All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F17%3A00094479" target="_blank" >RIV/00216224:14610/17:00094479 - isvavai.cz</a>

  • Result on the web

    <a href="https://is.muni.cz/repo/1391675/2017-FIE-lessons-learned-exercises-cyber-range-paper.pdf" target="_blank" >https://is.muni.cz/repo/1391675/2017-FIE-lessons-learned-exercises-cyber-range-paper.pdf</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/FIE.2017.8190713" target="_blank" >10.1109/FIE.2017.8190713</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range

  • Original language description

    We need more skilled cybersecurity professionals because the number of cyber threats and ingenuity of attackers is ever growing. Knowledge and skills required for cyber defence can be developed and exercised by lectures and lab sessions, or by active learning, which is seen as a promising and attractive alternative. In this paper, we present experience gained from the preparation and execution of cyber defence exercises involving various participants in a cyber range. The exercises follow a Red vs. Blue team format, in which the Red team conducts malicious activities against emulated networks and systems that have to be defended by Blue teams of learners. Although this exercise format is popular and used worldwide by numerous organizers in practice, it has been sparsely researched. We contribute to the topic by describing the general exercise life cycle, covering the exercise's development, dry run, execution, evaluation, and repetition. Each phase brings several challenges that exercise organizers have to deal with. We present lessons learned that can help organizers to prepare, run and repeat successful events systematically, with lower effort and costs, and avoid a trial-and-error approach that is often used.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

    <a href="/en/project/VI20162019014" target="_blank" >VI20162019014: Simulation, detection, and mitigation of cyber threats endangering critical infrastructure</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2017

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    2017 IEEE Frontiers in Education Conference

  • ISBN

    9781509059195

  • ISSN

    1539-4565

  • e-ISSN

  • Number of pages

    8

  • Pages from-to

    1-8

  • Publisher name

    IEEE

  • Place of publication

    Indianapolis, IN, USA

  • Event location

    Indianapolis, USA

  • Event date

    Jan 1, 2017

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000426974900279