GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity
Abstract
:1. Introduction
- The NICE Framework was employed to assess the primary tasks of four distinct non-managerial cybersecurity roles and to empirically evaluate their potential exposure to ChatGPT’s capabilities, before applying the technological displacement theory to interpret the results and to investigate the long-term impact of ChatGPT on cybersecurity. The potential utilization of ChatGPT to pass cybersecurity certificate examinations was also studied.
- The challenges and limitations obtained from this study were identified, and a shift from emphasizing memorization to fostering critical thinking skills for the industry, education, and certification institutions that might be exposed by ChatGPT was suggested.
2. Related Works
3. Research Motivation
3.1. Media Coverage of ChatGPT
3.2. Public Opinions of Generative AI in Cybersecurity
3.3. Automation in Cybersecurity
4. Research Methods
4.1. The NICE Framework
- Identify work roles and assess current workforce: Review the NICE Framework to identify relevant work roles for an organization and map existing job titles and responsibilities to the framework.
- Evaluate job requirements and develop job descriptions: Analyze the TKS and abilities associated with each work role to understand job requirements and create comprehensive job descriptions accordingly.
- Align training, recruitment, and hiring: Align training programs, recruitment, and hiring strategies that target candidates with the required skills and knowledge.
- Monitor and adapt to changes: Regularly review the organization’s use of the NICE Framework and update job roles, job descriptions, and training programs as needed to keep up with the evolving cybersecurity landscape.
4.2. Selection of Cybersecurity Industry Jobs
- GRC consultants help organizations manage risks and comply with regulations by developing and implementing security policies and procedures. They provide guidance on cybersecurity controls and work to ensure that an organization’s operations are aligned with its security objectives.
- SOC Analysts monitor an organization’s systems and networks for security incidents, analyze security logs, and respond to incidents as they occur. They use a variety of tools and techniques to detect and respond to security threats in real time.
- Network and Cloud Security Engineers design and implement security solutions for an organization’s systems and networks. They work to ensure that an organization’s data and systems are secure by implementing security controls and monitoring for potential security threats.
- Penetration Testers simulate cyber attacks to identify vulnerabilities in an organization’s systems and networks. They use various tools and techniques to identify potential vulnerabilities and provide recommendations for remediation.
4.3. Selection of Cybersecurity Certifications
- Comments
- Expert E1: ChatGPT’s responses were accurate and relevant, with minor gaps in utility for complex scenarios.
- Expert E2: The responses were generally accurate and relevant, but some lacked depth in incident response details.
- Expert E3: ChatGPT provided accurate information, but occasionally missed context-specific nuances.
- Expert E4: The responses were accurate, but sometimes lacked practical applicability and detailed technical insights.
- Expert E5: ChatGPT excelled in providing relevant and useful information for certification exam questions.
4.4. Defining Exposure to ChatGPT
- No exposure (E0) if using the LLM reduces the quality of work, or does not save time while maintaining quality of work.
- Direct exposure (E1) if the described LLM reduces the DWA/task time by at least 50%.
- LLM+ Exposed (E2) if the LLM itself alone does not reduce task time by 50%, but additional software built on LLM can achieve this goal while maintaining quality of work, e.g., using WebChatGPT, a ChatGPT plugin with Internet access to access latest information beyond 2021. To date, OpenAI has approved three categories of extensions for ChatGPT: Web browsing, Python code interpreter, and semantic search.
4.5. Knowledge Optimization
4.6. Defining Exposure to ChatGPT
- No exposure (E0) if using the LLM reduces the quality of work, or does not save time while maintaining quality of work.
- Direct exposure (E1) if the described LLM reduces the DWA/task time by at least 50%.
- LLM+ Exposed (E2) if the LLM itself alone does not reduce task time by 50%, but additional software built on LLM can achieve this goal while maintaining quality of work, e.g., using WebChatGPT, a ChatGPT plugin with Internet access to access latest information beyond 2021. To date, OpenAI has approved three categories of extensions for ChatGPT: Web browsing, Python code interpreter, and semantic search.
4.7. The Technology Displacement Theory
- Job Loss: The degree to which the introduction of ChatGPT could result in job losses within the cybersecurity field, with a focus on roles that may be more susceptible to this change, will be explored.
