Loading…

Designing a K-16 Cybersecurity Collaborative: CIPHER

Cyberattacks have become more common, sophisticated, and harmful, while, at the same time, there is a critical shortage of cybersecurity professionals. For example, from October 2019 to September 2020, there were more than 40,000 unfilled positions for information security analysts. 2 While educatio...

Full description

Saved in:
Bibliographic Details
Published in:IEEE security & privacy 2021-03, Vol.19 (2), p.56-59
Main Authors: Sanzo, Karen L., Paredes Scribner, Jay, Wu, Hongyi
Format: Magazinearticle
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c245t-84f3ebec6dc938031236e83d8da76a933e1fcd102c28b1dba51259e1ec0ff99a3
container_end_page 59
container_issue 2
container_start_page 56
container_title IEEE security & privacy
container_volume 19
creator Sanzo, Karen L.
Paredes Scribner, Jay
Wu, Hongyi
description Cyberattacks have become more common, sophisticated, and harmful, while, at the same time, there is a critical shortage of cybersecurity professionals. For example, from October 2019 to September 2020, there were more than 40,000 unfilled positions for information security analysts. 2 While educational organizations have responded to this burgeoning demand, cybersecurity education and training institutions in the United States have found it difficult to keep pace with the growing call for cybertalent.
doi_str_mv 10.1109/MSEC.2021.3050246
format magazinearticle
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2505609102</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9382390</ieee_id><sourcerecordid>2505609102</sourcerecordid><originalsourceid>FETCH-LOGICAL-c245t-84f3ebec6dc938031236e83d8da76a933e1fcd102c28b1dba51259e1ec0ff99a3</originalsourceid><addsrcrecordid>eNo9kE1Lw0AQhhdRsFZ_gHgJeE6d2a9mvUmstlhR_Dgvm82kpNSm7qaF_nsTWjzNHJ73neFh7BphhAjm7vVzko84cBwJUMClPmEDVCpLJUh92u8S0rEx4pxdxLiEjkSVDZh8pFgv1vV6kbjkJUWd5PuCQiS_DXW7T_JmtXJFE1xb7-g-yWfv08nHJTur3CrS1XEO2ffT5CufpvO351n-ME89l6pNM1kJKsjr0huRgUAuNGWizEo31s4IQVj5EoF7nhVYFk4hV4aQPFSVMU4M2e2hdxOa3y3F1i6bbVh3Jy1XoDSYLtxReKB8aGIMVNlNqH9c2FsE28uxvRzby7FHOV3m5pCpieif777kwoD4A8TrXe8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype><pqid>2505609102</pqid></control><display><type>magazinearticle</type><title>Designing a K-16 Cybersecurity Collaborative: CIPHER</title><source>IEEE Xplore (Online service)</source><creator>Sanzo, Karen L. ; Paredes Scribner, Jay ; Wu, Hongyi</creator><creatorcontrib>Sanzo, Karen L. ; Paredes Scribner, Jay ; Wu, Hongyi</creatorcontrib><description>Cyberattacks have become more common, sophisticated, and harmful, while, at the same time, there is a critical shortage of cybersecurity professionals. For example, from October 2019 to September 2020, there were more than 40,000 unfilled positions for information security analysts. 2 While educational organizations have responded to this burgeoning demand, cybersecurity education and training institutions in the United States have found it difficult to keep pace with the growing call for cybertalent.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSEC.2021.3050246</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; Ciphers ; Computer crime ; Cybersecurity ; Encryption ; Information security ; Organizations ; Privacy ; Training</subject><ispartof>IEEE security &amp; privacy, 2021-03, Vol.19 (2), p.56-59</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c245t-84f3ebec6dc938031236e83d8da76a933e1fcd102c28b1dba51259e1ec0ff99a3</cites><orcidid>0000-0003-3056-1944</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9382390$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,27925,54796</link.rule.ids></links><search><creatorcontrib>Sanzo, Karen L.</creatorcontrib><creatorcontrib>Paredes Scribner, Jay</creatorcontrib><creatorcontrib>Wu, Hongyi</creatorcontrib><title>Designing a K-16 Cybersecurity Collaborative: CIPHER</title><title>IEEE security &amp; privacy</title><addtitle>MSEC</addtitle><description>Cyberattacks have become more common, sophisticated, and harmful, while, at the same time, there is a critical shortage of cybersecurity professionals. For example, from October 2019 to September 2020, there were more than 40,000 unfilled positions for information security analysts. 