3 (Epub)

Dedication

To my wife Cara and to my children, Thomas and Grace. An achievement like this is neither accomplished nor celebrated alone. Without your love, support, and motivation throughout the writing process, none of this would have been possible. Thank you. I love you all very much.

List of Figures

Chapter 1
Figure 1. Sample Dark Web Network Architecture.
Figure 2. ISC2 Cybersecurity Workforce Gap by Region.
Figure 3. Five Pillars of the ITU Global Cybersecurity Index.
Figure 4. NIST Risk Management Framework.
Figure 5. Cybersecurity Maturity Model.
Chapter 2
Figure 6. Sample Computer Network.
Figure 7. Machine Learning Software Options.
Figure 8. Blockchain Encryption Process.
Figure 9. Sample Zero-Trust Architecture.
Figure 10. Sample Chaos Monkey Workflow.
Chapter 3
Figure 11. NICE Cybersecurity Workforce Framework.
Chapter 5
Figure 12. U.S. Department of Labor, Employment and Training Administration's Cybersecurity Competency Model.
Figure 13. Knowledge Unit Usage Notional Structure.

List of Tables

Chapter 1
Table 1. Types of Cybersecurity Attacks.
Table 2. Types of Cyber Threat Actors.
Table 3. The Five Pillars of the ITU Global Cybersecurity Index.
Table 4. Key Risk Management Action Components.
Table 5. Cyberspace Solarium Commission Report Proposals.
Chapter 2
Table 6. Performance Attributes of 5G.
Chapter 3
Table 7. NICE Cybersecurity Roles.
Table 8. Recommendations to Aid in Retention.
Table 9. Entry and Mid-Level Cybersecurity Jobs.
Chapter 4
Table 10. Sample List of Kali Linux Tools.
Chapter 5
Table 11. Work Role Category.
Table 12. Professional Certificates in Cybersecurity.
Table 13. Cybersecurity Competitions and Challenges.

List of Abbreviations or Acronyms

A&A

Assessment and Authorization

ADP

Automated Data Processing

AES

Advanced Encryption Standard

AFC4A

Air Force C4 Agency

AFI

Air Force Instruction

AFIWC

Air Force Information Warfare Center

AFOSI

Air Force Office of Special Investigation

AFPD

Air Force Policy Directive

AIMS

Automated Infrastructure Management System

AIS

Automated Information Systems

AMIDS

Audit Monitoring and Intrusion Detection System

ANSI

American National Standards Institute

AO

Authorizing Official

AODR

Authorizing Official Designated Representative

ASD(C31)

Assistant Secretary of Defense for Command, Control, Communication and Intelligence

ASIMS

Automated Security Incident Measuring System

ASSIST

Automated System Security Incident Support Team

ATC

Authorization to Connect

ATD

Authorization Termination Date

ATM

Asynchronous Transfer Mode

ATO

Authorization to Operate

BIOS

Basic Input and Output System

BMA

Business Mission Area

C&A WG

Certification and Accreditation Working Group

C&A

Certification and Accreditation

C2

Command and Control

C2W

Command and Control Warfare

C4

Command, Control, Communications, and Computers

C4ISR

Command, Control, Communications, Computer, Intelligence, Surveillance and Reconnaissance

CA

Certification Authority

CAAP

Critical Asset Assurance Program

CAC

Common Access Card

CAL

Category Assurance List

CAP

Connection Approval Program

CC

Common Criteria

CCA

Clinger–Cohen Act

CCB

Configuration Control Board

CCI

Control Correlation Identifier

CD

Cross Domain

CDS

Cross-Domain Solution

CERT

Computer Emergency Response Team

CERT/CC

CERT/Coordination Center

CFR

Code of Federal Regulations

CI

Counterintelligence

CIAC

Computer Incident Advisory Capability

CIAO

Critical Infrastructure Assurance Office

CIO

Chief Information Officer

CIP

Critical Infrastructure Protection

CIPWG

Critical Infrastructure Protection Working Group

CIRT

Computer Incident Response Team

CISA

C4I Integration Support Activity

CITAC

Computer Investigation and Infrastructure Threat Assessment Center

CJCS

Chairman of the Joint Chiefs of Staff

CJCSI

Chairman, Joints Chiefs of Staff Instruction

CMDS

Computer Misuse Detection System

CMS

COMSEC Management System

CNA

Computer Network Attack

CNDSP

Computer Network Defense Service Provider

CNSS

Committee on National Security Systems

CNSSI

Committee on National Security Systems Instruction

CNSSP

Committee on National Security Systems Policy

COE

Common Operating Environment

COMSEC

Communications Security

CONOPS

Concept of Operations

COTS

Commercial Off-the-Shelf

CSA

Computer Security Act

CSIR

Computer (and Network) Security Incident Response

CSS

Central Security Service

CSSO

Computer Systems Security Officers

CUI

Controlled Unclassified Information

DAA

Designated Approving Authority (DAA)

