To minimize the possibility of introducing vulnerabilities in source code, software developers may attend security awareness and secure coding training. From the various approaches of how to raise awareness and adherence to coding standards, one promising novel approach is Cybersecurity Challenges. However, in an industrial setting, time is a precious resource, and, therefore, one needs to understand how to optimize the gaming experience of Cybersecurity Challenges and the effect of this game on secure coding skills. This work identifies the time spent solving challenges of different categories, analyzes gaming strategies in terms of a slow and fast team profile, and relates these profiles to the game success. First results indicate that the slo...
Reports of software related security breaches are becoming weekly occurrences. With newer high-profi...
Hands-on cyber security training is generally accepted as an enjoyable and effective way of developi...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
Awareness of cybersecurity topics facilitates software developers to produce secure code. This aware...
Over the last years, the number of cyber-attacks on industrial control systems has been steadily inc...
Software vulnerabilities, when actively exploited by malicious parties, can lead to catastrophic con...
Sophistication and flexibility of software development make it easy to leave security vulnerabilitie...
Cybersecurity vulnerabilities in industrial control systems have been steadily increasing over the l...
Cybersecurity serious games provide hands-on training of cybersecurity skills and enhance security a...
Adversary thinking is an essential skill for cybersecurity experts, enabling them to understand cybe...
This game is the direct result of a process of investigation leading to new insights, effectively sh...
The cyber security context requires to better understand how developers write (in)secure code and to...
The Department of Homeland Security in the United States estimates that 90% of software vulnerabilit...
Secure coding guidelines are essential material used to train and raise awareness of software develo...
Reports of software related security breaches are becoming weekly occurrences. With newer high-profi...
Reports of software related security breaches are becoming weekly occurrences. With newer high-profi...
Hands-on cyber security training is generally accepted as an enjoyable and effective way of developi...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
Awareness of cybersecurity topics facilitates software developers to produce secure code. This aware...
Over the last years, the number of cyber-attacks on industrial control systems has been steadily inc...
Software vulnerabilities, when actively exploited by malicious parties, can lead to catastrophic con...
Sophistication and flexibility of software development make it easy to leave security vulnerabilitie...
Cybersecurity vulnerabilities in industrial control systems have been steadily increasing over the l...
Cybersecurity serious games provide hands-on training of cybersecurity skills and enhance security a...
Adversary thinking is an essential skill for cybersecurity experts, enabling them to understand cybe...
This game is the direct result of a process of investigation leading to new insights, effectively sh...
The cyber security context requires to better understand how developers write (in)secure code and to...
The Department of Homeland Security in the United States estimates that 90% of software vulnerabilit...
Secure coding guidelines are essential material used to train and raise awareness of software develo...
Reports of software related security breaches are becoming weekly occurrences. With newer high-profi...
Reports of software related security breaches are becoming weekly occurrences. With newer high-profi...
Hands-on cyber security training is generally accepted as an enjoyable and effective way of developi...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...