- Skill Obsolescence: The speed at which the skills of impacted professionals may become outdated, as well as the potential need for reskilling or upskilling will be investigated.
- Labor Market Shifts: The possible effects on the cybersecurity labor market, including changed demands for various cybersecurity skill sets, the emergence of new job roles, and shifts in employment sectors will be estimated.
- Socioeconomic Impact: The wider socioeconomic ramifications of technological displacement in cybersecurity, such as its influence on productivity, wages, and income inequality will be explored.
5. Alignment of Cybersecurity Jobs and Certifications with GPT Capabilities
5.1. Industry Jobs
5.1.1. Grc Consultants
5.1.2. Soc Analysts
5.1.3. Network and Cloud Security Engineers
5.1.4. Penetration Testers
5.2. Certifications
- CISSP: The free CISSP practice quiz (https://cloud.connect.isc2.org/cissp-quiz, accessed on 7 July 2024) is publicly available on the (ISC)2 website and is made up of 10 questions.
- CISA: The free CISA practice quiz (https://www.isaca.org/credentialing/cisa/cisa-practice-quiz, accessed on 7 July 2024) consisted of 10 questions, and ISACA explicitly claimed that they were at the same difficulty level of the actual exams.
- CEH: The free CEH practice quiz (https://iclass.eccouncil.org/our-courses/certified-ethical-hacker-ceh/ceh-readiness-quiz/, accessed on 7 July 2024) included five questions.
- CISM: The free CISM practice quiz (https://www.isaca.org/credentialing/cism/cism-practice-quiz, accessed on 7 July 2024) consisted of 10 questions, and ISACA also explicitly claimed that they were at the same difficulty level as the actual tests.
6. Discussion
6.1. Major Themes Identified
6.1.1. Chatgpt Excels in Tasks Related to NLP, but Not in Critical Thinking
6.1.2. Jobs and Certifications Relying Heavily on Static Knowledge More Exposed to ChatGPT
6.2. Implications for the Industry
6.3. Implications for the Education Sector Teaching Cybersecurity
6.4. Long-Term Impact of ChatGPT on Cybersecurity Using the Technological Displacement Theory
6.4.1. Job Losses
6.4.2. Skill Obsolescence
6.4.3. Labor Market Shifts
6.4.4. Mixed Socioeconomic Impacts
6.5. Stakeholder Perspectives
6.6. Theoretical Knowledge vs. Practical Application
6.7. Limitations of This Study
7. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
CISA | Certified Information Systems Auditor |
CISM | Certified Information Security Manager |
CISSP | Certified Information Systems Security Professional |
CEH | Certified Ethical Hacker |
DWA | Detailed Work Activities |
DOI | Digital Object Identifier |
GRC | Governance, Risk, and Compliance |
ISC | International Information System Security Certification Consortium |
LLM | Large Language Model |
MCQ | Multiple Choice Questions |
MDPI | Multidisciplinary Digital Publishing Institute |
NICE | National Initiative for Cybersecurity Education |
NIST | National Institute of Standards and Technology |
NLP | Natural Language Processing |
OSCP | Offensive Security Certified Professional |
OSINT | Open Source Intelligence |
Portable Document Format | |
SIEM | Security Information and Event Management |
SOC | Security Operations Center |
XDR | Extended Detection and Response |
References
- Eloundou, T.; Manning, S.; Mishkin, P.; Rock, D. GPTs are GPTs: An Early Look at the Labor Market Impact Potential of Large Language Models. arXiv 2023, arXiv:2303.10130. [Google Scholar]
- Sinha, R.K.; Roy, A.D.; Kumar, N.; Mondal, H. Applicability of ChatGPT in assisting to solve higher order problems in pathology. Cureus 2023, 15, e35237. [Google Scholar] [CrossRef] [PubMed]
- Zamfirescu-Pereira, J.; Wong, R.; Hartmann, B.; Yang, Q. Why Johnny can’t prompt: How non-AI experts try (and fail) to design LLM prompts. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI’23), Hamburg, Germany, 23–28 April 2023. [Google Scholar]
- MacNeil, S.; Tran, A.; Hellas, A.; Kim, J.; Sarsa, S.; Denny, P.; Bernstein, S.; Leinonen, J. Experiences from using code explanations generated by large language models in a web software development e-book. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1, Toronto, ON, Canada, 15–18 March 2023; pp. 931–937. [Google Scholar]