DARPA

Defense Advanced Research Projects Agency

DASD

Deputy Assistant Secretary of Defense

DASD(DT&E)

Deputy Assistant Secretary of Defense for Developmental Test & Eval

DATO

Denial of Authorization To Operate

DCI

Director of Central Intelligence

DCID

Director of Central Intelligence Directive

DCMO

Deputy Chief Management Office

DCPDS

Defense Civilian Personnel Data System

DES

Digital Encryption Standard

DIA

Defense Intelligence Agency

DIACAP

DoD Information Assurance Certification and Accreditation Process

DIACCS

Defense IA Command and Control System

DIAMOND

Defense Intrusion Analysis & Monitoring Desk

DIAP

Defense Information Assurance Program

DIB

Defense Industrial Base

DIDS

Distributed Intrusions Detection System

DII

Defense Information Infrastructure

DIMA

DoD Portion of the Intelligence Mission Area

DIRNSA

Director, National Security Agency

DISA

Defense Information Systems Agency

DISN

Defense Information System Network

DITPR

DoD Information Technology Portfolio Repository

DITSCAP

DoD IT Security Certification and Accreditation Process

DITSWG

Defense Information Technology Security Working Group

DMC

Defense MegaCenter

DMS

Defense Message System

DNI

Director of National Intelligence

DNS

Domain Name Servers

DoD CIO

DoD Chief Information Officer

DoD ISRMC

DoD Information Security Risk Management Committee

DoD

Department of Defense

DoDD

Department of Defense Directive

DoDI

DoD Instruction

DoDIIS

DoD Intelligence Information System

DODIN

Department of Defense Information Networks

DoDM

DoD Manual

DoE

Department of Energy

DoN

Department of the Navy

DOT&E

Director, Operational Test and Evaluation

DREN

Defense Research and Engineering Network

DSAWG

Defense IA Security Accreditation Working Group

DSS

Defense Security Service

DT&E

Developmental Test and Evaluation

DTM

Directive-Type Memorandum

E/APL

Evaluated Approved Product

EAL

Evaluation Assurance Level

EFOIA

Electronic Freedom of Information Act

EIEMA

Enterprise Information Environment Mission Area

EITDR

Enterprise Information Technology Database Repository

eMASS

Enterprise Mission Assurance Support Service

EOP

Executive Office of the President

ETA

Education, Training and Awareness

ETAPWG

Education, Training, Awareness and Professionalization Working Group

FIPSPUB

Federal Information Processing Standard Publication

FIRST

Forum of Incident Response and Security Teams

FISMA

Federal Information Security Management Act

FIWC

Fleet information Warfare Center

FN

Foreign National

FOIA

Freedom of information Act

FSO

Field Security Office

FTS

Federal Telecommunications Service

GAO

General Accounting Office

GCCS

Global Command and Control System

GCSS

Global Combat Support System

GIG

Global Information Grid

GMITS

Guidelines for the Management of IT Security

GOSC

Global Operations and Security Center

GOTS

Government Off-the-Shelf

GSA

General Services Administration

GSII

Government Services Information Infrastructure

HBSS

Host Based Security System

I&W

Indications and Warning

IA

Information Assurance

IAD

Information Assurance Document

IAG

Information Assurance Group

IAM

Information Assurance Manager

IAO

Information Assurance Officer

IAPWG

Information Assurance Policy Working Group

IASE

Information Assurance Support Environment

IATAC

Information Assurance Technology Analysis Center

IATC

Interim Authority to Connect

IATO

Interim Authority to Operate

IATT

Interim Authority to Test

IAVA

Information Assurance Vulnerability Alert

IC

Intelligence Community

IEEE

Institute for Electrical and Electronics Engineers

INFOCONs

Information Operations Conditions

INFOSEC

Information Systems Security

INFOSYS

Information Systems

IO

Information Operations

IP

Internet Protocol

IPMO

INFOSEC Program Management Office

IPR

Internet Protocol Router

IPSec

Internet Protocol Security

IPTF

Infrastructure Protection Task Force

IRC

INFOSEC Research Council

IRM

Information Resource Management

IRS

Incident Reporting Structure

IRT

Incident Response Team

IS

Information System

ISO

International Organization for Standardization

ISRMC

Information Security Risk Management Committee

ISSM

Information System Security Manager

ISSO

Information System Security Officer

IT

Information Technology

ITMRA

Information Technology Management Reform Act

IW

Information Warfare

IW-D

Information Warfare – Defensive

JCCC

Joint Communications Control Center

JCIDS

Joint Capabilities Integration and Development System

JDIICS

Joint DII Control Systems

JID

