Cybersecurity Skills Training: An Attacker-Centric Gamified Approach

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CyTrONE: An Integrated Cybersecurity Training Framework

In a world in which cyber-attacks occur on a daily basis, cybersecurity education and training are indispensable. Current training programs rely on manual setup and configuration for hands-on activities, which is a tedious and error-prone task. In this paper we present CyTrONE, an integrated cybersecurity training framework that we designed and implemented to address such shortcomings. The key ...

متن کامل

Gamified Training for Cyber Defence

This work considers training needs for cyber defence and discus the gamification of training. The use of game play mechanics will be considered with a special emphasis on strategies to encourage users to engage in desired secure behaviours. The use of games and game play mechanics has been shown to be able to make the training more engaging. Serious games may as well help increase motivation am...

متن کامل

Skills and Characteristics of Successful Cybersecurity Advocates

Cybersecurity advocates attempt to counter the tsunami of cyber attacks by promoting security best practices and encouraging security technology adoption. However, little is known about the skills necessary for successful advocacy. Our study explores the motivations, characteristics, and practices of cybersecurity advocates. Preliminary analysis of 19 interviews reveals that effective advocates...

متن کامل

MISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis

Currently, perimeter-based approaches are the mainstay of cybersecurity. While this paradigm is necessary, there is mounting evidence of its insufficiency with respect to sophisticated and coordinated attacks. In contrast to perimeterbased security, mission-centric cybersecurity provides awareness of how attacks can influence mission success and therefore focuses resources for mitigating vulner...

متن کامل

Issues and Requirements for Cybersecurity in Network Centric Warfare

The transition to network centric warfare brings with it great promise for the effectiveness of future military operations. This promise arises from the capability for network centric warfare to empower individuals at all levels with vast amounts of relevant information and thereby lift the “fog of war.” By achieving the promise, commanders will be able to effectively and efficiently employ the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Technology Innovation Management Review

سال: 2015

ISSN: 1927-0321

DOI: 10.22215/timreview/861