Winning cybersecurity one challenge at a time

Efstratios Gavas, Nasir Memon, Douglas Britton

Research output: Contribution to journalArticle

Abstract

Cybersecurity challenges, such as capture-the-flag competitions, test multidisciplinary teams' security and hacking skills. Besides appealing to hackers' competitive nature, participation in these events has become essential to developing successful cybersecurity professionals. Competitors benefit by experiencing the adversarial nature of live cyberincidents akin to traditional military and law enforcement training. Industry, government, and academia benefit by using these competitions for training and to spot emerging talent.

Original languageEnglish (US)
Article number6265104
Pages (from-to)75-79
Number of pages5
JournalIEEE Security and Privacy
Volume10
Issue number4
DOIs
StatePublished - 2012

Fingerprint

hacker
Law enforcement
law enforcement
Military
participation
industry
event
Industry
time

Keywords

  • capture the flag
  • computer security
  • cybersecurity

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Law

Cite this

Winning cybersecurity one challenge at a time. / Gavas, Efstratios; Memon, Nasir; Britton, Douglas.

In: IEEE Security and Privacy, Vol. 10, No. 4, 6265104, 2012, p. 75-79.

Research output: Contribution to journalArticle

Gavas, Efstratios ; Memon, Nasir ; Britton, Douglas. / Winning cybersecurity one challenge at a time. In: IEEE Security and Privacy. 2012 ; Vol. 10, No. 4. pp. 75-79.
@article{acafa70d8f454065b037f7871013bcd4,
title = "Winning cybersecurity one challenge at a time",
abstract = "Cybersecurity challenges, such as capture-the-flag competitions, test multidisciplinary teams' security and hacking skills. Besides appealing to hackers' competitive nature, participation in these events has become essential to developing successful cybersecurity professionals. Competitors benefit by experiencing the adversarial nature of live cyberincidents akin to traditional military and law enforcement training. Industry, government, and academia benefit by using these competitions for training and to spot emerging talent.",
keywords = "capture the flag, computer security, cybersecurity",
author = "Efstratios Gavas and Nasir Memon and Douglas Britton",
year = "2012",
doi = "10.1109/MSP.2012.112",
language = "English (US)",
volume = "10",
pages = "75--79",
journal = "IEEE Security and Privacy",
issn = "1540-7993",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

TY - JOUR

T1 - Winning cybersecurity one challenge at a time

AU - Gavas, Efstratios

AU - Memon, Nasir

AU - Britton, Douglas

PY - 2012

Y1 - 2012

N2 - Cybersecurity challenges, such as capture-the-flag competitions, test multidisciplinary teams' security and hacking skills. Besides appealing to hackers' competitive nature, participation in these events has become essential to developing successful cybersecurity professionals. Competitors benefit by experiencing the adversarial nature of live cyberincidents akin to traditional military and law enforcement training. Industry, government, and academia benefit by using these competitions for training and to spot emerging talent.

AB - Cybersecurity challenges, such as capture-the-flag competitions, test multidisciplinary teams' security and hacking skills. Besides appealing to hackers' competitive nature, participation in these events has become essential to developing successful cybersecurity professionals. Competitors benefit by experiencing the adversarial nature of live cyberincidents akin to traditional military and law enforcement training. Industry, government, and academia benefit by using these competitions for training and to spot emerging talent.

KW - capture the flag

KW - computer security

KW - cybersecurity

UR - http://www.scopus.com/inward/record.url?scp=84865362623&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84865362623&partnerID=8YFLogxK

U2 - 10.1109/MSP.2012.112

DO - 10.1109/MSP.2012.112

M3 - Article

AN - SCOPUS:84865362623

VL - 10

SP - 75

EP - 79

JO - IEEE Security and Privacy

JF - IEEE Security and Privacy

SN - 1540-7993

IS - 4

M1 - 6265104

ER -