Skip to main content
Erschienen in: Education and Information Technologies 6/2019

27.06.2019

Supporting cybersecurity education and training via LMS integration: CyLMS

verfasst von: Razvan Beuran, Dat Tang, Zheyu Tan, Shinobu Hasegawa, Yasuo Tan, Yoichi Shinoda

Erschienen in: Education and Information Technologies | Ausgabe 6/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cybersecurity education and training are being conducted on an ever-increasing scale, as most organizations need to improve their readiness in dealing with the more and more frequent cyberattacks. However, most systems used for such education and training purposes are built from scratch, are highly customized, and often proprietary. This is true especially for complex activities that include hands-on practice, such as Capture The Flag (CTF) competitions and realistic cyber range training. Moreover, the specificities of these platforms create an important overhead, both for instructors, who need to develop training content and learn how to use them, and also for trainees, who need to each time adjust to a different platform. In this paper, we present our approach of integrating cybersecurity training activities, both for technical and awareness training, with Learning Management Systems (LMSs). In particular, our system—named CyLMS—provides integration from content point of view with most LMSs through the use of the SCORM format for packaging the training content. Moreover, additional CyLMS modules make possible a tighter integration with the Moodle LMS, a widely-used e-learning platform, for tasks such as automatic activity management and hands-on environment access. In this way, both instructors and trainees benefit from standard interfaces for checking the training content, answering questions, managing the results, etc. The paper includes an evaluation of CyLMS from a functionality, user and performance perspectives that demonstrates its applicability to actual training activities. While so far we have only used CyLMS in the cybersecurity context, the platform is sufficiently generic to be applied to other education activities, as a learning content management tool that facilitates training content creation and sharing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
The technique of port forwarding also makes it possible to access remote web servers in a closed environment, such as a cyber range, via one’s own PC browser, hence serving the same purpose and providing a better performance, albeit with potential security risks.
 