2 While educational organizations have responded to this burgeoning demand, cybersecurity education and training institutions in the United States have found it difficult to keep pace with the growing call for cybertalent.</description><subject>Algorithms</subject><subject>Ciphers</subject><subject>Computer crime</subject><subject>Cybersecurity</subject><subject>Encryption</subject><subject>Information security</subject><subject>Organizations</subject><subject>Privacy</subject><subject>Training</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2021</creationdate><recordtype>magazinearticle</recordtype><recordid>eNo9kE1Lw0AQhhdRsFZ_gHgJeE6d2a9mvUmstlhR_Dgvm82kpNSm7qaF_nsTWjzNHJ73neFh7BphhAjm7vVzko84cBwJUMClPmEDVCpLJUh92u8S0rEx4pxdxLiEjkSVDZh8pFgv1vV6kbjkJUWd5PuCQiS_DXW7T_JmtXJFE1xb7-g-yWfv08nHJTur3CrS1XEO2ffT5CufpvO351n-ME89l6pNM1kJKsjr0huRgUAuNGWizEo31s4IQVj5EoF7nhVYFk4hV4aQPFSVMU4M2e2hdxOa3y3F1i6bbVh3Jy1XoDSYLtxReKB8aGIMVNlNqH9c2FsE28uxvRzby7FHOV3m5pCpieif777kwoD4A8TrXe8</recordid><startdate>202103</startdate><enddate>202103</enddate><creator>Sanzo, Karen L.</creator><creator>Paredes Scribner, Jay</creator><creator>Wu, Hongyi</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-3056-1944</orcidid></search><sort><creationdate>202103</creationdate><title>Designing a K-16 Cybersecurity Collaborative: CIPHER</title><author>Sanzo, Karen L. ; Paredes Scribner, Jay ; Wu, Hongyi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c245t-84f3ebec6dc938031236e83d8da76a933e1fcd102c28b1dba51259e1ec0ff99a3</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Ciphers</topic><topic>Computer crime</topic><topic>Cybersecurity</topic><topic>Encryption</topic><topic>Information security</topic><topic>Organizations</topic><topic>Privacy</topic><topic>Training</topic><toplevel>online_resources</toplevel><creatorcontrib>Sanzo, Karen L.</creatorcontrib><creatorcontrib>Paredes Scribner, Jay</creatorcontrib><creatorcontrib>Wu, Hongyi</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE security &amp; privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sanzo, Karen L.</au><au>Paredes Scribner, Jay</au><au>Wu, Hongyi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Designing a K-16 Cybersecurity Collaborative: CIPHER</atitle><jtitle>IEEE security &amp; privacy</jtitle><stitle>MSEC</stitle><date>2021-03</date><risdate>2021</risdate><volume>19</volume><issue>2</issue><spage>56</spage><epage>59</epage><pages>56-59</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>Cyberattacks have become more common, sophisticated, and harmful, while, at the same time, there is a critical shortage of cybersecurity professionals. For example, from October 2019 to September 2020, there were more than 40,000 unfilled positions for information security analysts. 2 While educational organizations have responded to this burgeoning demand, cybersecurity education and training institutions in the United States have found it difficult to keep pace with the growing call for cybertalent.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MSEC.2021.3050246</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0003-3056-1944</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1540-7993
ispartof IEEE security & privacy, 2021-03, Vol.19 (2), p.56-59
issn 1540-7993
1558-4046
language eng
recordid cdi_proquest_journals_2505609102
source IEEE Xplore (Online service)
subjects Algorithms
Ciphers
Computer crime
Cybersecurity
Encryption
Information security
Organizations
Privacy
Training
title Designing a K-16 Cybersecurity Collaborative: CIPHER
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T03%3A54%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Designing%20a%20K-16%20Cybersecurity%20Collaborative:%20CIPHER&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=Sanzo,%20Karen%20L.&rft.date=2021-03&rft.volume=19&rft.issue=2&rft.spage=56&rft.epage=59&rft.pages=56-59&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSEC.2021.3050246&rft_dat=%3Cproquest_ieee_%3E2505609102%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c245t-84f3ebec6dc938031236e83d8da76a933e1fcd102c28b1dba51259e1ec0ff99a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2505609102&rft_id=info:pmid/&rft_ieee_id=9382390&rfr_iscdi=true