Joint Intrusion Detection

JIE

Joint Information Environment

JIEO

Joint Interoperability Engineering Organization

JIWG

Joint IA Operations Working Group

JPO STC

Joint Program Office for Special Technical Countermeasures

JTF-CNO

Joint Task Force – Computer Network Operations

JWICS

Joint Worldwide Intelligence Communications System

JWID

Joint Warrior Interoperability Demonstration

KMI

Key Management Infrastructure

KS

Knowledge Service

LE

Law Enforcement

LE/CI

Law Enforcement and Counterintelligence

LEA

Law Enforcement Agency

MA

Mission Area

MCDES

Malicious Code Detection and Eradication System

MLS WG

Multilevel Security Working Group

MOA

Memorandum of Agreement

MOU

Memorandum of Understanding

NA

Not Applicable

NACIC

National Counterintelligence Center

NC

Non-Compliant

NCIS

Naval Criminal Investigative Service

NCSC

National Computer Security Center

NDU

National Defense University

NIAC

National Infrastructure Assurance Council

NID

Network Intrusion Detector

NII

National Information Infrastructure

NIPC

National Infrastructure Protection Center

NIPRNet

Non-Classified Internet Protocol Router Network

NISP

National Industrial Security Program

NIST

National Institute of Standards and Technology

NITB

National INFOSEC Technical baseline

NOC

Network Operating Centers

NOSC

Network Operation Security Center

NS/EP

National Security and Emergency Preparedness

NSA

National Security Agency

NSD

National Security Directive

NSIRC

National Security Incident Response Center

NSOC

National Security Operations Center

NSS

National Security System

NSTAC

National Security Telecommunications Advisory Committee

NSTISSC

National Security Telecommunications and Information Systems Security Committee

NSTISSI

National Security Telecommunications and Information Systems Security Instruction

NSU

Non-Standard Usage

OASD(C3I)

Office of the Assistant Secretary of Defense (Command, Control, Communications, and Intelligence)

OIG DoD

Office of the Inspector General of the Department of Defense

OMB

Office of Management and Budget

OPSEC

Operations Security

ORNL

Oak Ridge National Laboratory

OSD

Office of the Secretary of Defense

OSD/JS

Office of the Secretary of Defense/Joint Staff

OT&E

Operational Test and Evaluation

OUSD(P)

Office of the Under Secretary of Defense (Policy)

PAO

Principal Authorizing Official

PCCIP

President’s Commission on Critical Infrastructure Protection

PGP

Pretty Good Privacy

PIA

Privacy Impact Assessment

PII

Personally Identifiable Information

PIN

Personal Identification Number

PIT

Platform Information Technology

PKI

Public Key Infrastructure

PM

Program Manager

PM/SM

Program Manager/System Manager

POA&M

Plan of Action and Milestones

POM

Program Objective Memorandum

PPP

Program Protection Plan

PPS

Internet Protocol Suite and Associated Ports

PPSM

Ports, Protocols, and Services Management

PPTP

Point-to-Point Tunneling Protocol

RCERTs

Regional Computer Emergency Response Teams

RDT&E

Research, Development, Test and Evaluation

RMF

Risk Management Framework

ROSC

Regional Operations and Security Center

RT&E

Research, Test, and Evaluation

SABI WG

Secret and Below Interoperability Working Group

SABI

Secret and Below Interoperability

SAP

Special Access Program

SAPCO

SAP Central Office

SAR

Security Assessment Report

SATAN

Systems Administrators’ Tool for Assessing Networks

SBU

Sensitive-But-Unclassified

SCA

Security Control Assessor

SCAO

SIPRNET Connection Approval Office

SCAP

Security Content Automation Protocol

SCCVI

Secure Configuration Compliance Validation Initiative

SCG

Security Configuration Guide

SCI

Sensitive Compartmented Information

SCRI

Secure Compliance Remediation Initiative

SECDEF

Secretary of Defense

SEI

Software Engineering Institute

SET

Secure Encrypted Transaction

SIO

Special Information Operations

SIPRNet

Secret Internet Protocol Router Network

SISO

Senior Information Security Officer

SITR

Secret Internet Protocol Router Network Information Technology Registry

SLA

Service-Level Agreement

SM

System Manager

SNAP

Systems/Networks Approval Process

SP

Special Publication

SPB

Security Policy Board

SRG

Security Requirements Guide

SSAA

Systems Security Authorization Agreement

SSE

System Security Engineering

STIGs

Security Technical Implementation Guides

T&E

Test and Evaluation

TAG

Technical Advisory Group

THREATCON

Threat Condition

TPM

Trusted Platform Module

TRANSEC

Transmission Security

TRMC

Test Resource Management Center

TSN

Trusted Systems and Networks

U.S.C.

