Guide for designing cyber security exercises

@inproceedings{Patriciu2009GuideFD,
  title={Guide for designing cyber security exercises},
  author={Victor-Valeriu Patriciu and Adrian Furtuna},
  year={2009}
}
Cyber security exercises are a very effective way of learning the practical aspects of information security. But designing such exercises is not an easy task and requires the work of several people. This paper presents a number of steps and guidelines that should be followed when designing a new cyber security exercise. The steps include: defining the objectives, choosing an approach, designing network topology, creating a scenario, establishing a set of rules, choosing appropriate metrics and… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-6 OF 6 REFERENCES

Cyber Defense Exercise:Meeting Learning Objectives thru Competition, IEEE Security and Privacy, Volume 5, Issue

  • Thomas Augustine, Ronald C. Dodge
  • 2007
1 Excerpt

Freiling , Is Attack Better Than Defense ?

  • Martin Mink, C. Felix
  • Teaching Information Security the Right Way…
  • 2006

Similar Papers

Loading similar papers…