This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Winning Cybersecurity One Challenge at a Time
July-Aug. 2012 (vol. 10 no. 4)
pp. 75-79
Efstratios Gavas, Polytechnic Institute of New York University
Nasir Memon, Polytechnic Institute of New York University
Douglas Britton, SecureIT Consulting Group
Cybersecurity challenges, such as capture-the-flag competitions, test multidisciplinary teams' security and hacking skills. Besides appealing to hackers' competitive nature, participation in these events has become essential to developing successful cybersecurity professionals. Competitors benefit by experiencing the adversarial nature of live cyberincidents akin to traditional military and law enforcement training. Industry, government, and academia benefit by using these competitions for training and to spot emerging talent.

1. E. Beidel and S. Magnuson, “Government, Military Face Severe Shortage of Cybersecurity Experts,” Nat'l Defense Magazine, Aug. 2011; www.nationaldefensemagazine.org/archive/ 2011/August/PagesGovernment,MilitaryFaceSevereShortageOfCybersecurityExperts.aspx .
2. “Challenge-Based Learning: An Approach for Our Time,” New Media Consortium, 9 Mar. 2009; http://archive.nmc.org/node6910.
3. G. Conti, “Introduction,” Comm. ACM, June 2006, pp. 32–36; http://doi.acm.org/10.11451132469.1132497 .
4. W. Adams et al., “Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives,” Proc. 2nd Conf. Cyber Security Experimentation and Test, Usenix Assoc., 2009, p. 2; http://portal.acm.orgcitation.cfm?id=1855481.1855483 .
5. A. Clements, “Constructing a Computing Competition to Teach Teamwork,” Proc. 33 Ann. Conf. Frontiers in Education, vol. 2, IEEE, 2003, pp. 1–6.
6. A. Conklin, “Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course,” Proc. 39th Ann. Hawaii Int'l Conf. System Sciences (HICSS 06), vol. 9, IEEE CS, 2006, p. 220b.
7. O. Gotel et al., “A Global and Competition-Based Model for Fostering Technical and Soft Skills in Software Engineering Education,” Proc. 22nd Conf. Software Eng. Education and Training (CSEET 09), IEEE CS, 2009, pp. 271–278.
8. R.J. Machado et al., “From a Student Competition to the Promotion of Real-World Programming Education,” Proc. 39th Ann. Frontiers in Education Conf., IEEE CS, 2009, pp. 1–2.
1. Psifertex, “Maximum CTF: Getting the Most Out of Capture the Flag,” DEFCON 17 presentation, July 2009; www.youtube.comwatch?v=V6hhlvbMFlY.
2. N. Childers et al., “Organizing Large Scale Hacking Competitions,” Proc. 7th Int'l Conf. Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 10), Springer, 2010, pp. 132–152.

Index Terms:
cybersecurity,capture the flag,computer security
Citation:
Efstratios Gavas, Nasir Memon, Douglas Britton, "Winning Cybersecurity One Challenge at a Time," IEEE Security & Privacy, vol. 10, no. 4, pp. 75-79, July-Aug. 2012, doi:10.1109/MSP.2012.112
Usage of this product signifies your acceptance of the Terms of Use.