6
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges

      Preprint
      , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Capture the Flag challenges are a popular form of cybersecurity education, where students solve hands-on tasks in an informal, game-like setting. The tasks feature diverse assignments, such as exploiting websites, cracking passwords, and breaching unsecured networks. However, it is unclear how the skills practiced by these challenges match formal cybersecurity curricula defined by security experts. We explain the significance of Capture the Flag challenges in cybersecurity training and analyze their 15,963 textual solutions collected since 2012. Based on keywords in the solutions, we map them to well-established ACM/IEEE curricular guidelines to understand which skills the challenges teach. We study the distribution of cybersecurity topics, their variance in different challenge formats, and their development over the past years. The analysis showed the prominence of technical knowledge about cryptography and network security, but human aspects, such as social engineering and cybersecurity awareness, are neglected. We discuss the implications of these results and relate them to contemporary literature. Our results indicate that future Capture the Flag challenges should include non-technical aspects to address the current advanced cyber threats and attract a broader audience to cybersecurity.

          Related collections

          Author and article information

          Journal
          05 January 2021
          Article
          10.1016/j.cose.2020.102154
          2101.01421
          cba0e80f-7fa3-4035-a27a-04fef816e0e7

          http://creativecommons.org/licenses/by-nc-nd/4.0/

          History
          Custom metadata
          Published in Elsevier Computers & Security, see https://www.sciencedirect.com/science/article/pii/S0167404820304272 (first available online on December 27, 2020). The article has 32 pages (in the preprint template), 9 figures, and 4 tables
          cs.CR

          Security & Cryptology
          Security & Cryptology

          Comments

          Comment on this article