Design and Use of Privacy Capture-the-Flag Challenges in an Introductory Class on Information Privacy and Security

被引:0
|
作者
Vigl, Wolfgang [1 ]
Abramova, Svetlana [1 ]
机构
[1] Univ Innsbruck, Dept Comp Sci, Innsbruck, Austria
关键词
Privacy; Capture-The-Flag; CTF; Education; Cybersecurity; Student engagement; DE-ANONYMIZATION; MODEL;
D O I
10.1145/3649217.3653572
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the advancement of data-intensive technologies and online tracking opportunities, education on privacy is becoming a bigger priority in cybersecurity curricula. Owing to its multidimensional and context-dependent nature, privacy and its protection goals can be introduced to computer science students as collective efforts of system designers to enable data protection, user's informational control, and privacy-preserving data sharing with third parties. Since engaging course participants into hands-on and gamified exercises is generally known to enhance learning experience and effect, we adopted the teaching practice of using Capture-the-Flag (CTF) security challenges and validated its applicability in the privacy education domain. This work presents a pioneering set of 8 CTF-style tasks intentionally designed for the study and demonstration of handpicked privacy concepts, techniques, and attacks. Drawing upon both quantitative and qualitative feedback collected from 27 course participants, this format of homework exercises is found to increase students' confidence in this knowledge domain and perceived as an enjoyable, motivating, and engaging way of learning about information privacy.
引用
收藏
页码:618 / 624
页数:7
相关论文
共 50 条
  • [21] Security and Privacy Challenges in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    [J]. PROCEEDINGS OF THE 2018 CYBER RESILIENCE CONFERENCE (CRC), 2018,
  • [22] Security and privacy challenges in smart cities
    Braun, Trevor
    Fung, Benjamin C. M.
    Iqbal, Farkhund
    Shah, Babar
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2018, 39 : 499 - 507
  • [23] Security and Privacy Challenges in Big Data
    Wadhwa, Bhawna
    Tomar, Parul
    [J]. PROCEEDINGS OF THIRD DOCTORAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE, DOSCI 2022, 2023, 479 : 821 - 837
  • [24] On the Security and Privacy Challenges of Virtual Assistants
    Bolton, Tom
    Dargahi, Tooska
    Belguith, Sana
    Al-Rakhami, Mabrook S.
    Sodhro, Ali Hassan
    [J]. SENSORS, 2021, 21 (07)
  • [25] Security and Privacy by Declarative Design
    Maffei, Matteo
    Pecina, Kim
    Reinert, Manuel
    [J]. 2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 81 - 96
  • [26] Privacy and security by design: Comparing the EU and Israeli approaches to embedding privacy and security
    Haber, Eldar
    Tamo-Larrieux, Aurelia
    [J]. COMPUTER LAW & SECURITY REVIEW, 2020, 37
  • [27] Digital Training for Cybersecurity in Industrial Fields via virtual labs and Capture-The-Flag challenges
    Karampidis, Konstantinos
    Panagiotakis, Spyros
    Vasilakis, Manos
    Lamari, Agapi Tsironi
    Markakis, Evangelos
    Papadourakis, Giorgos
    [J]. 2023 32ND ANNUAL CONFERENCE OF THE EUROPEAN ASSOCIATION FOR EDUCATION IN ELECTRICAL AND INFORMATION ENGINEERING, EAEEIE, 2023, : 156 - 161
  • [28] Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges
    Alzoubi, Yehia Ibrahim
    Al-Ahmad, Ahmad
    Kahtan, Hasan
    Jaradat, Ashraf
    [J]. FUTURE INTERNET, 2022, 14 (07):
  • [29] Security and privacy in emerging information technologies
    Lin, Xiaodong
    Liu, Jianwei
    Gritzalis, Stefanos
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (01) : 1 - 2
  • [30] The Economics of Information Security and Privacy.
    Greenstein, Shane
    [J]. JOURNAL OF ECONOMIC LITERATURE, 2014, 52 (04) : 1177 - 1178