Pub Date : 2024-09-13DOI: 10.1109/msec.2024.3428892
Zaina Dkaidek, Awais Rashid
Organizations worldwide face challenges in recruiting personnel with the necessary cybersecurity knowledge due to a global skills shortage. This article analyzes four knowledge frameworks—CyBOK, CSEC2017, NICE, and CST to guide educators, curriculum designers, professionals, and students in selecting the best framework for their needs.
{"title":"Bridging the Cybersecurity Skills Gap: Knowledge Framework Comparative Study","authors":"Zaina Dkaidek, Awais Rashid","doi":"10.1109/msec.2024.3428892","DOIUrl":"https://doi.org/10.1109/msec.2024.3428892","url":null,"abstract":"Organizations worldwide face challenges in recruiting personnel with the necessary cybersecurity knowledge due to a global skills shortage. This article analyzes four knowledge frameworks—CyBOK, CSEC2017, NICE, and CST to guide educators, curriculum designers, professionals, and students in selecting the best framework for their needs.","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"57 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-13DOI: 10.1109/msec.2024.3432208
Kenneth G. Crowther
This article explores the integration of shared responsibility and zero trust architecture models to enhance the cybersecurity of Industrial Internet of Things (IIoT) systems. It examines the foundational principles and challenges of each model, highlighting their philosophical contradictions and practical applications. By defining key elements and providing illustrative examples, the article identifies common ground and proposes a hybrid approach to secure IIoT deployments. The findings emphasize the importance of collaboration, standardization, and robust security practices to achieve a resilient and secure IIoT environment.
{"title":"Blending Shared Responsibility and Zero Trust to Secure the Industrial Internet of Things","authors":"Kenneth G. Crowther","doi":"10.1109/msec.2024.3432208","DOIUrl":"https://doi.org/10.1109/msec.2024.3432208","url":null,"abstract":"This article explores the integration of shared responsibility and zero trust architecture models to enhance the cybersecurity of Industrial Internet of Things (IIoT) systems. It examines the foundational principles and challenges of each model, highlighting their philosophical contradictions and practical applications. By defining key elements and providing illustrative examples, the article identifies common ground and proposes a hybrid approach to secure IIoT deployments. The findings emphasize the importance of collaboration, standardization, and robust security practices to achieve a resilient and secure IIoT environment.","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"101 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-13DOI: 10.1109/msec.2024.3450032
{"title":"IEEE Computer Society Career Center","authors":"","doi":"10.1109/msec.2024.3450032","DOIUrl":"https://doi.org/10.1109/msec.2024.3450032","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"31 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-27DOI: 10.1109/msec.2024.3441764
Martin R. Albrecht, Kenneth G. Paterson
{"title":"Analyzing Cryptography in the Wild: A Retrospective","authors":"Martin R. Albrecht, Kenneth G. Paterson","doi":"10.1109/msec.2024.3441764","DOIUrl":"https://doi.org/10.1109/msec.2024.3441764","url":null,"abstract":"","PeriodicalId":13152,"journal":{"name":"IEEE Security & Privacy","volume":"59 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}