Cyber-Security Training Evaluation Metrics

被引:4
|
作者
Koutsouris, Nikolaos [1 ]
Vassilakis, Costas [1 ]
Kolokotronis, Nicholas [1 ]
机构
[1] Univ Peloponnese, Dept Informat & Telecommun, Tripolis 22131, Greece
基金
欧盟地平线“2020”;
关键词
Cyber-security training; Cyber-ranges; Evaluation; Scoring; Gamification; AWARENESS PROGRAM;
D O I
10.1109/CSR51186.2021.9527946
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-security training has evolved into an imperative need, aiming to provide cyber-security professionals with the knowledge and skills required to confront cyber-attacks that are increasing in number and sophistication. Training activities are typically associated with evaluation means, aimed to assess the extent to which the trainee has acquired the knowledge and skills whose development is targeted by the training programme, while cyber-security awareness and skill level evaluation means may be used to support additional security-related aspects of organizations. In this paper, we review trainee performance assessment metrics in cyber-security training, aiming to assist designers of cyber-security training activities to identify the most prominent trainee performance assessment means for their training programmes, while additional research directions involving cyber-security training evaluation metrics are also identified.
引用
收藏
页码:192 / 197
页数:6
相关论文
共 50 条
  • [1] Enabling Practical Experimentation in Cyber-Security Training
    Mao, Jian
    Chua, Zheng Leong
    Liang, Zhenkai
    [J]. 2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 516 - 517
  • [2] Adapting Cyber-Security Training to Your Employees
    Pattinson, M.
    Butavicius, M.
    Ciccarello, B.
    Lillie, M.
    Parsons, K.
    Calic, D.
    McCormac, A.
    [J]. PROCEEDINGS OF THE TWELFTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2018), 2018, : 67 - 79
  • [3] The THREAT-ARREST Cyber-Security Training Platform
    Soultatos, Othonas
    Fysarakis, Konstantinos
    Spanoudakis, George
    Koshutanski, Hristo
    Damiani, Ernesto
    Beckers, Kristian
    Wortmann, Dirk
    Bravos, George
    Ioannidis, Menelaos
    [J]. COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 199 - 214
  • [4] EXPLORING THE EFFECT OF TRAINING ON REALIZING EFFECTIVE CYBER-SECURITY
    Saravanos, A.
    Curinga, M.
    Auchter, K.
    [J]. INTED2017: 11TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE, 2017, : 9762 - 9762
  • [5] Social Cyber-Security
    Carley, Kathleen M.
    Cervone, Guido
    Agarwal, Nitin
    Liu, Huan
    [J]. SOCIAL, CULTURAL, AND BEHAVIORAL MODELING, SBP-BRIMS 2018, 2018, 10899 : 389 - 394
  • [6] REGULATING CYBER-SECURITY
    Sales, Nathan Alexander
    [J]. NORTHWESTERN UNIVERSITY LAW REVIEW, 2013, 107 (04) : 1503 - 1568
  • [7] Cyber-security threat
    Klebba, Jesse
    [J]. CHEMISTRY & INDUSTRY, 2017, 81 (10) : 9 - 9
  • [8] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    [J]. ERCIM NEWS, 2015, (100): : 10 - 11
  • [9] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    [J]. BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [10] CYBER-SECURITY RISKS OF FEDWIRE
    Bilger, Mark J.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2019, 14 (04)