Literatur
Zurück zum Zitat Alario-Hoyos, C., Bote-Lorenzo, M.L., Gomez-Sanchez, E., Asensio-Perez, J.I., Vega-Gorgojo, G., Ruiz-calleja, A. (2013). GLUE: An architecture for the integration of external tools in Virtual Learning Environments. Computers & Education, 60(1), 122–137.CrossRef Alario-Hoyos, C., Bote-Lorenzo, M.L., Gomez-Sanchez, E., Asensio-Perez, J.I., Vega-Gorgojo, G., Ruiz-calleja, A. (2013). GLUE: An architecture for the integration of external tools in Virtual Learning Environments. Computers & Education, 60(1), 122–137.CrossRef
Zurück zum Zitat Bartnes, M., Moe, N.B., Heegaard, P.E. (2016). The future of information security incident management training: a case study of electrical power companies. Computers & Security, 61(Section C), 32–45.CrossRef Bartnes, M., Moe, N.B., Heegaard, P.E. (2016). The future of information security incident management training: a case study of electrical power companies. Computers & Security, 61(Section C), 32–45.CrossRef
Zurück zum Zitat Beuran, R., Pham, C., Tang, D., Chinen, K., Tan, Y., Shinoda, Y. (2018). Cybersecurity education and training support system: cyRIS. IEICE Transactions on Information and Systems, E101-D(3), 740–749.CrossRef Beuran, R., Pham, C., Tang, D., Chinen, K., Tan, Y., Shinoda, Y. (2018). Cybersecurity education and training support system: cyRIS. IEICE Transactions on Information and Systems, E101-D(3), 740–749.CrossRef
Zurück zum Zitat Beuran, R., Tang, D., Pham, C., Chinen, K., Tan, Y., Shinoda, Y. (2018). Integrated framework for hands-on cybersecurity training: CyTrONE. Computers & Security, 78C, 43–59.CrossRef Beuran, R., Tang, D., Pham, C., Chinen, K., Tan, Y., Shinoda, Y. (2018). Integrated framework for hands-on cybersecurity training: CyTrONE. Computers & Security, 78C, 43–59.CrossRef
Zurück zum Zitat Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(1–7), 107–117.CrossRef Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(1–7), 107–117.CrossRef
Zurück zum Zitat Ghiglieri, M., & Stopczynski, M. (2016). Seclab: an innovative approach to learn and understand current security and privacy issues. In Proceedings of the 17th Annual Conference on Information Technology Education (SIGITE ‘16) (pp 67–72). Ghiglieri, M., & Stopczynski, M. (2016). Seclab: an innovative approach to learn and understand current security and privacy issues. In Proceedings of the 17th Annual Conference on Information Technology Education (SIGITE ‘16) (pp 67–72).
Zurück zum Zitat Noor Azam, Md.H., & Beuran, R. (2018). Usability evaluation of open source and online capture the flag platforms. Tech. Rep. IS-RR-2018-001 Japan advanced institute of science and technology (JAIST). Noor Azam, Md.H., & Beuran, R. (2018). Usability evaluation of open source and online capture the flag platforms. Tech. Rep. IS-RR-2018-001 Japan advanced institute of science and technology (JAIST).
Zurück zum Zitat Sancristobal, E., Castro, M., Harward, J., Baley, P., DeLong, K., Hardison, J. (2010). Integration view of web labs and learning management systems. In Proceedings of IEEE EDUCON 2010 Conference (pp. 1409–1417). Sancristobal, E., Castro, M., Harward, J., Baley, P., DeLong, K., Hardison, J. (2010). Integration view of web labs and learning management systems. In Proceedings of IEEE EDUCON 2010 Conference (pp. 1409–1417).
Zurück zum Zitat Scarfone, K., Souppaya, M., Cody, A., Orebaugh, A. (2008). National institute of standards and technology – technical guide to information security testing and assessment. Scarfone, K., Souppaya, M., Cody, A., Orebaugh, A. (2008). National institute of standards and technology – technical guide to information security testing and assessment.
Zurück zum Zitat Soceanu, A., Vasylenko, M., Gradinaru, A. (2017). Improving cybersecurity skills using network security virtual labs. In: Proceedings of International MultiConference of Engineers and Computer Scientists (IMECS 2017). Soceanu, A., Vasylenko, M., Gradinaru, A. (2017). Improving cybersecurity skills using network security virtual labs. In: Proceedings of International MultiConference of Engineers and Computer Scientists (IMECS 2017).
Zurück zum Zitat Tan, Z., Hasegawa, S., Beuran, R. (2018). Concept map building from linked open data for cybersecurity awareness training. In Proceedings of the Japanese society for artificial intelligence (JSAI) special interest group on advanced learning science and technology workshop (SIG-ALST83) (pp. 1–6). Tan, Z., Hasegawa, S., Beuran, R. (2018). Concept map building from linked open data for cybersecurity awareness training. In Proceedings of the Japanese society for artificial intelligence (JSAI) special interest group on advanced learning science and technology workshop (SIG-ALST83) (pp. 1–6).
Zurück zum Zitat Tang, D., Pham, C., Chinen, K., Beuran, R. (2017). Interactive cybersecurity defense training inspired by web-based learning theory. In Proceedings of the IEEE 9th international conference on engineering education (ICEED 2017) (pp. 103–108). Tang, D., Pham, C., Chinen, K., Beuran, R. (2017). Interactive cybersecurity defense training inspired by web-based learning theory. In Proceedings of the IEEE 9th international conference on engineering education (ICEED 2017) (pp. 103–108).
Zurück zum Zitat Woo, Y., & Reeves, T.C. (2007). Meaningful interaction in web-based learning: a social constructivist interpretation. The Internet and Higher Education, 10(1), 15–25.CrossRef Woo, Y., & Reeves, T.C. (2007). Meaningful interaction in web-based learning: a social constructivist interpretation. The Internet and Higher Education, 10(1), 15–25.CrossRef
Metadaten
Titel
Supporting cybersecurity education and training via LMS integration: CyLMS
verfasst von
Razvan Beuran
Dat Tang
Zheyu Tan
Shinobu Hasegawa
Yasuo Tan
Yoichi Shinoda
Publikationsdatum
27.06.2019
Verlag
Springer US
Erschienen in
Education and Information Technologies / Ausgabe 6/2019
Print ISSN: 1360-2357
Elektronische ISSN: 1573-7608
DOI
https://doi.org/10.1007/s10639-019-09942-y

Weitere Artikel der Ausgabe 6/2019

Education and Information Technologies 6/2019 Zur Ausgabe

Premium Partner