kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Automation of Cybersecurity Work
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS. Swedish Armed Forces Headquarters, Stockholm, Sweden.ORCID iD: 0000-0002-1888-9237
FOI Swedish Defence Research Agency, Stockholm, Sweden.
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS. FOI Swedish Defence Research Agency, Stockholm, Sweden.ORCID iD: 0000-0002-2677-9759
Number of Authors: 32022 (English)In: Artificial Intelligence and Cybersecurity: Theory and Applications, Springer Nature , 2022, p. 67-101Chapter in book (Other academic)
Abstract [en]

This chapter examines the conditions for automation of cybersecurity work roles, and the probabilities of them being automated. Further, variables that limit the automation potential for current cybersecurity roles are reviewed. Based on a well-established and widely adopted reference resource that lists typical skill requirements and duties of cybersecurity workers, an assessment of the susceptibility for automation of cybersecurity work was performed by an expert panel. All cybersecurity work descriptions were ranked in terms of proneness for automation according to four criteria: requirements for creativity, social interaction, physical work, and the existence of relevant statistical training data. It was found that technical roles, for example database administrators and data analysts, are easiest to automate. Roles associated with management and accountability, for example, legal advisors and cyber operations planners, are more difficult to automate. Finally, requirements for physical work is a negligible factor when it comes to cybersecurity work automation.

Place, publisher, year, edition, pages
Springer Nature , 2022. p. 67-101
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-333031DOI: 10.1007/978-3-031-15030-2_4Scopus ID: 2-s2.0-85160502522OAI: oai:DiVA.org:kth-333031DiVA, id: diva2:1784240
Note

Part of ISBN 9783031150302 9783031150296

QC 20230725

Available from: 2023-07-25 Created: 2023-07-25 Last updated: 2023-07-25Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Varga, StefanBrynielsson, Joel

Search in DiVA

By author/editor
Varga, StefanBrynielsson, Joel
By organisation
Theoretical Computer Science, TCS
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 29 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf