A personalized learning theory-based cyber-security training exercise

被引:3
|
作者
Chowdhury, Nabin [1 ]
Gkioulos, Vasileios [1 ]
机构
[1] Norwegian Univ Sci & Technol NTNU, Teknologivegen 22, N-2815 Gjovik, Norway
关键词
Cyber-security; Personalized learning theory; Video game; Table-top; RECOMMENDATIONS; MOTIVATION;
D O I
10.1007/s10207-023-00704-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current enterprises' needs for skilled cyber-security (CS) professionals have prompted the development of diverse CS training programs and offerings. It has been noted that even though enterprise staff is now more aware of security threats, the number of successful attacks against companies has all but decreased over the years. Several criticisms were raised against current CS training offerings, which often made them inadequate, or unable to change participants' behavior and security attitude. One of the main factors CS training programs are often not very effective is the lack of engagement or motivation of participants. This is often the result of training not being tailored to the needs or preferences of participants. In our previous work, we tackled this issue by developing a personalized learning theory-based model for developing CS training frameworks. In this work, we utilize the model to develop two CS training exercises: two game-based scenarios using the CS training video game Cyber CIEGE and one table-top team exercise. The exercises are later tested by involving a group of 12 students from the Norwegian Institute of Science and Technology (NTNU) Information Security master's degree program. According to the results of the experiment and the feedback from the students, students felt more engaged during the exercises due to having been participants in their development process. This has in turn motivated them to continue using the training tools independently in their spare time. Further research is recommended to establish whether the training development model is adequate for different target groups, as well as better performing than other models when developing full-fledged training programs.
引用
收藏
页码:1531 / 1546
页数:16
相关论文
共 50 条
  • [1] A personalized learning theory-based cyber-security training exercise
    Nabin Chowdhury
    Vasileios Gkioulos
    International Journal of Information Security, 2023, 22 : 1531 - 1546
  • [2] Cyber-Security Training Evaluation Metrics
    Koutsouris, Nikolaos
    Vassilakis, Costas
    Kolokotronis, Nicholas
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 192 - 197
  • [3] Enabling Practical Experimentation in Cyber-Security Training
    Mao, Jian
    Chua, Zheng Leong
    Liang, Zhenkai
    2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 516 - 517
  • [4] Adapting Cyber-Security Training to Your Employees
    Pattinson, M.
    Butavicius, M.
    Ciccarello, B.
    Lillie, M.
    Parsons, K.
    Calic, D.
    McCormac, A.
    PROCEEDINGS OF THE TWELFTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2018), 2018, : 67 - 79
  • [5] A theory of actor-network for cyber-security
    Balzacq, Thierry
    Cavelty, Myriam Dunn
    EUROPEAN JOURNAL OF INTERNATIONAL SECURITY, 2016, 1 (02) : 176 - 198
  • [6] Cyber-security and reinforcement learning - A brief survey
    Adawadkar, Amrin Maria Khan
    Kulkarni, Nilima
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2022, 114
  • [7] EXPLORING THE EFFECT OF TRAINING ON REALIZING EFFECTIVE CYBER-SECURITY
    Saravanos, A.
    Curinga, M.
    Auchter, K.
    INTED2017: 11TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2017, : 9762 - 9762
  • [8] The THREAT-ARREST Cyber-Security Training Platform
    Soultatos, Othonas
    Fysarakis, Konstantinos
    Spanoudakis, George
    Koshutanski, Hristo
    Damiani, Ernesto
    Beckers, Kristian
    Wortmann, Dirk
    Bravos, George
    Ioannidis, Menelaos
    COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 199 - 214
  • [9] Hybrid Cyber-Security Model for Attacks Detection Based on Deep and Machine Learning
    Naser, Shaymaa Mahmood
    Ali, Yossra Hussain
    Obe, Dhiya Al-Jumeily
    INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2022, 18 (11) : 17 - 30
  • [10] Learning from Others' Mistakes: An Analysis of Cyber-security Incidents
    Abbiati, Giovanni
    Ranise, Silvio
    Schizzerotto, Antonio
    Siena, Alberto
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS 2019), 2019, : 299 - 306