Development of Network Cyber Attack Training Curriculum for Security Staff

被引:0
|
作者
Kim, Guk-Il [1 ]
Kim, Jonghyeon [2 ]
机构
[1] Ajou Univ, Grad Sch Informat & Commun Technol, Suwon, South Korea
[2] Ajou Univ, Informat & Commun Technol, Suwon, South Korea
关键词
Network cyber attack training; Security information; VIRTUALIZATION ENVIRONMENT; SYSTEM;
D O I
10.1007/978-981-10-7605-3_35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the frequency of cyber attacks targeting the information assets of firms or institutions is continuously increasing. Although there are measures such as reinforcement of security policies, regulations, information protection organizations and physical security in addition to replacement of security equipments for protecting the assets, the core of the cyber security is responding to the security breaches. For this reason, producing well-trained security personnel (computer emergency responders) is essential. Although there are many publications dealing with the theories of cyber security, the learning materials that can be referred by the security personnel mainly for practices are somehow in short supply. Thus, in this study, a curriculum for network cyber attack training has been developed for the security personnel. The curriculum focuses on actual implementation of network-attacking environments, simulated attacking methods, attack pattern analysis and countermeasures.
引用
收藏
页码:210 / 214
页数:5
相关论文
共 50 条
  • [1] Network security modeling and cyber attack simulation methodology
    Chi, SD
    Park, JS
    Jung, KC
    Lee, JS
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 320 - 333
  • [2] Cyber attack modeling and simulation for network security analysis
    Kuhl, Michael E.
    Kistner, Jason
    Costantini, Kevin
    Sudit, Moises
    PROCEEDINGS OF THE 2007 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2007, : 1159 - +
  • [3] Development of Cyber Attack Model for Private Network
    Al-Amin, Mostafa
    Khatun, Mirza Akhi
    Nasir Uddin, Mohammed
    Proceedings - 2022 2nd International Conference on Interdisciplinary Cyber Physical Systems, ICPS 2022, 2022, : 216 - 221
  • [4] Development Approach to the Attack Modeling for the Needs of Cyber Security Education
    Ivanc, Blaz
    Blazic, Borka Jerman
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 216 - 220
  • [5] Detectable and Undetectable Network Attack Security of Cyber-physical Systems
    Lima, Public M.
    Carvalho, Lilian K.
    Moreira, Marcos V.
    IFAC PAPERSONLINE, 2018, 51 (07): : 179 - 185
  • [6] Development of cyber information security education and training system
    Bong-Hyun Kim
    Ki-Chan Kim
    Sung-Eon Hong
    Sang-Young Oh
    Multimedia Tools and Applications, 2017, 76 : 6051 - 6064
  • [7] Career Development in Cyber Security: Bootcamp Training Programs
    Caliskan, Emin
    Vaarandi, Risto
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 503 - 511
  • [8] Development of cyber information security education and training system
    Kim, Bong-Hyun
    Kim, Ki-Chan
    Hong, Sung-Eon
    Oh, Sang-Young
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (04) : 6051 - 6064
  • [9] Design and Development of IOT Testbed with DDoS Attack for Cyber Security Research
    Arthi, R.
    Krishnaveni, S.
    ICSPC'21: 2021 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICPSC), 2021, : 586 - 590
  • [10] An Analysis of Cyber Security Attack Taxonomies
    Derbyshire, Richard
    Green, Benjamin
    Prince, Daniel
    Mauthe, Andreas
    Hutchison, David
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 153 - 161