- Wu, X.; Duan, R.; Ni, J. Unveiling security, privacy, and ethical concerns of ChatGPT. J. Inf. Intell. 2024, 2, 102–115. [Google Scholar] [CrossRef]
- Shafik, W. Data Privacy and Security Safeguarding Customer Information in ChatGPT Systems. In Revolutionizing the Service Industry with OpenAI Models; IGI Global: Hershey, PA, USA, 2024; pp. 52–86. [Google Scholar]
- Sai, S.; Yashvardhan, U.; Chamola, V.; Sikdar, B. Generative ai for cyber security: Analyzing the potential of chatgpt, dall-e and other models for enhancing the security space. IEEE Access 2024, 12, 53497–53516. [Google Scholar] [CrossRef]
- Charfeddine, M.; Kammoun, H.M.; Hamdaoui, B.; Guizani, M. ChatGPT’s Security Risks and Benefits: Offensive and Defensive Use-Cases, Mitigation Measures, and Future Implications. IEEE Access 2024, 12, 2169–3536. [Google Scholar] [CrossRef]
- Alawida, M.; Abu Shawar, B.; Abiodun, O.I.; Mehmood, A.; Omolara, A.E.; Al Hwaitat, A.K. Unveiling the dark side of chatgpt: Exploring cyberattacks and enhancing user awareness. Information 2024, 15, 27. [Google Scholar] [CrossRef]
- Martin, C.; DeStefano, K.; Haran, H.; Zink, S.; Dai, J.; Ahmed, D.; Razzak, A.; Lin, K.; Kogler, A.; Waller, J.; et al. The ethical considerations including inclusion and biases, data protection, and proper implementation among AI in radiology and potential implications. Intell.-Based Med. 2022, 6, 100073. [Google Scholar] [CrossRef]
- Fowler, J.; Evans, N. Using the NICE framework as a metric to analyze student competencies. J. Colloq. Inf. Syst. Secur. Educ. 2020, 7, 18. [Google Scholar]
- Jones, K.S.; Namin, A.S.; Armstrong, M.E. The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: Results from interviews with cybersecurity professionals. ACM Trans. Comput. Educ. (TOCE) 2018, 18, 1–12. [Google Scholar] [CrossRef]
- Ngambeki, I.B.; Rogers, M.; Bates, S.J.; Piper, M.C. Curricular Improvement through Course Mapping: An Application of the NICE Framework. In Proceedings of the 2021 ASEE Virtual Annual Conference Content Access, Online, 26–29 July 2021. [Google Scholar]
- Newhouse, W.; Keith, S.; Scribner, B.; Witte, G. National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Spec. Publ. 2017, 800, 181. [Google Scholar]
- Patnayakuni, N.; Patnayakuni, R. A Professions Based Approach to Cybersecurity Education and the NICE Framework. In Investigating Framework Adoption, Adaptation, or Extension; Digital Press ID NCC-2020-CSJ-02; National CyberWatch Center: Largo, MD, USA, 2020; pp. 82–87. Available online: https://csj.nationalcyberwatch.org (accessed on 7 July 2024).
- Saharinen, K.; Viinikanoja, J.; Huotari, J. Researching Graduated Cyber Security Students–Reflecting Employment and Job Responsibilities through NICE framework. In Proceedings of the European Conference on Cyber Warfare and Security, Chester, UK, 16–17 June 2022; Volume 21, pp. 247–255. [Google Scholar]
- Truong, T.C.; Diep, Q.B.; Zelinka, I. Artificial intelligence in the cyber domain: Offense and defense. Symmetry 2020, 12, 410. [Google Scholar] [CrossRef]
- Gupta, M.; Akiri, C.; Aryal, K.; Parker, E.; Praharaj, L. From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy. IEEE Access 2023, 11, 2169–3536. [Google Scholar] [CrossRef]
- Tann, W.; Liu, Y.; Sim, J.H.; Seah, C.M.; Chang, E.C. Using large language models for cybersecurity capture-the-flag challenges and certification questions. arXiv 2023, arXiv:2308.10443. [Google Scholar]
- Smith, G. The intelligent solution: Automation, the skills shortage and cyber-security. Comput. Fraud Secur. 2018, 2018, 6–9. [Google Scholar] [CrossRef]
- Atiku, S.B.; Aaron, A.U.; Job, G.K.; Shittu, F.; Yakubu, I.Z. Survey on the applications of artificial intelligence in cyber security. Int. J. Sci. Technol. Res. 2020, 9, 165–170. [Google Scholar]
- Bécue, A.; Praça, I.; Gama, J. Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artif. Intell. Rev. 2021, 54, 3849–3886. [Google Scholar] [CrossRef]
- Petersen, R.; Santos, D.; Wetzel, K.; Smith, M.; Witte, G. Workforce Framework for Cybersecurity (NICE Framework); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020.
