ABSTRACT
In a time of global crisis in cybersecurity, competitions and related activities are rapidly emerging to provide fun and engaging ways of developing and assessing cybersecurity knowledge and skills. However, there is no neutral organization that brings them together to promote collective efforts and address common issues. This paper will describe the rationale and process for developing the Cybersecurity Competition Federation (CCF) (National Science Foundation Award DUE- 134536) which was created to facilitate a community that promotes cybersecurity competitions and related activities. CCF's vision is to maintain an engaged and thriving ecosystem of cybersecurity competitions and related activities to build career awareness and cybersecurity skill to address a global shortage of cybersecurity professionals.
- Cisco (2014). "Cisco 2014 Annual Security Report". http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdfGoogle Scholar
- Cluley, G. (June 26, 21012). State-sponsored cybercrime on "industrial scale" says MI5 chief. https://nakedsecurity.sophos.com/2012/06/26/state-sponsored-cybercrime-on-industrial-scale-says-mi5-chief/Google Scholar
- code.org (n.d.). "Promote Computer Science". http://code.org/promoteGoogle Scholar
- Cybersecurity Research & Development: Hearing before the Subcommittee on Research and Science Education: (2009). House of Representatives, 111th Congress. http://science.house.gov/sites/republicans.science.house.gov/files/documents/hearings/061009_damico.pdfGoogle Scholar
- Dede, C. (2009) . Immersive interfaces for engagement and learning." Science. Vo. 323, No. 5910: pp. 66--69.Google Scholar
- Hong, E., Milgram, R., and Whiston, S. (1993). "Leisure activities in adolescents as a predictor of occupational choice in young adults: A longitudinal study," Journal of Career Development. Vo. 19, No. 3: pp. 221--229.Google ScholarCross Ref
- Lubinski, D. and Benbow, C. (2006). "Study of mathematically precocious youth after 35 years: Uncovering antecedents for the development of math-science expertise." Perspectives on Psychological Science. Vo.1, No. 4: pp. 316--345.Google Scholar
- Manson, D. & Pike, R. (2014). The case for depth in cybersecurity education. ACM Inroads: Special Section on Cybersecurity Education. Vo. 5, No.1, pp. 47--52. Google ScholarDigital Library
- Paulsen, C., McDuffie, E., Newhouse, W., Toth, P. (2012). "NICE: Creating a Cybersecurity Workforce and Aware Public", IEEE Security & Privacy. Vo.10, No. 3: pp. 76--79. Google ScholarDigital Library
- Pusey, P. (2013). "Summary of NCSF Workshop: August 2013". Unpublished Report, Department of Computer Information Systems, Cal Poly Pomona, Pomona, California.Google Scholar
- Pike, R. E. (2013) "The "Ethics" of Teaching Ethical Hacking," Journal of International Technology and Information Management: Vol. 22: Iss. 4, Article 4. http://scholarworks.lib.csusb.edu/jitim/vol22/iss4/4Google Scholar
- The National Cyber League (2015). http://www.nationalcyberleague.org/index.shtmlGoogle Scholar
- The National Cybersecurity Initiative (n.d.). https://www.whitehouse.gov/issues/foreign-policy/cybersecurity/national-initiativeGoogle Scholar
- Tobey, D. H., Pusey, P., & and D. Burley (2014). "Engaging learners in cybersecurity careers: Lessons from the launch of the National Cyber League". ACM Inroads: Special Section on Cybersecurity Education. Vo. 5, No.1, pp. 53--56. Google ScholarDigital Library
- USM Cybersecurity Task Force (2011, May). Report of the Cyber Security Task Force to the University System of Maryland. http://www.usmd.edu/newsroom/news/987Google Scholar
- Weiss,R.; Locasto,M., Mache, J., & Nestler, V. (2013). Teaching cybersecurity through games: a cloud-based approach. 29(1):113--115. Google ScholarDigital Library
Index Terms
- The Cybersecurity Competition Federation
Recommendations
A Vignette-based Method for Improving Cybersecurity Talent Management through Cyber Defense Competition Design
SIGMIS-CPR '15: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People ResearchThe preliminary findings are reported from a four-year study of cybersecurity competency assessment and development achieved through the design of cyber defense competitions. The first year of the study focused on identifying the abilities that should ...
Cybersecurity Competitions in Education: Engaging Learners through Improved Game Balance
SIGMIS-CPR '15: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People ResearchIn this presentation we will present models and research findings related to characteristics of competitions including: game balance, engagement, frameworks, and difficulty.
Sourcing strategy and cross-organizational career development
SIGSIM-CPR '14: Proceedings of the 52nd ACM conference on Computers and people researchIT departments have gone through many ups and downs in recruiting IT talent due to changes in the focus of IT departments over the last three decades, from back-office application development to strategic exploration of applications/technologies today. ...
Comments