2017 IEEE Global Engineering Education Conference (EDUCON) 2017
DOI: 10.1109/educon.2017.7942934
|View full text |Cite
|
Sign up to set email alerts
|

Conceptual analysis of cyber security education based on live competitions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 13 publications
0
7
0
2
Order By: Relevance
“…CTF is popularly used in cybersecurity and engineering, including in classrooms and labs [2,11], for training security professionals [5], for pedagogical research based on live CTF competition [8], and for taxonomy framework research for training and education [9]. While existing practices incorporate CTF for talent acquisition and job placements, e.g., National Cyber League and MITRE [5], the analyses of the impact of these methods are lacking, which motivated our work.…”
Section: Ctf In Educationmentioning
confidence: 99%
“…CTF is popularly used in cybersecurity and engineering, including in classrooms and labs [2,11], for training security professionals [5], for pedagogical research based on live CTF competition [8], and for taxonomy framework research for training and education [9]. While existing practices incorporate CTF for talent acquisition and job placements, e.g., National Cyber League and MITRE [5], the analyses of the impact of these methods are lacking, which motivated our work.…”
Section: Ctf In Educationmentioning
confidence: 99%
“…Also, more general approaches to exercises are proposed: [59] that describe an extended competence development and assessment framework and [56] suggests specific metrics in complex simulated CSXs. For designing competition based exercises [60] describes a mindmap, while for CTFs [61], [62] describe 5 steps when designing an evaluation (purpose, frame, questions, information needed and systematic collection method). At a higher level conceptual level, models for a multidisciplinary cybersecurity training methodology [63], a pedagogical framework [12], a framework incorporating cognitive aspects [64], and a holistic model of professional competence in the cyber domain [65] have also been developed.…”
Section: Comparison To Other Framework In Csxsmentioning
confidence: 99%
“…In this light, several educational programs have been developed in organizations, universities and schools to attract people to follow a career in cybersecurity and to effectively train cybersecurity professionals. However, cybersecurity education programs face many issues and challenges reviewed and analyzed in [2] and [3]. For this reason, new strategies need to be developed with the potential to confront the challenges of cybersecurity education and to improve its effectiveness such as the adoption of game-based learning.…”
Section: Introductionmentioning
confidence: 99%