Title :
Exploring a national cybersecurity exercise for universities
Author :
Hoffman, Lance J. ; Rosenberg, Tim ; Dodge, Ronald ; Gsdale, And Aniel
Author_Institution :
George Washington Univ., Washington, DC, USA
Abstract :
In cybersecurity competitions, participants either create new or protect preconfigured information systems and then defend these systems against attack in a real-world setting. Institutions should consider important structural and resource-related issues before establishing such a competition. Critical infrastructures increasingly rely on information systems and on the Internet to provide connectivity between systems. Maintaining and protecting these systems requires an education in information warfare that doesn´t merely theorize and describe such concepts. A hands-on, active learning experience lets students apply theoretical concepts in a physical environment. Craig Kaucher and John Saunders found that even for management-oriented graduate courses in information assurance, such an experience enhances the students´ understanding of theoretical concepts. Cybersecurity exercises aim to provide this experience in a challenging and competitive environment. Many educational institutions use and implement these exercises as part of their computer science curriculum, and some are organizing competitions with commercial partners as capstone exercises, ad hoc hack-a-thons, and scenario-driven, multiday, defense-only competitions. Participants have exhibited much enthusiasm for these exercises, from the DEFCON capture-the-flag exercise to the US Military Academy´s Cyber Defense Exercise (CDX). In February 2004, the US National Science Foundation sponsored the Cyber Security Exercise Workshop aimed at harnessing this enthusiasm and interest. The educators, students, and government and industry representatives attending the workshop discussed the feasibility and desirability of establishing regular cybersecurity exercises for postsecondary-level students. This article summarizes the workshop report.
Keywords :
computer science education; educational computing; educational courses; educational institutions; information systems; security of data; Internet; computer science curriculum; cybersecurity competitions; hands-on active learning; information systems; information warfare; national cybersecurity exercise; universities; Computer science; Computer security; Defense industry; Educational institutions; Government; Information systems; Internet; Military computing; Organizing; Protection; IA security; IA training; cyber exercises; cyber security;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2005.120