Atnaujinkite slapukų nuostatas

El. knyga: Looking Ahead at the Cybersecurity Workforce at the Federal Aviation Administration

  • Formatas: 112 pages
  • Išleidimo metai: 25-Aug-2021
  • Leidėjas: National Academies Press
  • Kalba: eng
  • ISBN-13: 9780309392280
  • Formatas: 112 pages
  • Išleidimo metai: 25-Aug-2021
  • Leidėjas: National Academies Press
  • Kalba: eng
  • ISBN-13: 9780309392280

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The Federal Aviation Administration (FAA) has overseen significant upgrades to the technology used to manage aviation operations to increase the safety and efficiency of the National Airspace System (NAS). Though necessary to regular operations, these modern computing and communications systems provide a greater attack surface for criminals, terrorists, or nation-states to exploit and thereby increase the potential for cybersecurity threats to the NAS and its constituents.



The future safety and security of air travel will rely in part on the ability of the FAA to build a workforce capable of addressing the evolving cybersecurity threat landscape. Securing the computers, networks, and data that underpin modern aviation depends in part on the FAA having enough cybersecurity professionals (capacity) with the right knowledge, skills, and abilities (capability)). It also depends on the FAA's workforce having sufficient diversity of backgrounds and experience. Such diversity is critical in analyzing cybersecurity problems and widely understood to be a "functional imperative" for effective cybersecurity programs.



At the request of Congress, the publication examines the FAA's cybersecurity workforce challenges, reviews the current strategy for meeting those challenges, and recommends ways to strengthen the FAA's cybersecurity workforce.

Table of Contents



Front Matter Summary 1 Introduction 2 Current and Future Cybersecurity Landscape for the Federal Aviation Administration 3 Managing the Career/Employee Lifecycle for a Diverse Cybersecurity Workforce 4 Additional Employee and Organizational Considerations 5 Key Challenges and Opportunities Appendixes Appendix A: Committee Meeting Agendas Appendix B: Committee Biosketches
Summary 1(4)
1 Introduction
5(6)
Study Background
5(1)
Charge to the Committee
6(1)
Committee Approach
7(2)
Report Structure and Summary
9(1)
References
9(2)
2 Current And Future Cybersecurity Landscape For The Federal Aviation Administration
11(14)
The FA A
11(3)
The FA A Mission
11(1)
Organization and Structure of the FA A
12(2)
The Cybersecurity Workforce of the FAA
14(3)
The FAA's Current Cybersecurity Workforce
14(3)
U.S. Cybersecurity Labor Market
17(1)
FAA Employment Regulations
17(6)
Statutory and Regulatory Requirements
17(1)
Institutional Policies
18(1)
Hiring
18(3)
Retention
21(1)
Contractors
22(1)
The FAA's Future Cybersecurity Workforce
22(1)
Summary
23(1)
Conclusions and Recommendations
23(1)
References
24(1)
3 Managing The Career/Employee Lifecycle For A Diverse Cybersecurity Workforce
25(30)
Chapter Overview
25(2)
Characteristics of the Cybersecurity Workforce in the 21st Century
27(2)
Characteristics of the Cybersecurity Workforce
27(1)
Cybersecurity Workforce Labor Market
28(1)
Diversity in the 21st Century Cybersecurity Workplace
28(1)
Recruitment and Hiring
29(6)
Key Aspects of Recruitment
29(1)
Key Asects of Selection
30(2)
Cyber Aptitude Assessment
32(1)
Federal Cyber Talent Development
32(1)
Federal Recruitment
33(1)
Federal Recruitment Flexibilities
34(1)
FAA Recruitment and Hiring
35(4)
Job Listings
36(1)
Scholarship Opportunities and FAA Recruitment
37(1)
Recruiting for Diversity in the FAA Cybersecurity Workforce
38(1)
Development and Advancement
39(6)
Reskilling and Training
39(1)
Educational Conferences
40(1)
Certification
41(2)
Performance Management
43(2)
Diversity and Inclusion in Organizational Culture
45(1)
FAA Talent Development and Advancement
45(3)
Reskilling and Training
45(1)
Workforce Strategies and Best Practices
46(1)
Development of Cybersecurity Awareness in Organizations
46(1)
Coordination with Human Resources
47(1)
Using the NICE Framework as a Guide to Identify Intense Personal Interest
47(1)
Summary
48(2)
Conclusions and Recommendations
49(1)
References
50(5)
4 Additional Employee And Organizational Considerations
55(20)
Introduction
55(1)
Retention
55(3)
Compensation
56(1)
Career Advancement and Development
57(1)
Appreciation
58(1)
FAA Retention
58(4)
Human Capital in the Workplace
59(1)
Focusing on Management Practices and Attitudes as Leading Indicators of Employee Intent to Depart from an Organization
60(1)
Advancing Workplace Culture to Enhance Attractiveness of the Organization to Recruit and Retain Employees
61(1)
Talent Pipeline Development
62(2)
Early Training Talent Pipeline Development
62(1)
College-Level Talent Pipeline Development
63(1)
Diversity Through College-Level Talent Pipeline Development
64(1)
Student-Level Talent Pipeline Development
64(1)
FAA Talent Pipeline Development
64(2)
Training
65(1)
Skill Development and Training Through Certification
66(1)
Workplace Flexibility
66(1)
Retirement
66(1)
Cybersecurity Organizational Stucture and Design
67(4)
The CISO as a Senior Executive
69(1)
CISO Independence
69(1)
Three Lines of Defense
69(1)
Hybrid/Federate First Line CISO Teams
70(1)
Concluding Thoughts on Organizational Structure and Design
71(1)
Summary
71(1)
Conclusions and Recommendations
71(1)
References
72(3)
5 Key Challenges And Opportunities
75(8)
Key Challenges
76(1)
Key_Opportunities
77(2)
Reference
79(4)
APPENDIXES
A Committee Meeting Agendas
83(10)
B Committee Biosketches
93