Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems

01/14/2021
by   Marcus Knüpfer, et al.
0

The lack of guided exercises and practical opportunities to learn about cybersecurity in a practical way makes it difficult for security experts to improve their proficiency. Capture the Flag events and Cyber Ranges are ideal for cybersecurity training. Thereby, the participants usually compete in teams against each other, or have to defend themselves in a specific scenario. As organizers of yearly events, we present a taxonomy for interactive cyber training and education. The proposed taxonomy includes different factors of the technical setup, audience, training environment, and training setup. By the comprehensive taxonomy, different aspects of interactive training are considered. This can help trainings to improve and to be established successfully. The provided taxonomy is extendable and can be used in further application areas as research on new security technologies.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/14/2020

A Review of Cyber-Ranges and Test-Beds: Current and Future Trends

Cyber situational awareness has been proven to be of value in forming a ...
research
08/11/2021

Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training

Cybersecurity incident response teams mitigate the impact of adverse cyb...
research
09/09/2020

A Security Architecture for Railway Signalling

We present the proposed security architecture Deutsche Bahn plans to dep...
research
01/06/2021

When Interactive Graphic Storytelling Fails

Many people are unaware of the digital dangers that lie around each cybe...
research
07/27/2018

A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence

Malware such as banking Trojans are popular with financially-motivated c...
research
06/16/2021

A Revised Taxonomy of Steganography Embedding Patterns

Steganography embraces several hiding techniques which spawn across mult...
research
05/28/2020

Algorithm Selection Framework for Cyber Attack Detection

The number of cyber threats against both wired and wireless computer sys...

Please sign up or login with your details

Forgot password? Click here to reset