CYBERSECURITY-RELATED ROLES IDENTIFICATION AND ALIGNMENT
Mykolas Romeris University (LITHUANIA)
About this paper:
Conference name: 13th International Conference on Education and New Learning Technologies
Dates: 5-6 July, 2021
Location: Online Conference
Abstract:
Technology has changed the way we communicate, exchange information, and conduct business. The terms like “Cyber Science”, “Science of Cyber” or “Science of Cybersecurity” appearing in use with growing frequency. This interest in the science of cyber is motivated by the lack of understanding of the cyber phenomena, the fundamental laws, and theories. Cyber intrusions and attacks have increased dramatically over the last decade. Modern systems are increasingly complex, yielding larger attack surfaces. Attacks on individuals and organizations can be planted anywhere on the Internet and executed to cause significant harm. Cyber-attacks necessitate unified and continuous efforts on designing defensive mechanisms to combat the range of evolving attacks.
It is important that the cybersecurity research leads to practical tools and education to train a cybersecurity specialists. A skilled cybersecurity workforce is needed to meet the unique cybersecurity needs of enterprises. According to international cybersecurity reports, people are both an essential part of the cybersecurity problem and of its solution. On the other hand, developing a different attitude towards cybersecurity is not easy, since it requires an ongoing process based on awareness and education programs. Cyber situation awareness can be viewed as a three-phase process: situation perception, situation comprehension, and situation projection.
The main purpose of this article is to identify who is responsible for cybersecurity in an organization and what are their roles? The security program rests on the shoulders of many people with cybersecurity-related roles.
The scientific problem. While organizations normally focus on the technical infrastructure, it is normally the legal, social, and ethical aspects of security that most of the time are overlooked.
The research is based on analytic, systematic, generalization, and comparative methods.Keywords:
Cybersecurity, education, cybersecurity-related roles.