Exploring a national cybersecurity exercise for universities

LJ Hoffman, T Rosenberg, R Dodge… - IEEE Security & …, 2005 - ieeexplore.ieee.org
In cybersecurity competitions, participants either create new or protect preconfigured
information systems and then defend these systems against attack in a real-world setting …

[PDF][PDF] Developing small team-based cyber security exercises

B Mauer, W Stackpole, D Johnson - Proceedings of the International …, 2012 - world-comp.org
The growth of the security industry is sparking a significant interest in well-rounded security
professionals. Regional and national competitions in the academic community have been …

Utilizing visualization mechanisms to improve user performance during cyber defense competitions

A Luse, J Triplet - 2009 - aisel.aisnet.org
This paper describes the development of a visualization system used by students
participating in a collegiate cyber defense competition and a first-pass exploratory analysis …

[PDF][PDF] Employing Interactive Maps to Increase User Utilization of Visualization Mechanisms for Network Security

A Luse, B Mennecke - Exploring utilization of visualization for computer …, 2009 - Citeseer
Visualization technologies offer a powerful tool to aid in corporate network security
administration. The purpose of this article is to examine the use of interactive maps to …

[PDF][PDF] CDCVIS: AConfigurable VISUALIZATION MECHANISM FOR CORPORATE NETWORK SECURITY ADMINISTRATION

A Luse, B Mennecke, N Karstens… - Exploring utilization of …, 2009 - Citeseer
Corporate network security administration is a never-ending balancing act for network
administrators straddling the line between information protection and availability. The …