- Dash, B.; Ansari, M.F. An Effective Cybersecurity Awareness Training Model: First Defense of an Organizational Security Strategy. Int. Res. J. Eng. Technol. (IRJET) 2022, 9, 2395-0056. [Google Scholar]
- Jacob, J.; Wei, W.; Sha, K.; Davari, S.; Yang, T.A. Is the nice cybersecurity workforce framework (ncwf) effective for a workforce comprising of interdisciplinary majors? In Proceedings of the 16th International Conference on Scientific Computing (CSC’18), Las Vegas, NV, USA, 30 July–2 August 2018. [Google Scholar]
- Paulsen, C.; McDuffie, E.; Newhouse, W.; Toth, P. NICE: Creating a cybersecurity workforce and aware public. IEEE Secur. Priv. 2012, 10, 76–79. [Google Scholar] [CrossRef]
- Coulson, T.; Mason, M.; Nestler, V. Cyber capability planning and the need for an expanded cybersecurity workforce. Commun. IIMA 2018, 16, 2. [Google Scholar] [CrossRef]
- Hott, J.A.; Stailey, S.D.; Haderlie, D.M.; Ley, R.F. Extending the National Initiative for Cybersecurity Education (NICE) Framework Across Organizational Security. In Investigating Framework Adoption, Adaptation, or Extension; DigitalPress ID NCC-2020-CSJ-02; National CyberWatch Center: Largo, MD, USA, 2020; pp. 7–17. Available online: https://csj.nationalcyberwatch.org (accessed on 7 July 2024).
- Estes, A.C.; Kim, D.J.; Yang, T.A. Exploring how the NICE Cybersecurity Workforce Framework aligns cybersecurity jobs with potential candidates. In Proceedings of the 14th International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS’18), Las Vegas, NV, USA, 18–19 May 2018. [Google Scholar]
- Teoh, C.S.; Mahmood, A.K. Cybersecurity workforce development for digital economy. Educ. Rev. USA 2018, 2, 136–146. [Google Scholar] [CrossRef]
- Baker, M. State of Cyber Workforce Development; Technical Report; Carnegie Mellon University: Pittsburgh, PA, USA, 2013. [Google Scholar]
- Dawson, M.; Taveras, P.; Taylor, D. Applying software assurance and cybersecurity nice job tasks through secure software engineering labs. Procedia Comput. Sci. 2019, 164, 301–312. [Google Scholar] [CrossRef]
- Liu, F.; Tu, M. An Analysis Framework of Portable and Measurable Higher Education for Future Cybersecurity Workforce Development. J. Educ. Learn. (EduLearn) 2020, 14, 322–330. [Google Scholar] [CrossRef]
- Dwivedi, Y.K.; Kshetri, N.; Hughes, L.; Slade, E.L.; Jeyaraj, A.; Kar, A.K.; Baabdullah, A.M.; Koohang, A.; Raghavan, V.; Ahuja, M.; et al. “So what if ChatGPT wrote it?” Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI for research, practice and policy. Int. J. Inf. Manag. 2023, 71, 102642. [Google Scholar] [CrossRef]
- Bozkurt, A.; Xiao, J.; Lambert, S.; Pazurek, A.; Crompton, H.; Koseoglu, S.; Farrow, R.; Bond, M.; Nerantzi, C.; Honeychurch, S.; et al. Speculative Futures on ChatGPT and Generative Artificial Intelligence (AI): A Collective Reflection from the Educational Landscape. Asian J. Distance Educ. 2023, 18, 53–130. [Google Scholar]
- Jakesch, M.; Hancock, J.T.; Naaman, M. Human heuristics for AI-generated language are flawed. Proc. Natl. Acad. Sci. USA 2023, 120, e2208839120. [Google Scholar] [CrossRef] [PubMed]
- Ali, A.; Septyanto, A.W.; Chaudhary, I.; Al Hamadi, H.; Alzoubi, H.M.; Khan, Z.F. Applied Artificial Intelligence as Event Horizon of Cyber Security. In Proceedings of the 2022 International Conference on Business Analytics for Technology and Security (ICBATS), Dubai, United Arab Emirates, 16–17 February 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–7. [Google Scholar]
