A personalized learning theory-based cyber-security training exercise

被引:3
|
作者
Chowdhury, Nabin [1 ]
Gkioulos, Vasileios [1 ]
机构
[1] Norwegian Univ Sci & Technol NTNU, Teknologivegen 22, N-2815 Gjovik, Norway
关键词
Cyber-security; Personalized learning theory; Video game; Table-top; RECOMMENDATIONS; MOTIVATION;
D O I
10.1007/s10207-023-00704-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current enterprises' needs for skilled cyber-security (CS) professionals have prompted the development of diverse CS training programs and offerings. It has been noted that even though enterprise staff is now more aware of security threats, the number of successful attacks against companies has all but decreased over the years. Several criticisms were raised against current CS training offerings, which often made them inadequate, or unable to change participants' behavior and security attitude. One of the main factors CS training programs are often not very effective is the lack of engagement or motivation of participants. This is often the result of training not being tailored to the needs or preferences of participants. In our previous work, we tackled this issue by developing a personalized learning theory-based model for developing CS training frameworks. In this work, we utilize the model to develop two CS training exercises: two game-based scenarios using the CS training video game Cyber CIEGE and one table-top team exercise. The exercises are later tested by involving a group of 12 students from the Norwegian Institute of Science and Technology (NTNU) Information Security master's degree program. According to the results of the experiment and the feedback from the students, students felt more engaged during the exercises due to having been participants in their development process. This has in turn motivated them to continue using the training tools independently in their spare time. Further research is recommended to establish whether the training development model is adequate for different target groups, as well as better performing than other models when developing full-fledged training programs.
引用
收藏
页码:1531 / 1546
页数:16
相关论文
共 50 条
  • [31] A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning
    Panfili, Martina
    Giuseppi, Alessandro
    Fiaschetti, Andrea
    Al-Jibreen, Homoud B.
    Pietrabissa, Antonio
    Priscoli, Francesco Delli
    2018 26TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2018, : 460 - 465
  • [32] Optimizing Training using Information Theory-Based Curriculum Learning Factory
    Ghebrechristos, Henok
    Alaghband, Gita
    2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, : 1525 - 1530
  • [33] Game Theory with Learning for Cyber Security Monitoring
    Chung, Keywhan
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Kalbarczyk, Zbigniew T.
    Iyer, Ravishankar K.
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE), 2016, : 1 - 8
  • [34] MEMORABLE: A Multi-playEr custoMisable seriOus Game fRAmework for cyBer-security LEarning
    Wang, Jingyun
    Hodgson, Ryan
    Cristea, Alexandra, I
    INTELLIGENT TUTORING SYSTEMS, ITS 2022, 2022, 13284 : 313 - 322
  • [35] Machine Learning: The Cyber-Security, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications
    Guo, Kehua
    Tan, Zhiyuan
    Luo, Entao
    Zhou, Xiaokang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [36] Machine Learning: The Cyber-Security, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications
    Guo, Kehua
    Tan, Zhiyuan
    Luo, Entao
    Zhou, Xiaokang
    Security and Communication Networks, 2021, 2021
  • [37] A Hybrid Federated Learning Framework and Multi-Party Communication for Cyber-Security Analysis
    Alqurashi, Fahad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 146 - 157
  • [38] Distributed Observer-Based Cyber-Security Control of Complex Dynamical Networks
    Wan, Ying
    Cao, Jinde
    Chen, Guanrong
    Huang, Wei
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2017, 64 (11) : 2966 - 2975
  • [39] A Comparison of Cyber-Security Oriented Testbeds for IoT-Based Smart Grids
    Gunduz, Muhammet Zekeriya
    Das, Resul
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 85 - 90
  • [40] IoT-based Cyber-security of Drones using the Naive Bayes Algorithm
    Majeed, Rizwan
    Abdullah, Nurul Azma
    Mushtaq, Muhammad Faheem
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (07) : 422 - 427