Beuran et al., 2019 - Google Patents
Realistic cybersecurity training via scenario progression managementBeuran et al., 2019
View PDF- Document ID
- 8224887675508630786
- Author
- Beuran R
- Inoue T
- Tan Y
- Shinoda Y
- Publication year
- Publication venue
- 2019 IEEE European symposium on security and privacy workshops (EuroS&PW)
External Links
Snippet
Cybersecurity training activities are being conducted worldwide in order to address the increase in security threats that is plaguing our network-centric society. However, most of these activities take place in restricted environments, such as military organizations, or …
- 230000000694 effects 0 abstract description 37
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Beuran et al. | Realistic cybersecurity training via scenario progression management | |
| Khan et al. | Game-based learning platform to enhance cybersecurity education | |
| KR102113587B1 (en) | Mission-based game-implemented cyber education system and method | |
| Vykopal et al. | Scalable learning environments for teaching cybersecurity hands-on | |
| Vykopal et al. | Lessons learned from complex hands-on defence exercises in a cyber range | |
| Leune et al. | Using capture-the-flag to enhance the effectiveness of cybersecurity education | |
| US12311273B2 (en) | Incident response simulation and learning system | |
| Beltrán et al. | Experiences using capture the flag competitions to introduce gamification in undergraduate computer security labs | |
| Tang et al. | Interactive cybersecurity defense training inspired by web-based learning theory | |
| Švábenský et al. | From paper to platform: Evolution of a novel learning environment for tabletop exercises | |
| Cai | Using case studies to teach cybersecurity courses | |
| Demetrio et al. | ZenHackAdemy: ethical hacking@ DIBRIS | |
| Sigholm et al. | Enhancing cybersecurity education through high-fidelity live exercises (hiflix) | |
| Švábenský | Automated feedback for cybersecurity training | |
| Christensen et al. | The Privacy Universe–a game-based learning platform for data protection, privacy and ethics | |
| Guerrero et al. | Tectonic: An academic cyber range | |
| CN117690334A (en) | Auxiliary system and method for network security attack and defense education | |
| Švábenský et al. | Toward an automated feedback system in educational cybersecurity games | |
| Bergan et al. | Otnetic: A Cyber Range Training Platform Developed for the Norwegian Energy Sector | |
| Katsika | Simulation based learning in critical infrastructure security awareness: an empirical study | |
| bin Noor Azam et al. | Usability evaluation of open source and online capture the flag platforms | |
| Huhtakangas | Xamk cyber range: design of concept for cyber training environment | |
| Tharot | An Innovative Approach for Teaching Cybersecurity in Cyber-Physical Systems | |
| TR2025007558A2 (en) | GAMIFICATION-BASED ONLINE CYBER SECURITY TRAINING, SIMULATION AND DRILL SYSTEM AND METHOD | |
| Bao et al. | An Innovative Teaching Approach for Information Security: Improving Students' Practical and High-Level Skills by Using Ubiquitous Learning and Competition: Enhancing Students' Information Security Skills through Ubiquitous Learning and Competition |