- Rajasekharaiah, K.; Dule, C.S.; Sudarshan, E. Cyber security challenges and its emerging trends on latest technologies. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Singapore, 15–18 May 2020; IOP Publishing: Bristol, UK, 2020; Volume 981, p. 022062. [Google Scholar]
- Alsmadi, I.; Easttom, C. The NICE Cyber Security Framework; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
- Collins, R. Technological displacement and capitalist crises: Escapes and dead ends. Political Conceptol. 2010, 1, 23–34. [Google Scholar]
- Hyötyläinen, M. Labour-saving technology and advanced marginality–A study of unemployed workers’ experiences of displacement in Finland. Crit. Soc. Policy 2022, 42, 285–305. [Google Scholar] [CrossRef]
- McGuinness, S.; Pouliakas, K.; Redmond, P. Skills-displacing technological change and its impact on jobs: Challenging technological alarmism? Econ. Innov. New Technol. 2023, 32, 370–392. [Google Scholar] [CrossRef]
- Sorells, B. Will robotization really cause technological unemployment? The rate and extent of potential job displacement caused by workplace automation. Psychosociol. Issues Hum. Resour. Manag. 2018, 6, 68–73. [Google Scholar]
- Fourie, L.; Pang, S.; Kingston, T.; Hettema, H.; Watters, P.; Sarrafzadeh, H. The Global Cyber Security Workforce: An Ongoing Human Capital Crisis. 2014. Available online: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=1a1228813f6696470fd0f123a393efb9ddaadbfb (accessed on 7 July 2024).
Vendor | Abbr. | Full Name | Min Work Experience | Popularity | |
---|---|---|---|---|---|
Seek | |||||
(ISC)2 | CISSP | Certified Information Systems Security Professional | 5 years | 9282 | 1133 |
ISACA | CISA | Certified Information Systems Auditor | 5 years | 1359 | 696 |
EC-Council | CEH | Certified Ethical Hacker | 2 years | 445 | 320 |
ISACA | CISM | Certified Information Security Manager | 5 years | 308 | 511 |
Offensive Security | OSCP | Offensive Security Certified Professional | N/A | 370 | 486 |
Expert ID | Area of Expertise | Criteria Assessed | Evaluation Score (Out of 5) |
---|---|---|---|
E1 | Governance, Risk, and Compliance | Accuracy, Relevance, Utility | 4.5 |
E2 | Security Operations | Accuracy, Relevance, Utility | 4.0 |
E3 | Network and Cloud Security | Accuracy, Relevance, Utility | 4.2 |
E4 | Penetration Testing | Accuracy, Relevance, Utility | 3.8 |
E5 | Cybersecurity Certifications | Accuracy, Relevance, Utility | 4.7 |
Exposure | Job task | Certifications | |
---|---|---|---|
Skill | Knowledge | ||
No exposure (0) | LLM does not reduce the time to perform the skill. | LLM does not help with knowledge presentation. | LLM cannot be used to pass the exam. |
LLM+ exposure (0.5) | LLM combined with additional software can partially (⪈50%) perform the skill. | LLM combined with additional software can partially (⪈50%) present the knowledge. | LLM combined with additional software can be used to pass the exam. |
Direct exposure (1) | LLM alone can partially (⪈50%) perform the skill. | LLM alone can partially (⪈50%) or fully present knowledge. | LLM alone can pass the exam. |
Symbol | Description |
---|---|
T | Tasks |
K | Number of knowledge points |
S | Skills |
Human specific knowledge | |
LLM assisted knowledge | |
Number of human-specific knowledge available, where | |
Number of LLM-assisted knowledge available, where | |
M | Number of skills available, where |
Weight factor | |
Assessments, where |
Task List | Body of Knowledge | Skillsets | |||
---|---|---|---|---|---|
Task | Exposure | Knowledge | Exposure | Skill | Exposure |
Establish and maintain effective GRC frameworks | 0.67 | Cybersecurity fudnamentals | Direct (1) | Risk management | LLM+ exposed (0.5) |
