2018
DOI: 10.3389/fpsyg.2018.02133
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Teaming and Role Specialization in a Cyber Security Defense Competition

Abstract: A critical requirement for developing a cyber capable workforce is to understand how to challenge, assess, and rapidly develop human cyber skill-sets in realistic cyber operational environments. Fortunately, cyber team competitions make use of simulated operational environments with scoring criteria of task performance that objectively define overall team effectiveness, thus providing the means and context for observation and analysis of cyber teaming. Such competitions allow researchers to address the key det… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
13
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(18 citation statements)
references
References 42 publications
1
13
0
1
Order By: Relevance
“…The tasks in which cyber operators engage have been described as varied, often non-routine, and involve perception and comprehending large amounts of information (Erbacher et al, 2010). Cyber operator tasks include both human and technical aspects and: “…is heavily reliant upon the decision-making capabilities and skill-sets of defenders to overcome attackers” (Buchler et al, 2018). Ben-Asher and Gonzalez (2015) propose that cyber operators need updated theoretical knowledge, practical experience and training in how to: “…quickly learn and adapt to novel and dynamic environments” (p. 60).…”
Section: Cyber Operator Cognitive Demands and Performancementioning
confidence: 99%
See 2 more Smart Citations
“…The tasks in which cyber operators engage have been described as varied, often non-routine, and involve perception and comprehending large amounts of information (Erbacher et al, 2010). Cyber operator tasks include both human and technical aspects and: “…is heavily reliant upon the decision-making capabilities and skill-sets of defenders to overcome attackers” (Buchler et al, 2018). Ben-Asher and Gonzalez (2015) propose that cyber operators need updated theoretical knowledge, practical experience and training in how to: “…quickly learn and adapt to novel and dynamic environments” (p. 60).…”
Section: Cyber Operator Cognitive Demands and Performancementioning
confidence: 99%
“…While technical cyber competence is paramount to operate in the cyber domain, the soft skills and cognitive competencies have started to receive more attention. The high cognitive demands of cyber operators have been widely acknowledged (Tapscott, 2014; Røislien, 2015; D’Amico et al, 2016; Buchler et al, 2018); however, the soft skills 1 and cognitive competencies 2 contribution to cyber operator performance is yet to be empirically validated (Forsythe et al, 2013; Lathrop et al, 2016; Helkala et al, 2017; Knox B. et al, 2018).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As time goes by, the number of connected devices and their usage will be rising, and as a result of this, the convolution of cyberinfrastructure will exponentially increase. However, as these numbers increase, another major problem associated with the issue is that more vulnerable devices will emerge from this phenomenon hence the need to have a cyber security workforce which will underpin the developing cyberinfrastructure hence protecting the networks [36]. Consequently, with the inception of cyber security and how this issue is pivotal in maintaining the integrity of the cyberspace for many industries, there has been a growing need and demand for the development of various cyber security workforces and the pertinent framework which can offer some of the crucial roles of the cyber workforce.…”
Section: Fig 4 History Of Cyberattacks [33]mentioning
confidence: 99%
“…A perspective that is discussed to a smaller extent is competence. All domains consist of people with specialized skills, however, the cyber domain is extreme in this sense (Buchler, 2018). The cyber-teams in the exercise could not have solved their tasks without sufficient technical skills, no matter how well-coordinated or agile they had been.…”
Section: Q1 What Constitutes C2 Capability?mentioning
confidence: 99%