Modelling Cyberspace to Determine Cybersecurity Training Requirements

Cyberspace is a constantly evolving and expanding environment that is being used for an ever-increasing range of purposes. As such, it attracts numerous threat actors seeking to identify and exploit its vulnerabilities. In order to be able to fully mitigate the risk of compromise, it is necessary to...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autor principal: Adrian Venables
Formato: article
Lenguaje:EN
Publicado: Frontiers Media S.A. 2021
Materias:
Acceso en línea:https://doaj.org/article/51bc4f75ae3c461295ae4166b47aca24
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:51bc4f75ae3c461295ae4166b47aca24
record_format dspace
spelling oai:doaj.org-article:51bc4f75ae3c461295ae4166b47aca242021-11-16T07:38:20ZModelling Cyberspace to Determine Cybersecurity Training Requirements2504-284X10.3389/feduc.2021.768037https://doaj.org/article/51bc4f75ae3c461295ae4166b47aca242021-11-01T00:00:00Zhttps://www.frontiersin.org/articles/10.3389/feduc.2021.768037/fullhttps://doaj.org/toc/2504-284XCyberspace is a constantly evolving and expanding environment that is being used for an ever-increasing range of purposes. As such, it attracts numerous threat actors seeking to identify and exploit its vulnerabilities. In order to be able to fully mitigate the risk of compromise, it is necessary to first understand the nature and composition of cyberspace and how it is used. This chapter seeks to address this issue by presenting a method to model cyberspace in three dimensions with humans included as an integral part. Expanding beyond describing cyberspace purely in terms of technology and its uses, it explores geographic, political, and temporal aspects to reflect its dynamic nature. The first component of the model examines the varied attributes of cyberspace ranging from the landscape in which its components are located to how they are used. The second dimension investigates the path of data in all its forms from its source to destination, emphasising that cyberspace is fundamentally a communications medium and is not borderless. Thirdly, it focuses on the security dimension and the motivations of those with malicious intent, demonstrating the multidisciplinary and essentially human nature of cybersecurity in countering their activities.Adrian VenablesFrontiers Media S.A.articlecyberspacecybersecuritycyber operationsthreat modellingcybersecurity trainingcyber situational awarenessEducation (General)L7-991ENFrontiers in Education, Vol 6 (2021)
institution DOAJ
collection DOAJ
language EN
topic cyberspace
cybersecurity
cyber operations
threat modelling
cybersecurity training
cyber situational awareness
Education (General)
L7-991
spellingShingle cyberspace
cybersecurity
cyber operations
threat modelling
cybersecurity training
cyber situational awareness
Education (General)
L7-991
Adrian Venables
Modelling Cyberspace to Determine Cybersecurity Training Requirements
description Cyberspace is a constantly evolving and expanding environment that is being used for an ever-increasing range of purposes. As such, it attracts numerous threat actors seeking to identify and exploit its vulnerabilities. In order to be able to fully mitigate the risk of compromise, it is necessary to first understand the nature and composition of cyberspace and how it is used. This chapter seeks to address this issue by presenting a method to model cyberspace in three dimensions with humans included as an integral part. Expanding beyond describing cyberspace purely in terms of technology and its uses, it explores geographic, political, and temporal aspects to reflect its dynamic nature. The first component of the model examines the varied attributes of cyberspace ranging from the landscape in which its components are located to how they are used. The second dimension investigates the path of data in all its forms from its source to destination, emphasising that cyberspace is fundamentally a communications medium and is not borderless. Thirdly, it focuses on the security dimension and the motivations of those with malicious intent, demonstrating the multidisciplinary and essentially human nature of cybersecurity in countering their activities.
format article
author Adrian Venables
author_facet Adrian Venables
author_sort Adrian Venables
title Modelling Cyberspace to Determine Cybersecurity Training Requirements
title_short Modelling Cyberspace to Determine Cybersecurity Training Requirements
title_full Modelling Cyberspace to Determine Cybersecurity Training Requirements
title_fullStr Modelling Cyberspace to Determine Cybersecurity Training Requirements
title_full_unstemmed Modelling Cyberspace to Determine Cybersecurity Training Requirements
title_sort modelling cyberspace to determine cybersecurity training requirements
publisher Frontiers Media S.A.
publishDate 2021
url https://doaj.org/article/51bc4f75ae3c461295ae4166b47aca24
work_keys_str_mv AT adrianvenables modellingcyberspacetodeterminecybersecuritytrainingrequirements
_version_ 1718426602214260736