[go: up one dir, main page]

Beuran et al., 2019 - Google Patents

Realistic cybersecurity training via scenario progression management

Beuran et al., 2019

View PDF
Document ID
8224887675508630786
Author
Beuran R
Inoue T
Tan Y
Shinoda Y
Publication year
Publication venue
2019 IEEE European symposium on security and privacy workshops (EuroS&PW)

External Links

Snippet

Cybersecurity training activities are being conducted worldwide in order to address the increase in security threats that is plaguing our network-centric society. However, most of these activities take place in restricted environments, such as military organizations, or …
Continue reading at www.jaist.ac.jp (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs

Similar Documents

Publication Publication Date Title
Beuran et al. Realistic cybersecurity training via scenario progression management
Khan et al. Game-based learning platform to enhance cybersecurity education
KR102113587B1 (en) Mission-based game-implemented cyber education system and method
Vykopal et al. Scalable learning environments for teaching cybersecurity hands-on
Vykopal et al. Lessons learned from complex hands-on defence exercises in a cyber range
Leune et al. Using capture-the-flag to enhance the effectiveness of cybersecurity education
US12311273B2 (en) Incident response simulation and learning system
Beltrán et al. Experiences using capture the flag competitions to introduce gamification in undergraduate computer security labs
Tang et al. Interactive cybersecurity defense training inspired by web-based learning theory
Švábenský et al. From paper to platform: Evolution of a novel learning environment for tabletop exercises
Cai Using case studies to teach cybersecurity courses
Demetrio et al. ZenHackAdemy: ethical hacking@ DIBRIS
Sigholm et al. Enhancing cybersecurity education through high-fidelity live exercises (hiflix)
Švábenský Automated feedback for cybersecurity training
Christensen et al. The Privacy Universe–a game-based learning platform for data protection, privacy and ethics
Guerrero et al. Tectonic: An academic cyber range
CN117690334A (en) Auxiliary system and method for network security attack and defense education
Švábenský et al. Toward an automated feedback system in educational cybersecurity games
Bergan et al. Otnetic: A Cyber Range Training Platform Developed for the Norwegian Energy Sector
Katsika Simulation based learning in critical infrastructure security awareness: an empirical study
bin Noor Azam et al. Usability evaluation of open source and online capture the flag platforms
Huhtakangas Xamk cyber range: design of concept for cyber training environment
Tharot An Innovative Approach for Teaching Cybersecurity in Cyber-Physical Systems
TR2025007558A2 (en) GAMIFICATION-BASED ONLINE CYBER SECURITY TRAINING, SIMULATION AND DRILL SYSTEM AND METHOD
Bao et al. An Innovative Teaching Approach for Information Security: Improving Students' Practical and High-Level Skills by Using Ubiquitous Learning and Competition: Enhancing Students' Information Security Skills through Ubiquitous Learning and Competition