2020
DOI: 10.1108/ics-04-2019-0050
|View full text |Cite
|
Sign up to set email alerts
|

Adapting CTF challenges into virtual cybersecurity learning environments

Abstract: Purpose This paper aims to highlight the potential of using capture the flag (CTF) challenges, as part of an engaging cybersecurity learning experience for enhancing skills and knowledge acquirement of undergraduate students in academic programs. Design/methodology/approach The approach involves integrating interactivity, gamification, self-directed and collaborative learning attributes using a CTF hosting platform for cybersecurity education. The proposed methodology includes the deployment of a pre-engagem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 44 publications
0
6
0
1
Order By: Relevance
“…They now support specialized domains such as Internet of Things (IoT) [18], cyber-physical systems [19], smart grids [20], and Information Communications Technology (ICT) systems [12,14,21]. Furthermore, the cyber ranges serve various purposes: research and development, training and education [3,22], and hosting exercises and competitions like Cyber Defense Exercises (CDX) and Capture the Flag (CTF) events [23]. Some other researchers have created flexible, scalable, and easily reproducible cybersecurity environments for training and experimentation by leveraging AI [13], virtualization [3,24], and automation tools, using technologies like Docker, Ansible, and Python.…”
Section: Cyber Rangesmentioning
confidence: 99%
“…They now support specialized domains such as Internet of Things (IoT) [18], cyber-physical systems [19], smart grids [20], and Information Communications Technology (ICT) systems [12,14,21]. Furthermore, the cyber ranges serve various purposes: research and development, training and education [3,22], and hosting exercises and competitions like Cyber Defense Exercises (CDX) and Capture the Flag (CTF) events [23]. Some other researchers have created flexible, scalable, and easily reproducible cybersecurity environments for training and experimentation by leveraging AI [13], virtualization [3,24], and automation tools, using technologies like Docker, Ansible, and Python.…”
Section: Cyber Rangesmentioning
confidence: 99%
“…Estudio descriptivo de caso. Cualitativo (Franco, 2023); (Christensen, 2021) (Colombelli, 2021); (Karagiannis, 2020) Método mixto (Lau, 2021); (Lara-Prieto, 2023); (Necchi, 2020) Revisión de literatura (Leijon, 2022); (Conde, 2021); (Gallagher, 2020) Tabla 2: Metodologías utilizadas en las piezas analizadas…”
Section: Metodologíaunclassified
“…Carvalho et al [20] presented Activity Theory-based Model of Serious Games (ATMSG) which has the objective of "supporting the analysis and design of serious games when a thorough understanding of the characteristics of the game is needed". Based on ATMSG, Karagiannis et al [21], present the COFELET ontology as a way to describe the key elements that such approaches should embrace to assimilate well known cyber security threat analysis and modeling standards as the means to create interesting educational experiences. The COFELET ontology was extended with the additional elements of learning objective, grade scheme and role in [22].…”
Section: A Classification Systemmentioning
confidence: 99%