Proceedings of the 11th International Conference on Computer Supported Education 2019
DOI: 10.5220/0007747104050413
|View full text |Cite
|
Sign up to set email alerts
|

ZenHackAdemy: Ethical Hacking @ DIBRIS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…The latter topic integrates hacking principles, conditions, and differences in hacking types (ACM et al, 2017). Moreover, practical training positively impacts highly motivated students, increase their interest in the field, and encourages them to consider cybersecurity master's studies (Demetrio et al, 2019).…”
Section: Problem Identificationmentioning
confidence: 99%
“…The latter topic integrates hacking principles, conditions, and differences in hacking types (ACM et al, 2017). Moreover, practical training positively impacts highly motivated students, increase their interest in the field, and encourages them to consider cybersecurity master's studies (Demetrio et al, 2019).…”
Section: Problem Identificationmentioning
confidence: 99%
“…Various experiences using gamification or CTF-like competitions have been published for cybersecurity education as well. In most cases these experiences involve university students attending cybersecurity classes, e.g., see [2,4,5]. In these papers CTF-like exercises are used to train and/or evaluate students.…”
Section: Related Workmentioning
confidence: 99%
“…The application is implemented to support scalability through client-side execution. To achieve this, all components are hosted on static GitHub Pages 5 and thus requiring no computation on the server-side. The only exception is the printing queue appearing in the copier room.…”
Section: Online Escape Roommentioning
confidence: 99%
“…Cyber defense (as well as offense) relies on security experts that must be properly trained through handson activities [1] and equipped with adequate security tools. This simple fact is boosting the interest of the international community toward creating cyber ranges.…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, the Open Cyber Challenge Platform (OCCP) [4] includes a limited number of scenarios. 1 Instead, the annual NATO Locked Shields initiative [5] relies on a virtual scenario renewed yearly and only used for two days. As mentioned above, reusing the same scenario drastically reduces the effectiveness of the training activity and, thus, the usefulness of the cyber range.…”
Section: Introductionmentioning
confidence: 99%