2012
DOI: 10.1109/msp.2012.112
|View full text |Cite
|
Sign up to set email alerts
|

Winning Cybersecurity One Challenge at a Time

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…Such challenges have high value since they help develop a security mindset and operate in a complementary way to existing educational approaches [8], regardless of their nature (e.g., hacking competition or military exercise) [9]. While the research streams described above are of critical importance to the development of the cyber security profession, there is a lack of research on approaches to assess competency within cyber security qualifications, particularly on how effective current practices to assess competency are.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Such challenges have high value since they help develop a security mindset and operate in a complementary way to existing educational approaches [8], regardless of their nature (e.g., hacking competition or military exercise) [9]. While the research streams described above are of critical importance to the development of the cyber security profession, there is a lack of research on approaches to assess competency within cyber security qualifications, particularly on how effective current practices to assess competency are.…”
Section: Related Workmentioning
confidence: 99%
“…Research strands that seek to address this topic have focused on industry professionalisation [2], competency requirements [3], [4], and the design of training programmes [5], [6], with a particular emphasis on the role of competitive events, such as Capture The Flag (CTF) competitions [7], [8], [9], [10]. One core area that has remained unaddressed, however, is a focus on the approaches to assess competency within cyber security qualifications.…”
Section: Introductionmentioning
confidence: 99%
“…Our work follows the tradition of creating cybersecurity games or exercises, which are known to engage students [18,12]. This includes competitions such as CCDC 1 , Plaid 2 , notsosecure 3 , iCTF 4 [7], CSAW 5 [12], TRACER FIRE 6 , Packetwars 7 , and many others.…”
Section: Related Workmentioning
confidence: 99%
“…This includes competitions such as CCDC 1 , Plaid 2 , notsosecure 3 , iCTF 4 [7], CSAW 5 [12], TRACER FIRE 6 , Packetwars 7 , and many others. From our perspective, one problem with these competitions is that they require a significant amount of infrastructure and preparation by the organizers.…”
Section: Related Workmentioning
confidence: 99%
“…Indeed, cybersecurity competitions are an area of high interest since competitions are increasingly used to recruit and educate students [8] [11] [15]. Many efforts are underway to expand cyber competitions in both scope and availability [17] [19].…”
Section: Introductionmentioning
confidence: 99%