A personalized learning theory-based cyber-security training exercise

被引:3
|
作者
Chowdhury, Nabin [1 ]
Gkioulos, Vasileios [1 ]
机构
[1] Norwegian Univ Sci & Technol NTNU, Teknologivegen 22, N-2815 Gjovik, Norway
关键词
Cyber-security; Personalized learning theory; Video game; Table-top; RECOMMENDATIONS; MOTIVATION;
D O I
10.1007/s10207-023-00704-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current enterprises' needs for skilled cyber-security (CS) professionals have prompted the development of diverse CS training programs and offerings. It has been noted that even though enterprise staff is now more aware of security threats, the number of successful attacks against companies has all but decreased over the years. Several criticisms were raised against current CS training offerings, which often made them inadequate, or unable to change participants' behavior and security attitude. One of the main factors CS training programs are often not very effective is the lack of engagement or motivation of participants. This is often the result of training not being tailored to the needs or preferences of participants. In our previous work, we tackled this issue by developing a personalized learning theory-based model for developing CS training frameworks. In this work, we utilize the model to develop two CS training exercises: two game-based scenarios using the CS training video game Cyber CIEGE and one table-top team exercise. The exercises are later tested by involving a group of 12 students from the Norwegian Institute of Science and Technology (NTNU) Information Security master's degree program. According to the results of the experiment and the feedback from the students, students felt more engaged during the exercises due to having been participants in their development process. This has in turn motivated them to continue using the training tools independently in their spare time. Further research is recommended to establish whether the training development model is adequate for different target groups, as well as better performing than other models when developing full-fledged training programs.
引用
收藏
页码:1531 / 1546
页数:16
相关论文
共 50 条
  • [21] Detection of Botnet using deep learning algorithm: application of machine learning in cyber-security
    Sivakumar, A.
    Rubia, J. Jency
    Vijayan, Hima
    Sivakumaran, C.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 213 - 222
  • [22] Cyber-Security Incident Analysis by Causal Analysis using System Theory (CAST)
    Kaneko, Tomoko
    Yoshioka, Nobukazu
    Sasaki, Ryoichi
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 806 - 815
  • [23] Game Based Cyber Security Training: are Serious Games suitable for cyber security training?
    Hendrix, Maurice
    Al-Sherbaz, Ali
    Bloom, Victoria
    INTERNATIONAL JOURNAL OF SERIOUS GAMES, 2016, 3 (01): : 53 - 61
  • [24] Training Cyber Security Exercise Facilitator: Behavior Modeling Based on Human Error
    Taniuchi, Shiho
    Aoyama, Tomomi
    Asai, Haruna
    Koshijima, Ichiro
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, AHFE 2018, 2019, 782 : 138 - 148
  • [25] Anomaly Detection for Cyber-Security Based on Convolution Neural Network : A survey
    Alabadi, Montdher
    Celik, Yuksel
    2ND INTERNATIONAL CONGRESS ON HUMAN-COMPUTER INTERACTION, OPTIMIZATION AND ROBOTIC APPLICATIONS (HORA 2020), 2020, : 558 - 571
  • [26] Supporting Cyber-Security Based on Hardware-Software Interface Definition
    Macher, Georg
    Sporer, Harald
    Brenner, Eugen
    Kreiner, Christian
    SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT, EUROSPI 2016, 2016, 633 : 148 - 159
  • [27] An Economic-based Cyber-security Framework for Identifying Critical Assets
    Yan, Jie
    Bo, Rui
    Ni, Ming
    2014 IEEE PES GENERAL MEETING - CONFERENCE & EXPOSITION, 2014,
  • [28] Employee Cyber-Security Awareness Training (CSAT) Programs in Ireland's Financial Institutions
    Jouaibi, Reda
    Gaylard, Aisling Keenan
    Lee, Brian
    2022 CYBER RESEARCH CONFERENCE - IRELAND (CYBER-RCI), 2022, : 87 - 90
  • [29] Security Challenges in Energy Flexibility Markets: A Threat Modelling-Based Cyber-Security Analysis
    Afzal, Zeeshan
    Ekstedt, Mathias
    Mueller, Nils
    Mukherjee, Preetam
    ELECTRONICS, 2024, 13 (22)
  • [30] A future prediction for cyber-attacks in the network domain with the visualisation of patterns in cyber-security tickets with machine learning
    Sivajothi, E.
    Diana, S. Mary
    Rekha, M.
    Lincy, R. Babitha
    Damodharan, P.
    Rubia, J. Jency
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (05) : 648 - 661