ABSTRACT
Incorporating gamified simulations of cybersecurity breach scenarios in the form of Capture-The-Flag (CTF) sessions increases student engagement and leads to more well-developed skills. Furthermore, it enhances the confidence of students in their own abilities. Our argument is supported by a study in which undergraduate students taking a cybersecurity class were surveyed before and after participating in a CTF.
- J. Ebersole. 2014. Top Issues Facing Higher Education in 2014. Forbes.Google Scholar
- Facebook. 2017. Facebook CTF Platform. Available at https://github.com/facebook/fbctf.Google Scholar
- N. Firdausi, H. W. Prabawa, and H. Sutarno. 2017. Improve Student Understanding Ability Through Gamification in Instructional Media Based Explicit Instruction. IOP Conference Series: Journal of Physics.Google Scholar
- B. Geelan, K. de Salas, I. Lewis, C. King, D. Edwards, and A. O'Mara. 2015. Improving Learning Experiences Through Gamification: A Case Study. Australian Educational Computing Vol. 30 (1).Google Scholar
- Divakaran Liginlal, Inkook Sim, and Lara Khansa. 2009. How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. Computers & Security Vol. 28: 215--228. Google ScholarDigital Library
- C. Linehan, B. Kirman, S. Lawson, and G. Chan. 2011. Practical, Appropriate, Empirically-Validated Guidelines for Designing Educational Games Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1979--1888. Google ScholarDigital Library
- R. P. Lopes. 2014. Gamification as a Learning Tool. International Journal of Development and Educational Psychology Vol. 2: 565--574.Google Scholar
- T. Malone. 1981. Toward a Theory of Intrinsically Motivating Instruction. Cognitive Science. 4.Google Scholar
- National Audit Office. 2013. The UK cyber security strategy: Landscape review.Google Scholar
- R. Richter, D. Raban, and S. Rafaeli 2015. Studying Gamification: The Effect of Rewards and Incentives on Motivation. Gamification in Education and Business.Google Scholar
- D. Shernoff, M. Csikszentmihalyi, B. Schneider, and E. Shernoff 2003. Student Engagement in High School Classrooms from the Perspective of Flow Theory. School Psychology Quarterly Vol. 18(2).Google Scholar
- Gina Stevens. 2012. Data Security Breach Notification Laws. bibinfotypeTechnical Report. Congressional Research Service.Google Scholar
- The MITRE Corporation. 2008. CVE-2008-4250. Available from MITRE, CVE-ID CVE-2008-4250.Google Scholar
- The MITRE Corporation. 2014. CVE-2014-10021. Available from MITRE, CVE-ID CVE-2014-10021.Google Scholar
- Verizon Business. 2015. 2015 Data Breach Investigations Report.Google Scholar
- Verizon Business. 2016. 2016 Data Breach Investigations Report.Google Scholar
Index Terms
- Using Capture-the-Flag to Enhance the Effectiveness of Cybersecurity Education
Recommendations
Capture the Flag Unplugged: an Offline Cyber Competition
SIGCSE '17: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science EducationIn order to meet the cybersecurity workforce demand, it is important to raise cybersecurity interest among the youth. Just like ACM programming competitions, Capture the Flag (CTF) competitions allow students to learn cybersecurity skills in a fun and ...
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
AbstractSide-channels are unintended pathways within target systems that leak internal information, exploitable via side-channel attack techniques that extract the target information, compromising the system’s security and privacy. Side-channel attacks ...
Game-based learning platform to enhance cybersecurity education
AbstractComputer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be ...
Comments