Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
MM Yamin, B Katt, V Gkioulos - Computers & Security, 2020 - Elsevier
The first line of defense against cyber threats and cyber crimes is to be aware and get ready,
eg, through cyber security training. Training can have two forms, the first is directed towards …
eg, through cyber security training. Training can have two forms, the first is directed towards …
The power of interpretation: Qualitative methods in cybersecurity research
Cybersecurity is a hot topic and researchers have published extensively on studies
conducted using a variety of different research methods. This paper aims to determine which …
conducted using a variety of different research methods. This paper aims to determine which …
A framework for competence development and assessment in hybrid cybersecurity exercises
Rising numbers and sophistication of security threats in the digital domain cause an
increase in the demand for skilled cybersecurity professionals. In response, cybersecurity …
increase in the demand for skilled cybersecurity professionals. In response, cybersecurity …
[图书][B] Building a cybersecurity culture in organizations
I Corradini - 2020 - Springer
Over the last few years, cybersecurity has become one of the most important issues for
organizations across all sectors, industries and countries. In fact, an effective management …
organizations across all sectors, industries and countries. In fact, an effective management …
[HTML][HTML] Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises
The global shortage of cybersecurity professionals poses a daunting challenge for
organizations seeking to protect their assets and data. To counteract this workforce …
organizations seeking to protect their assets and data. To counteract this workforce …
Use case based blended teaching of IIoT cybersecurity in the industry 4.0 era
TM Fernández-Caramés, P Fraga-Lamas - Applied Sciences, 2020 - mdpi.com
Industry 4.0 and Industrial Internet of Things (IIoT) are paradigms that are driving current
industrial revolution by connecting to the Internet industrial machinery, management tools or …
industrial revolution by connecting to the Internet industrial machinery, management tools or …
Train as you fight: evaluating authentic cybersecurity training in cyber ranges
Humans can play a decisive role in detecting and mitigating cyber attacks if they possess
sufficient cybersecurity skills and knowledge. Realizing this potential requires effective …
sufficient cybersecurity skills and knowledge. Realizing this potential requires effective …
Student assessment in cybersecurity training automated by pattern mining and clustering
Hands-on cybersecurity training allows students and professionals to practice various tools
and improve their technical skills. The training occurs in an interactive learning environment …
and improve their technical skills. The training occurs in an interactive learning environment …
Learning analytics perspective: Evidencing learning from digital datasets in cybersecurity exercises
K Maennel - 2020 IEEE European symposium on security and …, 2020 - ieeexplore.ieee.org
Cybersecurity exercises are gaining in popularity in university curricula and professional
training paths and are seen as an effective teaching method. Such exercises provide digital …
training paths and are seen as an effective teaching method. Such exercises provide digital …
Hacked: A pedagogical analysis of online vulnerability discovery exercises
D Votipka, E Zhang, ML Mazurek - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Hacking exercises are a common tool for security education, but there is limited investigation
of how they teach security concepts and whether they follow pedagogical best practices …
of how they teach security concepts and whether they follow pedagogical best practices …