Development of Network Cyber Attack Training Curriculum for Security Staff

被引:0
|
作者
Kim, Guk-Il [1 ]
Kim, Jonghyeon [2 ]
机构
[1] Ajou Univ, Grad Sch Informat & Commun Technol, Suwon, South Korea
[2] Ajou Univ, Informat & Commun Technol, Suwon, South Korea
关键词
Network cyber attack training; Security information; VIRTUALIZATION ENVIRONMENT; SYSTEM;
D O I
10.1007/978-981-10-7605-3_35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the frequency of cyber attacks targeting the information assets of firms or institutions is continuously increasing. Although there are measures such as reinforcement of security policies, regulations, information protection organizations and physical security in addition to replacement of security equipments for protecting the assets, the core of the cyber security is responding to the security breaches. For this reason, producing well-trained security personnel (computer emergency responders) is essential. Although there are many publications dealing with the theories of cyber security, the learning materials that can be referred by the security personnel mainly for practices are somehow in short supply. Thus, in this study, a curriculum for network cyber attack training has been developed for the security personnel. The curriculum focuses on actual implementation of network-attacking environments, simulated attacking methods, attack pattern analysis and countermeasures.
引用
收藏
页码:210 / 214
页数:5
相关论文
共 50 条
  • [11] Security Requirement for Cyber Attack Traceback
    Ryu, Jongho
    Na, Jungchan
    NCM 2008: 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 653 - 658
  • [12] Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities
    Zhou, Buxiang
    Sun, Binjie
    Zang, Tianlei
    Cai, Yating
    Wu, Jiale
    Luo, Huan
    ENTROPY, 2023, 25 (01)
  • [13] Cyber Security Training A Survey of Serious Games in Cyber Security
    Tioh, Jin-Ning
    Mina, Mani
    Jacobson, Douglas W.
    2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [14] Game Based Cyber Security Training: are Serious Games suitable for cyber security training?
    Hendrix, Maurice
    Al-Sherbaz, Ali
    Bloom, Victoria
    INTERNATIONAL JOURNAL OF SERIOUS GAMES, 2016, 3 (01): : 53 - 61
  • [15] AAG: A Model for Attack Behavior Judgment in CTF-style Cyber Security Training
    Liu, Zimian
    Qiu, Han
    Zhu, Junhu
    Zeng, Ziyi
    PROCEEDINGS OF 2019 IEEE 10TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2019), 2019, : 54 - 58
  • [16] Automotive Connectivity, Cyber Attack Scenarios and Automotive Cyber Security
    Haas, Roland E.
    Moeller, Dietmar P. F.
    2017 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2017, : 635 - 639
  • [17] A Data Mining Framework to Predict Cyber Attack for Cyber Security
    Rahman, Md Anisur
    Al-Saggaf, Yeslam
    Zia, Tanveer
    PROCEEDINGS OF THE 15TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2020), 2020, : 207 - 212
  • [18] Cyber Security Risk Assessment of a DDoS Attack
    Wangen, Gaute
    Shalaginov, Andrii
    Hallstensen, Christoffer
    INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 183 - 202
  • [19] Effects of cyber security knowledge on attack detection
    Ben-Asher, Noam
    Gonzalez, Cleotilde
    COMPUTERS IN HUMAN BEHAVIOR, 2015, 48 : 51 - 61
  • [20] Cyber security basic defenses and attack trends
    Cardenas, Alvaro A.
    Roosta, Tanya
    Taban, Gelareh
    Sastry, Shankar
    HOMELAND SECURITY TECHNOLOGY CHALLENGES: FROM SENSING AND ENCRYPTING TO MINING AND MODELING, 2008, : 73 - +