Modelling Cyberspace to Determine Cybersecurity Training Requirements
Cyberspace is a constantly evolving and expanding environment that is being used for an ever-increasing range of purposes. As such, it attracts numerous threat actors seeking to identify and exploit its vulnerabilities. In order to be able to fully mitigate the risk of compromise, it is necessary to...
Guardado en:
Autor principal: | |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Frontiers Media S.A.
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/51bc4f75ae3c461295ae4166b47aca24 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:51bc4f75ae3c461295ae4166b47aca24 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:51bc4f75ae3c461295ae4166b47aca242021-11-16T07:38:20ZModelling Cyberspace to Determine Cybersecurity Training Requirements2504-284X10.3389/feduc.2021.768037https://doaj.org/article/51bc4f75ae3c461295ae4166b47aca242021-11-01T00:00:00Zhttps://www.frontiersin.org/articles/10.3389/feduc.2021.768037/fullhttps://doaj.org/toc/2504-284XCyberspace is a constantly evolving and expanding environment that is being used for an ever-increasing range of purposes. As such, it attracts numerous threat actors seeking to identify and exploit its vulnerabilities. In order to be able to fully mitigate the risk of compromise, it is necessary to first understand the nature and composition of cyberspace and how it is used. This chapter seeks to address this issue by presenting a method to model cyberspace in three dimensions with humans included as an integral part. Expanding beyond describing cyberspace purely in terms of technology and its uses, it explores geographic, political, and temporal aspects to reflect its dynamic nature. The first component of the model examines the varied attributes of cyberspace ranging from the landscape in which its components are located to how they are used. The second dimension investigates the path of data in all its forms from its source to destination, emphasising that cyberspace is fundamentally a communications medium and is not borderless. Thirdly, it focuses on the security dimension and the motivations of those with malicious intent, demonstrating the multidisciplinary and essentially human nature of cybersecurity in countering their activities.Adrian VenablesFrontiers Media S.A.articlecyberspacecybersecuritycyber operationsthreat modellingcybersecurity trainingcyber situational awarenessEducation (General)L7-991ENFrontiers in Education, Vol 6 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
cyberspace cybersecurity cyber operations threat modelling cybersecurity training cyber situational awareness Education (General) L7-991 |
spellingShingle |
cyberspace cybersecurity cyber operations threat modelling cybersecurity training cyber situational awareness Education (General) L7-991 Adrian Venables Modelling Cyberspace to Determine Cybersecurity Training Requirements |
description |
Cyberspace is a constantly evolving and expanding environment that is being used for an ever-increasing range of purposes. As such, it attracts numerous threat actors seeking to identify and exploit its vulnerabilities. In order to be able to fully mitigate the risk of compromise, it is necessary to first understand the nature and composition of cyberspace and how it is used. This chapter seeks to address this issue by presenting a method to model cyberspace in three dimensions with humans included as an integral part. Expanding beyond describing cyberspace purely in terms of technology and its uses, it explores geographic, political, and temporal aspects to reflect its dynamic nature. The first component of the model examines the varied attributes of cyberspace ranging from the landscape in which its components are located to how they are used. The second dimension investigates the path of data in all its forms from its source to destination, emphasising that cyberspace is fundamentally a communications medium and is not borderless. Thirdly, it focuses on the security dimension and the motivations of those with malicious intent, demonstrating the multidisciplinary and essentially human nature of cybersecurity in countering their activities. |
format |
article |
author |
Adrian Venables |
author_facet |
Adrian Venables |
author_sort |
Adrian Venables |
title |
Modelling Cyberspace to Determine Cybersecurity Training Requirements |
title_short |
Modelling Cyberspace to Determine Cybersecurity Training Requirements |
title_full |
Modelling Cyberspace to Determine Cybersecurity Training Requirements |
title_fullStr |
Modelling Cyberspace to Determine Cybersecurity Training Requirements |
title_full_unstemmed |
Modelling Cyberspace to Determine Cybersecurity Training Requirements |
title_sort |
modelling cyberspace to determine cybersecurity training requirements |
publisher |
Frontiers Media S.A. |
publishDate |
2021 |
url |
https://doaj.org/article/51bc4f75ae3c461295ae4166b47aca24 |
work_keys_str_mv |
AT adrianvenables modellingcyberspacetodeterminecybersecuritytrainingrequirements |
_version_ |
1718426602214260736 |