skip to main content
10.1145/2751957.2751980acmconferencesArticle/Chapter ViewAbstractPublication PagescprConference Proceedingsconference-collections
research-article

The Cybersecurity Competition Federation

Published:04 June 2015Publication History

ABSTRACT

In a time of global crisis in cybersecurity, competitions and related activities are rapidly emerging to provide fun and engaging ways of developing and assessing cybersecurity knowledge and skills. However, there is no neutral organization that brings them together to promote collective efforts and address common issues. This paper will describe the rationale and process for developing the Cybersecurity Competition Federation (CCF) (National Science Foundation Award DUE- 134536) which was created to facilitate a community that promotes cybersecurity competitions and related activities. CCF's vision is to maintain an engaged and thriving ecosystem of cybersecurity competitions and related activities to build career awareness and cybersecurity skill to address a global shortage of cybersecurity professionals.

References

  1. Cisco (2014). "Cisco 2014 Annual Security Report". http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdfGoogle ScholarGoogle Scholar
  2. Cluley, G. (June 26, 21012). State-sponsored cybercrime on "industrial scale" says MI5 chief. https://nakedsecurity.sophos.com/2012/06/26/state-sponsored-cybercrime-on-industrial-scale-says-mi5-chief/Google ScholarGoogle Scholar
  3. code.org (n.d.). "Promote Computer Science". http://code.org/promoteGoogle ScholarGoogle Scholar
  4. Cybersecurity Research & Development: Hearing before the Subcommittee on Research and Science Education: (2009). House of Representatives, 111th Congress. http://science.house.gov/sites/republicans.science.house.gov/files/documents/hearings/061009_damico.pdfGoogle ScholarGoogle Scholar
  5. Dede, C. (2009) . Immersive interfaces for engagement and learning." Science. Vo. 323, No. 5910: pp. 66--69.Google ScholarGoogle Scholar
  6. Hong, E., Milgram, R., and Whiston, S. (1993). "Leisure activities in adolescents as a predictor of occupational choice in young adults: A longitudinal study," Journal of Career Development. Vo. 19, No. 3: pp. 221--229.Google ScholarGoogle ScholarCross RefCross Ref
  7. Lubinski, D. and Benbow, C. (2006). "Study of mathematically precocious youth after 35 years: Uncovering antecedents for the development of math-science expertise." Perspectives on Psychological Science. Vo.1, No. 4: pp. 316--345.Google ScholarGoogle Scholar
  8. Manson, D. & Pike, R. (2014). The case for depth in cybersecurity education. ACM Inroads: Special Section on Cybersecurity Education. Vo. 5, No.1, pp. 47--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Paulsen, C., McDuffie, E., Newhouse, W., Toth, P. (2012). "NICE: Creating a Cybersecurity Workforce and Aware Public", IEEE Security & Privacy. Vo.10, No. 3: pp. 76--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pusey, P. (2013). "Summary of NCSF Workshop: August 2013". Unpublished Report, Department of Computer Information Systems, Cal Poly Pomona, Pomona, California.Google ScholarGoogle Scholar
  11. Pike, R. E. (2013) "The "Ethics" of Teaching Ethical Hacking," Journal of International Technology and Information Management: Vol. 22: Iss. 4, Article 4. http://scholarworks.lib.csusb.edu/jitim/vol22/iss4/4Google ScholarGoogle Scholar
  12. The National Cyber League (2015). http://www.nationalcyberleague.org/index.shtmlGoogle ScholarGoogle Scholar
  13. The National Cybersecurity Initiative (n.d.). https://www.whitehouse.gov/issues/foreign-policy/cybersecurity/national-initiativeGoogle ScholarGoogle Scholar
  14. Tobey, D. H., Pusey, P., & and D. Burley (2014). "Engaging learners in cybersecurity careers: Lessons from the launch of the National Cyber League". ACM Inroads: Special Section on Cybersecurity Education. Vo. 5, No.1, pp. 53--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. USM Cybersecurity Task Force (2011, May). Report of the Cyber Security Task Force to the University System of Maryland. http://www.usmd.edu/newsroom/news/987Google ScholarGoogle Scholar
  16. Weiss,R.; Locasto,M., Mache, J., & Nestler, V. (2013). Teaching cybersecurity through games: a cloud-based approach. 29(1):113--115. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The Cybersecurity Competition Federation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGMIS-CPR '15: Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research
      June 2015
      176 pages
      ISBN:9781450335577
      DOI:10.1145/2751957

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 June 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SIGMIS-CPR '15 Paper Acceptance Rate26of47submissions,55%Overall Acceptance Rate300of480submissions,63%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader