Loading…
Designing a K-16 Cybersecurity Collaborative: CIPHER
Cyberattacks have become more common, sophisticated, and harmful, while, at the same time, there is a critical shortage of cybersecurity professionals. For example, from October 2019 to September 2020, there were more than 40,000 unfilled positions for information security analysts. 2 While educatio...
Saved in:
Published in: | IEEE security & privacy 2021-03, Vol.19 (2), p.56-59 |
---|---|
Main Authors: | , , |
Format: | Magazinearticle |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c245t-84f3ebec6dc938031236e83d8da76a933e1fcd102c28b1dba51259e1ec0ff99a3 |
container_end_page | 59 |
container_issue | 2 |
container_start_page | 56 |
container_title | IEEE security & privacy |
container_volume | 19 |
creator | Sanzo, Karen L. Paredes Scribner, Jay Wu, Hongyi |
description | Cyberattacks have become more common, sophisticated, and harmful, while, at the same time, there is a critical shortage of cybersecurity professionals. For example, from October 2019 to September 2020, there were more than 40,000 unfilled positions for information security analysts. 2 While educational organizations have responded to this burgeoning demand, cybersecurity education and training institutions in the United States have found it difficult to keep pace with the growing call for cybertalent. |
doi_str_mv | 10.1109/MSEC.2021.3050246 |
format | magazinearticle |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2505609102</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9382390</ieee_id><sourcerecordid>2505609102</sourcerecordid><originalsourceid>FETCH-LOGICAL-c245t-84f3ebec6dc938031236e83d8da76a933e1fcd102c28b1dba51259e1ec0ff99a3</originalsourceid><addsrcrecordid>eNo9kE1Lw0AQhhdRsFZ_gHgJeE6d2a9mvUmstlhR_Dgvm82kpNSm7qaF_nsTWjzNHJ73neFh7BphhAjm7vVzko84cBwJUMClPmEDVCpLJUh92u8S0rEx4pxdxLiEjkSVDZh8pFgv1vV6kbjkJUWd5PuCQiS_DXW7T_JmtXJFE1xb7-g-yWfv08nHJTur3CrS1XEO2ffT5CufpvO351n-ME89l6pNM1kJKsjr0huRgUAuNGWizEo31s4IQVj5EoF7nhVYFk4hV4aQPFSVMU4M2e2hdxOa3y3F1i6bbVh3Jy1XoDSYLtxReKB8aGIMVNlNqH9c2FsE28uxvRzby7FHOV3m5pCpieif777kwoD4A8TrXe8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>2505609102</pqid></control><display><type>magazinearticle</type><title>Designing a K-16 Cybersecurity Collaborative: CIPHER</title><source>IEEE Xplore (Online service)</source><creator>Sanzo, Karen L. ; Paredes Scribner, Jay ; Wu, Hongyi</creator><creatorcontrib>Sanzo, Karen L. ; Paredes Scribner, Jay ; Wu, Hongyi</creatorcontrib><description>Cyberattacks have become more common, sophisticated, and harmful, while, at the same time, there is a critical shortage of cybersecurity professionals. For example, from October 2019 to September 2020, there were more than 40,000 unfilled positions for information security analysts. 2 While educational organizations have responded to this burgeoning demand, cybersecurity education and training institutions in the United States have found it difficult to keep pace with the growing call for cybertalent.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSEC.2021.3050246</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; Ciphers ; Computer crime ; Cybersecurity ; Encryption ; Information security ; Organizations ; Privacy ; Training</subject><ispartof>IEEE security & privacy, 2021-03, Vol.19 (2), p.56-59</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c245t-84f3ebec6dc938031236e83d8da76a933e1fcd102c28b1dba51259e1ec0ff99a3</cites><orcidid>0000-0003-3056-1944</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9382390$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,27925,54796</link.rule.ids></links><search><creatorcontrib>Sanzo, Karen L.</creatorcontrib><creatorcontrib>Paredes Scribner, Jay</creatorcontrib><creatorcontrib>Wu, Hongyi</creatorcontrib><title>Designing a K-16 Cybersecurity Collaborative: CIPHER</title><title>IEEE security & privacy</title><addtitle>MSEC</addtitle><description>Cyberattacks have become more common, sophisticated, and harmful, while, at the same time, there is a critical shortage of cybersecurity professionals. For example, from October 2019 to September 2020, there were more than 40,000 unfilled positions for information security analysts. 