Compliance and regulations | Direct (1) | Problem solving and time management | No exposure (0) | ||
Legal knowledge and ethics | Direct (1) | Governance and policy development | Direct (1) | ||
Auditing and assessment | Direct (1) | ||||
Knowledge of the client, their environment and preferences | Direct (1) | Communication, presentation and media literacy | Direct (1) | ||
Project management | LLM+ exposed (0.5) |
Task List | Body of Knowledge | Skillsets | |||
---|---|---|---|---|---|
Task | Exposure | Knowledge | Exposure | Skill | Exposure |
Monitor and analyze security events and incidents | 0.39 | Advanced cybersecurity | Direct (1) | Using SIEM tools | LLM+ exposed (0.5) |
Incident detection and response | LLM+ exposed (0.5) | ||||
Threat intelligence | LLM+ exposed (0.5) | Basic forensic analysis | LLM+ exposed (0.5) | ||
Scripting and automation | Direct (1) | ||||
Knowledge of the client and their baseline norms | LLM+ exposed (0.5) | Communication skills | Direct (1) | ||
Problem solving and time management | No exposure (0) |
Task List | Body of Knowledge | Skillsets | |||
---|---|---|---|---|---|
Task | Exposure | Knowledge | Exposure | Skill | Exposure |
Design, implement and maintain secure network and cloud infrastructures | 0.8 | Advanced cybersecurity | Direct (1) | Incident detection | Direct (1) |
Network and cloud technologies and best practice | Direct (1) | Network or cloud diagnoses | Direct (1) | ||
Identity and asset management | Direct (1) | Scripting and automation | Direct (1) | ||
Data protection | Direct (1) | Communication skills | Direct (1) | ||
Legal and regulatory compliance | Direct (1) | Problem solving and time management | No exposure (0) |
Task List | Body of Knowledge | Skillsets | |||
---|---|---|---|---|---|
Task | Exposure | Knowledge | Exposure | Skill | Exposure |
Pentesting and reporting | 0.27 | Advanced cybersecurity | Direct (1) | Using forensic tools and software | No exposure (0) |
Problem solving and time management | No exposure (0) | ||||
Legal knowledge and ethics | Direct (1) | Timeline analysis and artifact correlation | LLM+ exposed (0.5) | ||
Knowledge of the client via reconnaissance and OSINT | No exposure (0) | Analytical skills | LLM+ exposed (0.5) | ||
Communication skills and storytelling, presentation and media literacy | Direct (1) |
Vendor | Abbr. | Exam Format | Exam Marking | ChatGPT Attempts with Practice Questions | |||||
---|---|---|---|---|---|---|---|---|---|
Lowest | Highest | Passing | Scaled | Exposure | Score | Result | |||
(ISC)2 | CISSP | MCQ | 0 | 1000 | 700 | ✓ | Direct | 9/10 | pass |
ISACA | CISA | MCQ | 200 | 800 | 450 | ✓ | Direct | 10/10 | pass |
ISACA | CISM | MCQ | 200 | 800 | 450 | ✓ | Direct | 7/10 | pass |
EC-Council | CEH | MCQ | 0 | 1000 | 700 | ✓ | Direct | 4/5 | pass |
Offensive Security | OSCP | Lab-based | 0 | 100 | 70 | ⨉ | No exposure | N/A | fail |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nowrozy, R. GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity. Informatics 2024, 11, 45. https://doi.org/10.3390/informatics11030045
Nowrozy R. GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity. Informatics. 2024; 11(3):45. https://doi.org/10.3390/informatics11030045
Chicago/Turabian StyleNowrozy, Raza. 2024. "GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity" Informatics 11, no. 3: 45. https://doi.org/10.3390/informatics11030045
APA StyleNowrozy, R. (2024). GPTs or Grim Position Threats? The Potential Impacts of Large Language Models on Non-Managerial Jobs and Certifications in Cybersecurity. Informatics, 11(3), 45. https://doi.org/10.3390/informatics11030045