Design and Use of Privacy Capture-the-Flag Challenges in an Introductory Class on Information Privacy and Security

被引:0
|
作者
Vigl, Wolfgang [1 ]
Abramova, Svetlana [1 ]
机构
[1] Univ Innsbruck, Dept Comp Sci, Innsbruck, Austria
关键词
Privacy; Capture-The-Flag; CTF; Education; Cybersecurity; Student engagement; DE-ANONYMIZATION; MODEL;
D O I
10.1145/3649217.3653572
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the advancement of data-intensive technologies and online tracking opportunities, education on privacy is becoming a bigger priority in cybersecurity curricula. Owing to its multidimensional and context-dependent nature, privacy and its protection goals can be introduced to computer science students as collective efforts of system designers to enable data protection, user's informational control, and privacy-preserving data sharing with third parties. Since engaging course participants into hands-on and gamified exercises is generally known to enhance learning experience and effect, we adopted the teaching practice of using Capture-the-Flag (CTF) security challenges and validated its applicability in the privacy education domain. This work presents a pioneering set of 8 CTF-style tasks intentionally designed for the study and demonstration of handpicked privacy concepts, techniques, and attacks. Drawing upon both quantitative and qualitative feedback collected from 27 course participants, this format of homework exercises is found to increase students' confidence in this knowledge domain and perceived as an enjoyable, motivating, and engaging way of learning about information privacy.
引用
收藏
页码:618 / 624
页数:7
相关论文
共 50 条
  • [1] Data Security and Privacy Information Challenges in Cloud Computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 512 - 514
  • [2] Data security and privacy information challenges in cloud computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (03) : 215 - 218
  • [3] Information security and privacy
    Pieprzyk, J
    Safavi-Naini, R
    [J]. AUSTRALIAN COMPUTER JOURNAL, 1999, 31 (02): : 33 - 33
  • [4] INFORMATION SECURITY AND PRIVACY
    Bui, Tung
    Clemons, Eric
    Streff, Kevin
    [J]. PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4702 - 4702
  • [5] Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions
    Tann, Wesley
    Liu, Yuancheng
    Sim, Jun Heng
    Seah, Choon Meng
    Chang, Ee-Chien
    [J]. arXiv, 2023,
  • [6] The Challenges of Privacy by Design
    Spiekermann, Sarah
    [J]. COMMUNICATIONS OF THE ACM, 2012, 55 (07) : 38 - 40
  • [7] Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges
    Ari, Ado Adamou Abba
    Ngangmo, Olga Kengni
    Titouna, Chafiq
    Thiare, Ousmane
    Kolyang
    Mohamadou, Alidou
    Gueroui, Abdelhak Mourad
    [J]. APPLIED COMPUTING AND INFORMATICS, 2024, 20 (1/2) : 119 - 141
  • [8] Adaptive Information Security and Privacy
    Nuseibeh, Bashar
    [J]. 2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 17 - 17
  • [9] Security and privacy in the information economy
    Feigenbaum, J
    Rudich, S
    Blaze, M
    McCurley, K
    [J]. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 1997, 94 (07) : 2789 - 2792
  • [10] Remotizing and Virtualizing Chips and Circuits for Hardware-based Capture-the-Flag Challenges
    Roascio, Gianluca
    Cerini, Samuele Yves
    Prinetto, Paolo
    [J]. 7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022), 2022, : 477 - 485