Cyber Range CYBERIUM for Training Security Meisters to Deal with Cyber Attacks

被引:0
|
作者
Hara, Kazuhiro [1 ]
机构
[1] Fujitsu Ltd, Tokyo, Japan
来源
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Customer systems today are constantly exposed to the threat of cyber attacks. To protect customer businesses in this age, the capability to respond to cyber attacks on customer systems and minimize damage is key. Fujitsu addresses this issue by training Security Meisters, who are human resources capable of responding to cyber attacks. To improve response capabilities against cyber attacks, it is useful to train in a cyber range, a virtual environment that allows trainees to experience simulated cyber attacks. With existing cyber ranges, however, it was difficult to reproduce a wide range of systems and difficult for system engineers in different locations of the country to use them on demand. In response, Fujitsu developed CYBERIUM, a cyber range in which various systems can be reproduced in a virtual environment where trainees can learn online without time or location constraints. This paper describes the usefulness of CYBERIUM.
引用
收藏
页码:59 / 63
页数:5
相关论文
共 50 条
  • [1] Cyber range cyberium for training security meisters to deal with cyber attacks
    Hara, Kazuhiro
    [J]. Fujitsu Scientific and Technical Journal, 2019, 55 (05): : 59 - 63
  • [2] Cyber range design framework for cyber security education and training
    Katsantonis, M. N.
    Manikas, A.
    Mavridis, I.
    Gritzalis, D.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 1005 - 1027
  • [3] Cyber range design framework for cyber security education and training
    M. N. Katsantonis
    A. Manikas
    I. Mavridis
    D. Gritzalis
    [J]. International Journal of Information Security, 2023, 22 : 1005 - 1027
  • [4] Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective
    Somarakis, Iason
    Smyrlis, Michail
    Fysarakis, Konstantinos
    Spanoudakis, George
    [J]. COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 172 - 184
  • [5] AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research
    Leitner, Maria
    Frank, Maximilian
    Hotwagner, Wolfgang
    Langner, Gregor
    Maurhart, Oliver
    Pahi, Timea
    Reuter, Lenhard
    Skopik, Florian
    Smith, Paul
    Warum, Manuel
    [J]. EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,
  • [6] Contagion in cyber security attacks
    Baldwin, Adrian
    Gheyas, Iffat
    Ioannidis, Christos
    Pym, David
    Williams, Julian
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2017, 68 (07) : 780 - 791
  • [7] Cyber range scenario for smart grid security training
    Lieskovan, Tomas
    Kohout, David
    Frolka, Jakub
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2023, 140 (05): : 452 - 459
  • [8] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    [J]. 2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [9] Game Based Cyber Security Training: are Serious Games suitable for cyber security training?
    Hendrix, Maurice
    Al-Sherbaz, Ali
    Bloom, Victoria
    [J]. INTERNATIONAL JOURNAL OF SERIOUS GAMES, 2016, 3 (01): : 53 - 61
  • [10] CYBER ATTACKS - UNPRECEDENTED THREAT TO SECURITY
    Repez, Filofteia
    Deaconu, Gheorghe
    [J]. PROCEEDINGS INTERNATIONAL CONFERENCE MILITARY SCIENCE UNIVERSE, SELECTED PAPERS, 2011, : 446 - 450