• Corpus ID: 60740845

Using CTFs for an Undergraduate Cyber Education

@inproceedings{Carlisle2015UsingCF,
  title={Using CTFs for an Undergraduate Cyber Education},
  author={Martin C. Carlisle and Michael Chiaramonte and David Caswell},
  year={2015}
}
Over the last five years, the United States Air Force Academy (USAFA) has participated in numerous Capture the Flag (CTF) and other cyber competitions. At first, this was simply an extracurricular club activity; however, as we have seen the impact on student motivation and learning, we have greatly increased student and faculty participation. Additionally, we have started to base entire for-credit courses on a CTF framework. In this paper we discuss our rationale for utilizing CTFs as part of… 

Figures from this paper

The Use of Cyber-Defense Exercises in Undergraduate Computing Education

Evidence that the US National Security Agency Cyber-Defense Exercise inspires students to evaluate and create within the field of computer security is provided.

Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education

This work identified the security issues that are the most concerning to industry and academia and enumerated the security tools and techniques that are used the most by players.

Impact of Capture The Flag (CTF)-style vs. Traditional Exercises in an Introductory Computer Security Class

The importance of possessing hands-on skills in addition to theoretical knowledge for cybersecurity researchers and professionals cannot be overstated. Computer security educators have therefore

Conceptual analysis of cyber security education based on live competitions

A concept map of the technological and pedagogical characteristics of live competitions is constructed and a comparative evaluation scheme is presented that is employed on three live competition approaches from the literature in order to reveal their value with respect to the educational impact.

“Hacking an IoT Home”: New opportunities for cyber security education combining remote learning with cyber-physical systems

An integrated CTF for the home IoT environment is developed, where students can observe the impact of submitting flags via online video, to physical adjust the home environment - ranging from switching off lights, playing music, or controlling an IoT-enabled robot.

AUTO MATED REMOTE SECURITY SCORING ENGINE ( ARSSE ) : GAMIFICATION OF CYBER SECURITY EDUCATION by Arsh Chauhan

The Automated Remote Security Scoring Engine (ARSSE), pronounced "Arsh") uses a combination of well maintained open-source tools and custom connectors to facilitate an easy to use, scalable, and secure system to check the state of a computer system against a desired state and award points based on passed checks.

To Gamify or Not?: On Leaderboard Effects, Student Engagement and Learning Outcomes in a Cybersecurity Intervention

A framework for measuring skills demonstrated by students within an active learning setting where the primary focus is on practical expertise is provided, and a number of transferable recommendations are provided.

Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition

This paper proposes a simple, but effective approach that is referred to as Git-based CTF to hosting an in-class attack-and-defense CTF contest while minimizing the operational costs for teachers.

An Online Gamified Learning Platform for Teaching Cybersecurity and More

Some key features that together make the platform novel are described, including its distributed infrastructure, game engine, integrated development environment, automated feedback system, and support for individualization.

Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt

Hackerbot is presented, a unique approach for teaching computer security: students interact with a malicious attacker chatbot, who challenges them to complete a variety of security tasks, including defensive and investigatory challenges.

References

SHOWING 1-7 OF 7 REFERENCES

Ten Years of iCTF: The Good, The Bad, and The Ugly

This paper presents a framework that is based on the lessons learned in running, for more than 10 years, the largest educational CTF in the world, called iCTF, to provide educational institutions and other organizations with the ability to run customizable CTF competitions.

PicoCTF: A Game-Based Computer Security Competition for High School Students

PicoCTF focused primarily on offense and presented challenges in the form of a web-based game and has been adapted into the curricula of 40 high schools and used to host six other capturethe-flag competitions.

Classroom Live: a software-assisted gamification tool

The client/server suite, dubbed Classroom Live, streamlines the gamification process for the teacher by simplifying common tasks and provides students with an esthetically pleasing user interface that offers in game rewards in exchange for their participation.

Passion for Beauty: A Model for Learning

This essay investigates the idea that effective teaching entails a passion for the beauty of the subject matter being taught. The first part gives a summative overview of the last 72 years of

Using You Tube to enhance student class preparation in an introductory Java course

When professors reduced lecture time and increased lab time, students watched videos and read significantly more, and their test scores were at least as high and they indicated they would prefer to not have more lecture.

RAPTOR: introducing programming to non-majors with flowcharts

Students preferred using flowcharts to express their algorithms, and were more successful creating algorithms using RAPTOR than using a traditional language or writing flowchart without RAP TOR.

Improving Schools: Hierarchy of Motivation.

  • http://inservice.ascd.org/improving-schools-thehierarchy-of-motivation/
  • 2014