2020
DOI: 10.11610/isij.4622
|View full text |Cite
|
Sign up to set email alerts
|

A Cyber Range for Armed Forces Education

Abstract: Cyber security is one of the prominent global challenges due to significant increase in the number of cyberattacks over the last few decades. Cybersecurity awareness and cyber security training are promoted by hyper-realistic virtual environments termed as cyber ranges. This article highlights the concept of a cyber range. Cyber range for educational purposes in the armed forces has been proposed taking into account the important parameters a cyber range should incorporate. The author takes into account the us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…CRs have become popular across industry and strategically for state actors, for example within China (Cary, 2022). Defined as "interactive, simulated platforms and representations of networks, systems, tools, and applications" (National Initiative for Cybersecurity Education, 2020, p. 3), they can be used for a variety of purposes, but primarily for training and skills development (Turčaník, 2020). This has led to a range of typologies on their architecture and use.…”
Section: Cyber Range Architecture and Usementioning
confidence: 99%
“…CRs have become popular across industry and strategically for state actors, for example within China (Cary, 2022). Defined as "interactive, simulated platforms and representations of networks, systems, tools, and applications" (National Initiative for Cybersecurity Education, 2020, p. 3), they can be used for a variety of purposes, but primarily for training and skills development (Turčaník, 2020). This has led to a range of typologies on their architecture and use.…”
Section: Cyber Range Architecture and Usementioning
confidence: 99%
“… Suricata. 4 A network intrusion detection system monitors the network and detects unexpected traffic. Suricata may be used by participants to produce network traffic captures for analysis.…”
Section: High-level Architecturementioning
confidence: 99%
“…3 Regardless of cyber ranges often being used as testbeds for developing cybersecurity solutions or other software, training and exercise are the most typical reasons for their usage. 4 Hands-on experience with cyber ranges has become one of the most soughtafter benefits for cybersecurity experts. 5 Still, its application has spread beyond the cybersecurity professional circle into the general workforce of companies, where cybersecurity skills must be exercised, strengthened, and maintained to ensure a competitive advantage.…”
Section: Introductionmentioning
confidence: 99%
“…6 Although cyber ranges can be used as testbeds for the development of cybersecurity technologies or other software in general, a common goal for the use of cyber ranges is indeed training and exercise. 7 Four main types of cyber ranges are often distinguished, namely simulation cyber ranges, emulation cyber ranges, overlay cyber ranges and hybrid ranges. 6 Simulation Cyber Ranges.…”
Section: Contextmentioning
confidence: 99%