The Meanless Term of “Cybersecurity”

Is “Cybersecurity” actually another name for Computer Science in the 21st Century?

Prof Bill Buchanan OBE FRSE
9 min readOct 15, 2023

--

The usage of the word “Cybersecurity” to describe a job or a role is rather imprecise — and in many cases, its usage is similar to defining a car as a moving object. And I know we all use it, but it’s because we have to, or our work will not get recognised.

The spectrum of expertise/skills and knowledge areas is just a bit too wide to cope with. For me, “cybersecurity” has always meant a depth of technical skills in key areas (networking, services, operating systems, protocols and encryption), but I know there are other areas that are just as important.

Many dislike how it was transformed from Information Security into Cybersecurity — and where it now has little meaning and where those with little knowledge of core principles of data security can call themselves by the name. This would seldom happen in engineering, and where, for example, the role of an Electrical Engineer is held in high esteem for knowledge and expertise and where a CEng level is typically associated with this type of role, too. Luckily, we have had CiiSec pushing for standards in the area and supporting Chartered status for those working in the area. In the UK, too, we are lucky to have the NCSC and GCHQ pushing for the matching of academic standards to a defined skills framework.

So, basically, the term Cybersecurity was “invented” as a catch-all term and something that the media could catch onto, but now is one of the least precise job roles around. A malware engineer, for example, shares little in expertise and knowledge against a security risk analyst — but still, we plough on defining it as a single role — without ever really knowing the skill set or expertise involved. There’s no grading of 1 to 5 for expertise or way of differentiating those with trivial skills from true experts and leaders in their field. The UK government did help this when they hinted that a Ballet Dancer could retrain into Cybersecurity — and for all those training programmes that promise to get someone into the area in just a few simple lessons.

So, go, on, how many work roles are there in Cybersecurity? 10? Nope! 20? Nope! In the NIST NICE (National Initiative for Cybersecurity Education) framework, there are 52 different job roles. For Cyber Security, NIST defines seven categories; 33 specialty areas; and 52 work roles [here], and then maps these to 1,007 tasks, 374 skills, 630 knowledge areas and 176 abilities:

  • Securely Provision (SP). Risk Management (RSK); Software Development (DEV); Systems Architecture (ARC); Technology R&D (TRD); Systems Requirements Planning (SRP); Test and Evaluation (TST)
  • Operate and Maintain (OM). Data Administration (DTA). Knowledge Management (KMG). Customer Service and Technical Support (STS); Network Services (NET); Systems Administration (ADM); Systems Analysis (ANA)
  • Oversee and Govern (OV). Legal Advice and Advocacy (LGA); Training, Education, and Awareness (TEA); Cybersecurity Management (MGT); Strategic Planning and Policy (SPP); Executive Cyber Leadership (EXL); Program/Project Management (PMA) and Acquisition;
  • Protect and Defend (PR). Cybersecurity Defense Analysis (CDA); Cybersecurity Defense Infrastructure Support (INF); Incident Response (CIR); Vulnerability Assessment and Management (VAM)
  • Analyze (AN). Threat Analysis (TWA); Exploitation Analysis (EXP); All-Source Analysis (ASA); Targets (TGT); Language Analysis (LNG).
  • Collect and Operate (CO). Collection Operations (CLO); Cyber Operational Planning (OPL); Cyber Operations (OPS).
  • Investigate (IN). Cyber Investigation (INV); Digital Forensics (FOR).

So, here are the work roles, and their classification.

Securely Provision (SP)

These are [1]:

  • Authorizing Official/Designating Representative. Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009).
  • Security Control Assessor. Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800–37).
  • Software Developer. Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.
  • Secure Software Assessor. Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
  • Enterprise Architect. Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
  • Security Architect. Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.
  • Research & Development Specialist. Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
  • Systems Requirements Planner. Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.
  • System Testing and Evaluation Specialist. Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.
  • Information Systems Security Developer. Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.
  • Systems Developer. Designs, develops, tests, and evaluates information systems throughout the systems development life cycle.

Operator and Maintain (OM)

These are [1]:

  • Database Administrator. Administers databases and/or data management systems that allow for the secure storage, query, protection, and utilization of data.
  • Data Analyst. Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
  • Knowledge Manager. Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
  • Technical Support Specialist. Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components (i.e., Master Incident Management Plan, when applicable).
  • Network Operations Specialist. Plans, implements, and operates network services/systems, to include hardware and virtual environments.
  • System Administrator. Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).
  • Systems Security Analyst. Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.

Oversee and Govern (OG)

These are [1]:

  • Cyber Legal Advisor. Provides legal advice and recommendations on relevant topics related to cyber law.
  • Privacy Officer/Privacy Compliance Manager. Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance, governance/policy, and incident response needs of privacy and security executives and their teams.
  • Cyber Instructional Curriculum Developer. Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
  • Cyber Instructor. Develops and conducts training or education of personnel within cyber domain.
  • Information Systems Security Manager. Responsible for the cybersecurity of a program, organization, system, or enclave.
  • Communications Security (COMSEC) Manager. Individual who manages the Communications Security (COMSEC) resources of an organization (CNSSI 4009) or key custodian for a Crypto Key Management System (CKMS).
  • Cyber Workforce Developer and Manager. Develops cyberspace workforce plans, strategies, and guidance to support cyberspace workforce manpower, personnel, training and education requirements and to address changes to cyberspace policy, doctrine, materiel, force structure, and education and training requirements.
  • Cyber Policy and Strategy Planner. Develops and maintains cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.
  • Executive Cyber Leadership. Executes decision-making authorities and establishes vision and direction for an organization’s cyber and cyber-related resources and/or operations.
  • Program Manager. Leads, coordinates, communicates, integrates, and is accountable for the overall success of the program, ensuring alignment with agency or enterprise priorities.
  • IT Project Manager. Directly manages information technology projects.
  • Product Support Manager. Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components.
  • IT Investment/Portfolio Manager. Manages a portfolio of IT investments that align with the overall needs of mission and enterprise priorities.
  • IT Program Auditor. Conducts evaluations of an IT program or its individual components to determine compliance with published standards.

Protect and Defence (PD)

These are [1]:

  • Cyber Defense Analyst. Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
  • Cyber Defense Infrastructure Support Specialist. Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
  • Cyber Defense Incident Responder. Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
  • Vulnerability Assessment Analyst. Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Analyse (AN)

These are [1]:

  • Threat/Warning Analyst. Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments.
  • Exploitation Analyst. Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
  • All-Source Analyst. Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.
  • Mission Assessment Specialist. Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.
  • Target Developer. Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.
  • Target Network Analyst. Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them.
  • Multi-Disciplined Language Analyst. Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects.

Collect and Operate (CO)

These are [1]:

  • All Source-Collection Manager. Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership’s intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan.
  • All Source-Collection Requirements Manager. Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations.
  • Cyber Intel Planner. Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.
  • Cyber Ops Planner. Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.
  • Partner Integration Planner. Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.
  • Cyber Operator. Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations.

Investigation (IN)

These are [1]:

  • Cyber Crime Investigator. Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques.
  • Law Enforcement /CounterIntelligence Forensics Analyst. Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.
  • Cyber Defense Forensics Analyst. Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.

Now, take a test on your knowledge here:

https://asecuritysite.com/tests/fun?sortBy=nice

References

[1] Newhouse, W., Keith, S., Scribner, B., & Witte, G. (2017). National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST special publication, 800(2017), 181.

--

--

Prof Bill Buchanan OBE FRSE

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.