Using CTFs for an Undergraduate Cyber Education
@inproceedings{Carlisle2015UsingCF, title={Using CTFs for an Undergraduate Cyber Education}, author={Martin C. Carlisle and Michael Chiaramonte and David Caswell}, year={2015} }
Over the last five years, the United States Air Force Academy (USAFA) has participated in numerous Capture the Flag (CTF) and other cyber competitions. At first, this was simply an extracurricular club activity; however, as we have seen the impact on student motivation and learning, we have greatly increased student and faculty participation. Additionally, we have started to base entire for-credit courses on a CTF framework. In this paper we discuss our rationale for utilizing CTFs as part of…
18 Citations
The Use of Cyber-Defense Exercises in Undergraduate Computing Education
- Computer ScienceASE @ USENIX Security Symposium
- 2016
Evidence that the US National Security Agency Cyber-Defense Exercise inspires students to evaluate and create within the field of computer security is provided.
Analysis and Exercises for Engaging Beginners in Online CTF Competitions for Security Education
- Computer ScienceASE @ USENIX Security Symposium
- 2017
This work identified the security issues that are the most concerning to industry and academia and enumerated the security tools and techniques that are used the most by players.
Impact of Capture The Flag (CTF)-style vs. Traditional Exercises in an Introductory Computer Security Class
- EducationITiCSE
- 2022
The importance of possessing hands-on skills in addition to theoretical knowledge for cybersecurity researchers and professionals cannot be overstated. Computer security educators have therefore…
Conceptual analysis of cyber security education based on live competitions
- Education2017 IEEE Global Engineering Education Conference (EDUCON)
- 2017
A concept map of the technological and pedagogical characteristics of live competitions is constructed and a comparative evaluation scheme is presented that is employed on three live competition approaches from the literature in order to reveal their value with respect to the educational impact.
“Hacking an IoT Home”: New opportunities for cyber security education combining remote learning with cyber-physical systems
- Computer Science2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
- 2021
An integrated CTF for the home IoT environment is developed, where students can observe the impact of submitting flags via online video, to physical adjust the home environment - ranging from switching off lights, playing music, or controlling an IoT-enabled robot.
AUTO MATED REMOTE SECURITY SCORING ENGINE ( ARSSE ) : GAMIFICATION OF CYBER SECURITY EDUCATION by Arsh Chauhan
- Computer Science
- 2021
The Automated Remote Security Scoring Engine (ARSSE), pronounced "Arsh") uses a combination of well maintained open-source tools and custom connectors to facilitate an easy to use, scalable, and secure system to check the state of a computer system against a desired state and award points based on passed checks.
To Gamify or Not?: On Leaderboard Effects, Student Engagement and Learning Outcomes in a Cybersecurity Intervention
- Computer ScienceSIGCSE
- 2021
A framework for measuring skills demonstrated by students within an active learning setting where the primary focus is on practical expertise is provided, and a number of transferable recommendations are provided.
Git-based CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competition
- Computer ScienceASE @ USENIX Security Symposium
- 2018
This paper proposes a simple, but effective approach that is referred to as Git-based CTF to hosting an in-class attack-and-defense CTF contest while minimizing the operational costs for teachers.
An Online Gamified Learning Platform for Teaching Cybersecurity and More
- Computer ScienceSIGITE
- 2021
Some key features that together make the platform novel are described, including its distributed infrastructure, game engine, integrated development environment, automated feedback system, and support for individualization.
Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt
- Computer ScienceASE @ USENIX Security Symposium
- 2018
Hackerbot is presented, a unique approach for teaching computer security: students interact with a malicious attacker chatbot, who challenges them to complete a variety of security tasks, including defensive and investigatory challenges.
References
SHOWING 1-7 OF 7 REFERENCES
Ten Years of iCTF: The Good, The Bad, and The Ugly
- Computer Science3GSE
- 2014
This paper presents a framework that is based on the lessons learned in running, for more than 10 years, the largest educational CTF in the world, called iCTF, to provide educational institutions and other organizations with the ability to run customizable CTF competitions.
PicoCTF: A Game-Based Computer Security Competition for High School Students
- Computer Science3GSE
- 2014
PicoCTF focused primarily on offense and presented challenges in the form of a web-based game and has been adapted into the curricula of 40 high schools and used to host six other capturethe-flag competitions.
Classroom Live: a software-assisted gamification tool
- EducationComput. Sci. Educ.
- 2013
The client/server suite, dubbed Classroom Live, streamlines the gamification process for the teacher by simplifying common tasks and provides students with an esthetically pleasing user interface that offers in game rewards in exchange for their participation.
Passion for Beauty: A Model for Learning
- Education
- 2012
This essay investigates the idea that effective teaching entails a passion for the beauty of the subject matter being taught. The first part gives a summative overview of the last 72 years of…
Using You Tube to enhance student class preparation in an introductory Java course
- Education, PhysicsSIGCSE
- 2010
When professors reduced lecture time and increased lab time, students watched videos and read significantly more, and their test scores were at least as high and they indicated they would prefer to not have more lecture.
RAPTOR: introducing programming to non-majors with flowcharts
- Computer Science
- 2004
Students preferred using flowcharts to express their algorithms, and were more successful creating algorithms using RAPTOR than using a traditional language or writing flowchart without RAP TOR.
Improving Schools: Hierarchy of Motivation.
- http://inservice.ascd.org/improving-schools-thehierarchy-of-motivation/
- 2014