2 While educational organizations have responded to this burgeoning demand, cybersecurity education and training institutions in the United States have found it difficult to keep pace with the growing call for cybertalent.</description><subject>Algorithms</subject><subject>Ciphers</subject><subject>Computer crime</subject><subject>Cybersecurity</subject><subject>Encryption</subject><subject>Information security</subject><subject>Organizations</subject><subject>Privacy</subject><subject>Training</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2021</creationdate><recordtype>magazinearticle</recordtype><recordid>eNo9kE1Lw0AQhhdRsFZ_gHgJeE6d2a9mvUmstlhR_Dgvm82kpNSm7qaF_nsTWjzNHJ73neFh7BphhAjm7vVzko84cBwJUMClPmEDVCpLJUh92u8S0rEx4pxdxLiEjkSVDZh8pFgv1vV6kbjkJUWd5PuCQiS_DXW7T_JmtXJFE1xb7-g-yWfv08nHJTur3CrS1XEO2ffT5CufpvO351n-ME89l6pNM1kJKsjr0huRgUAuNGWizEo31s4IQVj5EoF7nhVYFk4hV4aQPFSVMU4M2e2hdxOa3y3F1i6bbVh3Jy1XoDSYLtxReKB8aGIMVNlNqH9c2FsE28uxvRzby7FHOV3m5pCpieif777kwoD4A8TrXe8</recordid><startdate>202103</startdate><enddate>202103</enddate><creator>Sanzo, Karen L.</creator><creator>Paredes Scribner, Jay</creator><creator>Wu, Hongyi</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-3056-1944</orcidid></search><sort><creationdate>202103</creationdate><title>Designing a K-16 Cybersecurity Collaborative: CIPHER</title><author>Sanzo, Karen L. ; Paredes Scribner, Jay ; Wu, Hongyi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c245t-84f3ebec6dc938031236e83d8da76a933e1fcd102c28b1dba51259e1ec0ff99a3</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Ciphers</topic><topic>Computer crime</topic><topic>Cybersecurity</topic><topic>Encryption</topic><topic>Information security</topic><topic>Organizations</topic><topic>Privacy</topic><topic>Training</topic><toplevel>online_resources</toplevel><creatorcontrib>Sanzo, Karen L.</creatorcontrib><creatorcontrib>Paredes Scribner, Jay</creatorcontrib><creatorcontrib>Wu, Hongyi</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE security & privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sanzo, Karen L.</au><au>Paredes Scribner, Jay</au><au>Wu, Hongyi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Designing a K-16 Cybersecurity Collaborative: CIPHER</atitle><jtitle>IEEE security & privacy</jtitle><stitle>MSEC</stitle><date>2021-03</date><risdate>2021</risdate><volume>19</volume><issue>2</issue><spage>56</spage><epage>59</epage><pages>56-59</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>Cyberattacks have become more common, sophisticated, and harmful, while, at the same time, there is a critical shortage of cybersecurity professionals. For example, from October 2019 to September 2020, there were more than 40,000 unfilled positions for information security analysts. 2 While educational organizations have responded to this burgeoning demand, cybersecurity education and training institutions in the United States have found it difficult to keep pace with the growing call for cybertalent.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSEC.2021.3050246</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0003-3056-1944</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1540-7993 |
ispartof | IEEE security & privacy, 2021-03, Vol.19 (2), p.56-59 |
issn | 1540-7993 1558-4046 |
language | eng |
recordid | cdi_proquest_journals_2505609102 |
source | IEEE Xplore (Online service) |
subjects | Algorithms Ciphers Computer crime Cybersecurity Encryption Information security Organizations Privacy Training |
title | Designing a K-16 Cybersecurity Collaborative: CIPHER |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T03%3A54%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Designing%20a%20K-16%20Cybersecurity%20Collaborative:%20CIPHER&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=Sanzo,%20Karen%20L.&rft.date=2021-03&rft.volume=19&rft.issue=2&rft.spage=56&rft.epage=59&rft.pages=56-59&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSEC.2021.3050246&rft_dat=%3Cproquest_ieee_%3E2505609102%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c245t-84f3ebec6dc938031236e83d8da76a933e1fcd102c28b1dba51259e1ec0ff99a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2505609102&rft_id=info:pmid/&rft_ieee_id=9382390&rfr_iscdi=true |