Advertisement

Skills Engineering in Sustainable Counter Defense Against Cyber Extremism

  • Vladimir TomaševićEmail author
  • Tatjana Ilić-Kosanović
  • Damir Ilić
Conference paper
Part of the Advances in Science, Technology & Innovation book series (ASTI)

Abstract

This article identifies and classifies the core and additional soft skills required not only by engineers that design the security measures against cyber extremism but by other professionals in the field of cybersecurity. Furthermore, it recommends steps in how these competencies may be developed and evolved. IT-based solutions rely on the process of cognition-extrapolation-algorithm-programming from problem identification to the final product delivery. In all approaches to problem-solving, regardless of the nature of the challenge, the end product is only as good as the parameters that define the programming scope. The program capability and scope are defined by the creativity of its creators. Thus, when creating robust security measures that are designed to guard against cyberattacks by extremists, IT measures are only as useful as the creativity of the designer in the cognition-extrapolation phases of product design. Unexpectedly, this implies that the technical-based capabilities of technologically engineered solutions rely on soft human skills in order to have a practical application Additionally, as engineered products become more complex, work packages are broken down even further to more significant numbers of programmers and thus are even further devoid of individual creativity which is grounded and substantiated by soft skills.

Keywords

Soft skills Security measures Cyber extremism Cybersecurity 

References

  1. Awan, I.: Cyber-extremism: isis and the power of social media. Society 54(2), 138–149 (2017).  https://doi.org/10.1007/s12115-017-0114-0CrossRefGoogle Scholar
  2. Brunst, P.W.: Terrorism and the internet: new threats posed by cyberterrorism and terrorist use of the internet. In: Wade, M., Maljević (eds.) A War on Terror?: The European Stance on a New Threat, Changing Laws and Human Rights Implications. Springer Science + Business Media, LLC (2010).  https://doi.org/10.1007/978-0-387-89291-7_2Google Scholar
  3. Canadian Psychological Association. The pre-employment clinical assessment of police candidates: principles and guidelines for Canadian Psychologists (2013). http://www.cpa.ca/docs/File/News/2013-07/Police%20assess%20guidelines%20April2013final.pdf. Accessed 15 May 2015
  4. Carlton, M., Levy, Y.: Cybersecurity skills: foundational theory and the cornerstone of advanced persistent threats (APTs) mitigation. Online J. Appl. Knowl. Manag. 5(2) (2017). A Publication of the International Institute for Applied Knowledge ManagementGoogle Scholar
  5. Carter, D.L.: Law enforcement intelligence: a guide for state, local, and tribal law enforcement agencies. COPS Program (2006). http://www.cops.usdoj.gov/pdf/e09042536.pdf. Accessed 15 May 2015
  6. Chenoweth, J.H.: Situational tests – a new attempt at assessing police candidates. J. Crim. Law Criminol. Police 52(2) (1961)CrossRefGoogle Scholar
  7. College of Policing: Fast track national assessment centre for serving constables. Overview for candidates. College of Policing Limited, UK (2015)Google Scholar
  8. Oxford Dictionary. https://en.oxforddictionaries.com/definition/cyberterrorism. Accessed 20 June 2018
  9. Deloitte Center for Industry Insights: The cybersecurity talent shortage. an emerging challenge for consumer products companies. Deloitte Development LLC (2018)Google Scholar
  10. Denning, D.E.: Activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. In: Arquilla, J., Ronfeldt, D.F. (eds.) Networks and Netwars: The Future of Terror, Crime, and Militancy, pp. 239–288 (2001)Google Scholar
  11. Dessler, G.: Human Resources Management. Global Edition, Pearson (2013)Google Scholar
  12. EUROPOL: Europol internet referral unit to combat terrorist and violent extremist propaganda, 2015 (2011). https://www.europol.europa.eu/content/europol%E2%80%99s-internetreferral-unit-combat-terrorist-and-violent-extremist-propaganda. Accessed 25 June 2018
  13. Harvard Business Review: Hiring and Keeping the Best People. Harvard Business School Press, Boston, MA (2003)Google Scholar
  14. HM Government: Cyber security skills: A guide for business. Getting involved with skills and research initiatives. London, UK (2014)Google Scholar
  15. House of Lords House of Commons. Joint Committee on the National Security Strategy: Cyber Security Skills and the UK’s Critical National Infrastructure. Second Report of Session 2017–19 (2018)Google Scholar
  16. Jerman-Blažic, B., Klobucar, T.: Missing solutions in the fight against cybercrime and cyberterrorism – the new EU research agenda. In: 2016 European Intelligence and Security Informatics Conference. IEEE (2016)Google Scholar
  17. Keith, S.: Fear-mongering or fact: the construction of ‘cyber-terrorism’ in U.S., U.K, and Canadian news media. A paper presented at Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities sponsored by the Oxford Internet Institute, 8–10 Sept 2005. Oxford, England (2005)Google Scholar
  18. Lutz, J.M., Lutz, B.J.: Definitions, classifications, and causes. In: Terrorism. Palgrave Macmillan, New York (2005)Google Scholar
  19. Matusitz, J.: Social network theory: a comparative analysis of the Jewish revolt in antiquity and the cyber terrorism incident over Kosovo. Inf. Secur. J. Glob. Perspect. 20, 34–44 (2011).  https://doi.org/10.1080/19393555.2010.544702CrossRefGoogle Scholar
  20. Moteff, J.D.: Critical Infrastructures: Background, Policy, and Implementation. Congressional Research Service, Washington, DC (2015)Google Scholar
  21. Özeren, S.: Cyberterrorism and international cooperation: general overview of the available mechanisms to facilitate an overwhelming task. In: Responses to Cyber Terrorism Centre of Excellence Defence Against Terrorism, Ankara, Turkey (ed.). IOS Press (2008)Google Scholar
  22. Parks, R.C., Duggan, D.P.: Principle of cyber-warfare. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)Google Scholar
  23. Rollins, J., Wilson, C.: Terrorist Capabilities for Cyberattack: Overview and Policy Issues. Washington, DC (2007)Google Scholar
  24. Tomić, D., Ilić-Kosanović, T., Ilić, D.: Selekcija kadrova i njihova uloga u inženjeringu protivterorističke odbrane. Zbornik radova. Beograd: Visoka škola strukovnih studija za ekonomiju i upravu, Centar za ekonomska istraživanja (CEIB), 2015, str. 137-142. (Selection of candidates and its role in engineering antiterrorist defence. College for economics and management. Centre for economic research)Google Scholar
  25. United Nations Counter-Terrorism Implementation Task Force: Countering the use of the internet for terrorist purposes - legal and technical aspects. United Nations Department of Political Affairs Counter-Terrorism Implementation Task Office Working Group Compendium (2011)Google Scholar
  26. United Nations: Measures to eliminate international terrorism. A/RES/51/210 88th plenary meeting, 17 Dec 1996 (1996)Google Scholar
  27. United States Department of Justice, Federal Bureau of Investigation: Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001. United States Department of Justice, Federal Bureau of Investigation, Washington DC (2004)Google Scholar
  28. Workforce Intelligence Network for Southeast Michigan: Cybersecurity skills gap analysis. National and Advance Michigan Regional Data. Workforce Intelligence Network, Michigan (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Vladimir Tomašević
    • 1
    Email author
  • Tatjana Ilić-Kosanović
    • 1
  • Damir Ilić
    • 1
  1. 1.Belgrade School of Engineering ManagementUnion “Nikola-Tesla” UniversityBelgradeSerbia

Personalised recommendations