United States Code

UC

Unified Capabilities

UCAO

Unclassified Connection Approval Office

UCDMO

Unified Cross Domain Management Office

UCMJ

Uniform Code of Military Justice

UR

User Representative

URL

Uniform Resource Locator (Universal Resource Locator)

USD(AT&L)

Under Secretary of Defense for Acquisition, Technology, and Logistics

USD(I)

Under Secretary of Defense for Intelligence

USD(P&R)

Under Secretary of Defense for Personnel and Readiness

USD(P)

Under Secretary of Defense for Policy

USSTRATCOM

United States Strategic Command

VAAP

Vulnerability and Assessment Program

VAS

Vulnerability Assessment System

VPN

Virtual Private Network

WMA

Warfighting Mission Area

About the Author

Dr. Michael Nizich, PhD, CISSP, is the Director of the Entrepreneurship and Technology Innovation Center (ETIC) and an Adjunct Associate Professor of Computer Science and Cybersecurity at New York Institute of Technology. He has more than 20 years of professional industrial leadership experience in Information Technology and Cybersecurity in a variety of industries, including aviation, education, law enforcement, and biotechnology. Nizich has held IT and Security leadership positions in both private and publicly held companies, higher education institutions, and nonprofit organizations.

He has more than 15 years of college-level teaching experience at four different colleges and universities and holds a PhD in Information Science from Long Island University, a master's degree in Technology Systems Management from Stony Brook University, and a bachelor's degree in Computer Information Systems from Dowling College. Nizich also holds a Certified Information Systems Security Professional (CISSP) certificate from the International Information System Security Certification Consortium (ISC2).

He additionally directs New York Tech's Center of Academic Excellence for Cybersecurity Education, designated by the U.S. Department of Homeland Security and the National Security Agency, is the recipient and principal investigator of several Department of Defense Cybersecurity grants, awardee of two NASA contracts for cybersecurity technologies, and has been interviewed and quoted in over 20 technology-related articles in leading publications including the Communications of the ACM, CIO Review, Crain's New York, The Economist, and InfoSecurity Magazine representing over 5 million readers. Dr. Nizich is a leader in the field of Information Technology and Cybersecurity, the Chair of the NY Metro ACM Chapter, Education Committee Chair and board member of ISC2 Long Island, and serves on various industrial and institutional advisory boards in a technology role.

Preface

Cybersecurity continues to be one of the fastest growing and expanding fields and is yet again forecasted for near exponential growth in new hires, corporate and government investment, and corporate and government losses from preventable breaches. Yet, we still do not have a comprehensive and synergetic understanding of the cybersecurity ecosystem between industry and government security leaders, the cybersecurity workforce, the emerging cybersecurity workforce, educational institutions, and the human resources sector which still struggles with recruitment and retention of new cybersecurity talent.

It is for this reason that I decided to research and write this book. The purpose was to provide a single point of reference that would provide a variety of readers with an understanding of the current field of cybersecurity, the most probable future of the field based on current trends and an illustrative guide to understanding the relationships and interdependencies of the various components that make up the field. These components include the various technologies that make up cybersecurity, emerging technologies, current cybersecurity workforce, emerging cybersecurity workforce, educational institutions, and of course the organizations that require the security in the first place. Additionally, the criminal element and the driving forces of cybercrime are included in these components since they are the impetus for the entire movement.

This book incorporates several different approaches in its scaffolding that I felt worked well to bring everything together for the reader. The overall approach was to first perform and implement a literature review of over 100 articles, books, websites, and interviews from industry, government, and educational leaders in the field. Next was to include a series of expert opinions and scenario-based thought experiments in each chapter to help the reader to position themselves in one of the scenario roles and hear from experts in the field. I then include probabilistic descriptions of the future of cybersecurity based on the topics discussed in the chapter coupled with the current and forecasted trends. And finally, I included a library of resources for the reader, regardless of their roles, to quickly access during their cybersecurity journeys for whatever challenges they may encounter and at any level.

In summary, this book is not intended to make the reader a cybersecurity expert but is intended to provide the reader with a broad understanding of how the various components of the cybersecurity field work together, explain current trends that are occurring, and provide insights as to what the probabilistic future of cybersecurity and the workforce will be so the readers can get better prepared for the future, regardless of what their specific role in cybersecurity is now, or will be in the future.

Acknowledgments

I would like to acknowledge the researchers and authors whose prior research and writing made this work possible, thank you all for allowing me to stand on the shoulders of giants. A special thank you to all of the cybersecurity experts in industry, academia, and government who were so accommodating during my research and finally, a special thank you to all at Emerald Publishing who believed in this work and the value that it will provide to individuals and organizations in government, industry, and academia as they help to build the cybersecurity workforce of tomorrow.