2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI) 2019
DOI: 10.1109/iiai-aai.2019.00043
|View full text |Cite
|
Sign up to set email alerts
|

Development of Training System and Practice Contents for Cybersecurity Education

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The deployment is on-premise with a resp. several virtual machines (VMs) due to the architecture of our TAME range, as outlined by (Shin et al, 2019). Although VMware is the primary installation, VirtualBox or other products could be imported.…”
Section: Training Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…The deployment is on-premise with a resp. several virtual machines (VMs) due to the architecture of our TAME range, as outlined by (Shin et al, 2019). Although VMware is the primary installation, VirtualBox or other products could be imported.…”
Section: Training Environmentmentioning
confidence: 99%
“…The description utilizes JavaScript Object Notation (JSON) as a prominent candidate for descriptions on the Internet, similar to the related work. Depending on the cyber range, either automated provisioning with tools such as Vagrant and Puppet or VMs are set up (Shin et al, 2019). In consequence, the descriptions either result (with translation) in automated provisioning or can be used to build the VMs.…”
Section: Descriptionmentioning
confidence: 99%
“…In recent years, the implementation of this type of application has also been utilized through various security topics. In cyber security simulation and learning application, Shin S, Seto Y, Kasai Y, Ka R, Kuroki D, Toyoda S et al [7] built a learning media platform called CyExec to help cyber security learning systems with attack and defense programs. The program is then built-in virtual box and docker technology.…”
Section: Related Workmentioning
confidence: 99%
“…The CyExec ( Nakata & Otsuka, 2021 ; Shin et al, 2019 ) deployed in with Docker containers in a VirtualBox-configured virtual environment. We may easily create a practice environment for each purpose by performing vulnerability assessments and other exercise programs on assaults and defenses and running them on a Docker container.…”
Section: Introductionmentioning
confidence: 99%