Next-Generation Architecture and Autonomous Cyber-Defense

Author(s):  
Carol Smidts ◽  
Xiaoxu Diao ◽  
Pavan Kumar Vaddi
Author(s):  
Miriam E. Armstrong ◽  
Keith S. Jones ◽  
Akbar Siami Namin

Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations.


2004 ◽  
Vol 171 (4S) ◽  
pp. 389-389
Author(s):  
Manoj Monga ◽  
Ramakrishna Venkatesh ◽  
Sara Best ◽  
Caroline D. Ames ◽  
Courtney Lee ◽  
...  

1996 ◽  
Vol 41 (1) ◽  
pp. 52-53
Author(s):  
Lisa C. McGuire
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document