Winning cybersecurity one challenge at a time

Efstratios Gavas, Nasir Memon, Douglas Britton

    Research output: Contribution to journalArticle

    Abstract

    Cybersecurity challenges, such as capture-the-flag competitions, test multidisciplinary teams' security and hacking skills. Besides appealing to hackers' competitive nature, participation in these events has become essential to developing successful cybersecurity professionals. Competitors benefit by experiencing the adversarial nature of live cyberincidents akin to traditional military and law enforcement training. Industry, government, and academia benefit by using these competitions for training and to spot emerging talent.

    Original languageEnglish (US)
    Article number6265104
    Pages (from-to)75-79
    Number of pages5
    JournalIEEE Security and Privacy
    Volume10
    Issue number4
    DOIs
    StatePublished - 2012

    Fingerprint

    hacker
    Law enforcement
    law enforcement
    Military
    participation
    industry
    event
    Industry
    time

    Keywords

    • capture the flag
    • computer security
    • cybersecurity

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Computer Networks and Communications
    • Law

    Cite this

    Gavas, E., Memon, N., & Britton, D. (2012). Winning cybersecurity one challenge at a time. IEEE Security and Privacy, 10(4), 75-79. [6265104]. https://doi.org/10.1109/MSP.2012.112

    Winning cybersecurity one challenge at a time. / Gavas, Efstratios; Memon, Nasir; Britton, Douglas.

    In: IEEE Security and Privacy, Vol. 10, No. 4, 6265104, 2012, p. 75-79.

    Research output: Contribution to journalArticle

    Gavas, E, Memon, N & Britton, D 2012, 'Winning cybersecurity one challenge at a time', IEEE Security and Privacy, vol. 10, no. 4, 6265104, pp. 75-79. https://doi.org/10.1109/MSP.2012.112
    Gavas, Efstratios ; Memon, Nasir ; Britton, Douglas. / Winning cybersecurity one challenge at a time. In: IEEE Security and Privacy. 2012 ; Vol. 10, No. 4. pp. 75-79.
    @article{acafa70d8f454065b037f7871013bcd4,
    title = "Winning cybersecurity one challenge at a time",
    abstract = "Cybersecurity challenges, such as capture-the-flag competitions, test multidisciplinary teams' security and hacking skills. Besides appealing to hackers' competitive nature, participation in these events has become essential to developing successful cybersecurity professionals. Competitors benefit by experiencing the adversarial nature of live cyberincidents akin to traditional military and law enforcement training. Industry, government, and academia benefit by using these competitions for training and to spot emerging talent.",
    keywords = "capture the flag, computer security, cybersecurity",
    author = "Efstratios Gavas and Nasir Memon and Douglas Britton",
    year = "2012",
    doi = "10.1109/MSP.2012.112",
    language = "English (US)",
    volume = "10",
    pages = "75--79",
    journal = "IEEE Security and Privacy",
    issn = "1540-7993",
    publisher = "Institute of Electrical and Electronics Engineers Inc.",
    number = "4",

    }

    TY - JOUR

    T1 - Winning cybersecurity one challenge at a time

    AU - Gavas, Efstratios

    AU - Memon, Nasir

    AU - Britton, Douglas

    PY - 2012

    Y1 - 2012

    N2 - Cybersecurity challenges, such as capture-the-flag competitions, test multidisciplinary teams' security and hacking skills. Besides appealing to hackers' competitive nature, participation in these events has become essential to developing successful cybersecurity professionals. Competitors benefit by experiencing the adversarial nature of live cyberincidents akin to traditional military and law enforcement training. Industry, government, and academia benefit by using these competitions for training and to spot emerging talent.

    AB - Cybersecurity challenges, such as capture-the-flag competitions, test multidisciplinary teams' security and hacking skills. Besides appealing to hackers' competitive nature, participation in these events has become essential to developing successful cybersecurity professionals. Competitors benefit by experiencing the adversarial nature of live cyberincidents akin to traditional military and law enforcement training. Industry, government, and academia benefit by using these competitions for training and to spot emerging talent.

    KW - capture the flag

    KW - computer security

    KW - cybersecurity

    UR - http://www.scopus.com/inward/record.url?scp=84865362623&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84865362623&partnerID=8YFLogxK

    U2 - 10.1109/MSP.2012.112

    DO - 10.1109/MSP.2012.112

    M3 - Article

    VL - 10

    SP - 75

    EP - 79

    JO - IEEE Security and Privacy

    JF - IEEE Security and Privacy

    SN - 1540-7993

    IS - 4

    M1 - 6265104

    ER -