Source |
Cyber Skills |
Identifiant |
8517441 |
Date de publication |
2022-03-16 00:00:00 (vue: 2024-06-13 20:13:29) |
Titre |
Cybersécurité - la valeur et le besoin de formation pratique Cyber Security -The Value and Need for Practical Training |
Texte |
Whenever we are trying to master a new skill, we have all heard about the importance of practise.
The associated attention, rehearsal and repetition leads to the acquisition of new knowledge or skills that can later be developed into more complex skillsets. This sentiment has been seen throughout history, where some of the world\'s most masterful people have shared a similar philosophy that is still true today:
Bruce Lee - “Practice makes perfect. After a long time of practising, our work will become natural, skillfull, swift and steady”
Abraham Lincoln - “Give me six hours to chop down a tree and I will spend the first four sharpening the axe.”
Japanese Proverb – “Tomorrow\'s battle is won during todays practice”
Vincent Van Gough – “As practise makes perfect, I cannot but make progress, each drawing one makes, each study one paints is a step forward”
Marshawn Lynch - “When you get to practice against the best, it brings the best out of you.”
Martha Graham – “Practice means to perform, over and over again in the face of all obstacles, some act of vision, of faith, of desire. Practice is a means of inviting the perfection desired”
Unknown - “Don\'t practise until you get it right, practice until you can\'t get it wrong”
Others might disagree slightly:
Vince Lombardi – “Practise does not make perfect. Only perfect practise makes perfect”
So, the message is clear, to master a skill, we need to practise but we need to practise against the best and in the best most realistic possible environment. In terms of cybersecurity, as the cyber threat environment grows more intense, cyber defence groups require more and more skilled professionals to help with the onslaught of cyberattacks. However, they are finding it increasingly difficult to recruit and hire trained security professionals as having a degree in cybersecurity is usually not enough to give an individual the skills required for mitigating sophisticated attacks. For Cyber Security professionals, the required practise involves realistic breach scenarios or cyberattacks. These breaches or cyberattacks are any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage. The aim to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems. Day-to-day work in cybersecurity offers few opportunities for such training on the job, resulting in the required practise being an extremely difficult thing to achieve. When you think about it, cyberattacks are seemingly in the news every day, which seems to contradict my previous statement. However, the results of a cyberattack can range from causing inconvenience to dire consequences. A cyberattack on critical infrastructure and/or healthcare sectors don\'t just affect data or computer systems, they can wreak havoc in the physical world. This was seen all too well in Ireland in the not so distant past. So, cyberattacks are prevalent but the consequences mean we aim to prevent as many breaches as possible and reduce the impact, contain and eradicate any attack that exploits a system. There lies the problem, cyber security professionals require realistic breach scenarios and cyberattacks to train and become sufficiently skilled but cyber professionals are consistently working hard to prevent such attacks in the real-world. So the question is, “how do we train cyber security professionals to deal with the challenging ever-changing cyber environment?”. The answer is a Cyber Range!
A Cyber Range provides a secure, sandboxed virtual interactive training environment that can simulate real-world feel scenarios and environments, including complex IT environments and attacks on IT infrastructure, networks, software platforms and applications. As a result, a cyber range infrastructure provides the required training and practise elements of realistic breach scenarios and cyberattacks. A Cyber Range enables students to practice newly acquire |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
ability about abraham access achieve acquired acquisition across act activities add additionally advanced advantage affect after again against ahead aim all allows also alter and/or another answer any applicable application applications approach are areas array assess assignments associated attack attacks attempt attention axe based basis battle become been before being benefits best block breach breaches brings bruce build builds but can cannot capture cases cause causing challenging changing characteristics chop circumstances class clear cloud complex computer computing consequence consequences consistently contain containment content contradict control controlled could countless courses critical cyber cyberattack cyberattacks cybersecurity damage data date day deal deepen defence degree delete demonstrations deploying desire desired” destroy detect detection determine develop developed different difficult digital dire disable disagree disrupt distant does doesn don down drastic drawing during each effectively effectiveness elements enable enables enabling enough environment environments equipment eradicate eradication essence events ever every exercises existing experience experiments exploits external extremely face faith feel finding first flag flexibly forensic forward” four from full gain generation get give gough graham great groups grows handle handling hard hardening has have having havoc healthcare heard held help here hire history holistic hours how however hybrid impact importance important importantly incident includes including inconvenience increase increasingly individual industry infrastructure integration intense intent interact interactive interface investigation inviting involves ireland it/ot its japanese job jordan just keep kind know knowledge knowledge/skillset/toolbox labs later latest leads leaner learn learned learner learners learning lecture lectures lee lessons lies like lincoln lombardi long lose lost lynch make makes making manipulate many marshawn martha master masterful mean meaning means message methods michael might mistakes mitigate mitigating mobile models more most multiple natural need network networks never new newly news next normal not novel obstacles offer offers one only onslaught operational operations opportunities opportunity organization others out over own pace paints parameters past pathways people perfect perfection perfect” perform perspective philosophy physical platform platforms play possible practical practice practice” practise practising pre prevalent prevent previous problem procedures/strategies process production professionals progress proverb provide provides put qualification question range ranges react real realistic really recognize recruit reduce rehearsal reinforce repeat repetition replicate representative require required research researcher response result resulting results right safe safety sandboxed scenario scenarios sectors secure security seemingly seems seen sentiment setup several cyber shared sharpening similar simulate simulated simulation situations six skill skilled skillfull skills skillset skillsets slightly: software some sophisticated specific spend standard statement steady” steal step strategies students study such sufficiently swift system systems takes techniques technologies terms test tests them themselves these thing think threat threats throughout time today: todays too toolbox toolbox” tools traditional train trained training tree true truly trying two typical unauthorized under understand unit unknown until upskilling use used using usually valuable value van vast vince vincent virtual vision well what when whenever where which will within without won words work working works world wreak wrong” yet you your mistakes see “as “cybersecurity “don “give “how “practice “practise “tomorrow “when |
Tags |
Tool
Threat
Studies
Mobile
Industrial
Medical
Cloud
|
Stories |
|
Move |
|