2021
DOI: 10.5121/ijite.2021.10206
|View full text |Cite
|
Sign up to set email alerts
|

Connecting O*Net® Database to Cybersecurity Workforce Professional Certifications

Abstract: The Occupational Information Network O*NET is considered the primary source of occupational information in the U.S. I explore here possible uses of O*NET data to inform cybersecurity workforce readiness certification programs. The O*NET database is used to map out education requirements and how they relate to professional certifications as required by employers and job designers in accordance with the National Initiative for Cybersecurity Careers and Studies (NICCS). The search focuses on the “Information Secu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…At present, the security authentication for power monitoring system operation and maintenance scenarios is mainly realized by means of data encryption, using encryption algorithms to encrypt the transmitted power equipment operation data and transmit it to users, who will decrypt the encrypted power equipment operation data with the key obtained through their own identity authentication results, so as to realize the safe invocation of power monitoring system data. This method can protect the operation data of the power monitoring system from being decrypted by the third party to a certain extent, so as to achieve the purpose of data protection, but there are some limitations in some aspects [3] . For example, the system needs to generate different keys to encrypt the data each time the user schedules and controls the data of the power system, which causes the user to wait for a long time to get the desired power equipment operation data after issuing the scheduling control request command, so the method tends to reduce the efficiency of power system data management.…”
Section: Introductionmentioning
confidence: 99%
“…At present, the security authentication for power monitoring system operation and maintenance scenarios is mainly realized by means of data encryption, using encryption algorithms to encrypt the transmitted power equipment operation data and transmit it to users, who will decrypt the encrypted power equipment operation data with the key obtained through their own identity authentication results, so as to realize the safe invocation of power monitoring system data. This method can protect the operation data of the power monitoring system from being decrypted by the third party to a certain extent, so as to achieve the purpose of data protection, but there are some limitations in some aspects [3] . For example, the system needs to generate different keys to encrypt the data each time the user schedules and controls the data of the power system, which causes the user to wait for a long time to get the desired power equipment operation data after issuing the scheduling control request command, so the method tends to reduce the efficiency of power system data management.…”
Section: Introductionmentioning
confidence: 99%