Data-driven insight into the puzzle-based cybersecurity training

  title={Data-driven insight into the puzzle-based cybersecurity training},
  author={Karol{\'i}na Dockalov{\'a} Bursk{\'a} and V{\'i}t Rusň{\'a}k and Radek O{\vs}lej{\vs}ek},
  journal={Comput. Graph.},
2 Citations

Figures and Tables from this paper

Applying Process Discovery to Cybersecurity Training: An Experience Report
The lessons learned from applying process mining techniques to data captured in a cyber range, which has been developing and operating for almost ten years are described and tactics addressing scalability are explicitly discussed.


Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training
A conceptual model employing visual analytics that supports the sensemaking activities of users involved in various phases of the training life cycle is proposed that provides a classification of visualizations and can be used as a framework for developing novel visualization tools supporting phases ofThe training life-cycle.
Enhancing cybersecurity skills by creating serious games
Undergraduate students learn methods of network attack and defense by creating educational games in a cyber range, based on the design of two courses, instruction and assessment techniques, as well as the observations over the last three semesters.
Visual representation of penetration testing actions and skills in a technical tree model
A visual representation of penetration testing skills, actions and knowledge so that it closely relates theory and skills for cyber security topics which can serve as a guide for professional development is introduced.
Evaluation of Cyber Defense Exercises Using Visual Analytics Process
It is illustrated that the classification derived from the adoption of the visual analytics process helps to clarify and formalize analytical tasks of educators and enables their systematic support in cyber ranges.
Applying Puzzle-Based Learning to Cyber-Security Education
This paper introduced the Puzzle-based Learning to basic cyber security education and believes that such an interactive learning environment will help students to understand complex attack paths and countermeasures for fraud detection, cybercrime, and advanced persistent threats (APTs).
Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise
The goal in designing and running the MIT/LL CTF was to make the experience accessible to a wider community by providing an environment that would not only test and challenge the computer security skills of the participants, but also educate and prepare those without an extensive prior expertise.
KYPO – A Platform for Cyber Defence Exercises
The KYPO platform is presented and current and sophisticated cyber attacks against simulated infrastructure since this is one of the key premises for running successful cyber security training exercises are executed.
Game Based Cyber Security Training: are Serious Games suitable for cyber security training?
This paper investigates whether games can be effective cyber security training tools and finds early positive indications, but not yet enough evidence to draw any definite conclusions.
Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study
This paper designs two interactive visualizations that provide complementary views on game results that combine a known clustering and time-based visual approaches to show game results in a way that is easy to decode for players.
The Fun and Future of CTF
This paper details the experiences in a third year of designing, building and running a CTF for Boston-area undergraduate and graduate students, and provides a concrete context for a broader discussion and deeper questions on the value and future of this type of activity.