Due to digitalization, computer systems have become integral to every aspect of oursociety. Not all the software and systems behind the wave of digitalization are securelydeveloped, tested, or properly configured and are, therefore, vulnerable to attacks. Thebest way to protect ourselves is through increased awareness about these threats, wherelaboratory exercises are an excellent way to teach about the practical aspects of thesethings. To better understand what makes an excellent cyber security exercise, this thesisaims to develop a CTF-based laboratory exercise for the course Ethical Hacking atKarlstad University and analyze requirements and how different factors influence thedevelopment and user experience. To do this, we set up an environ...
With increased digitalization, our societies have become more vulnerable to cyber attacks, and we ar...
Cybersecurity is an important aspect within organizations as threats are many and often not fully un...
With rapid digitalization and technical growth, the IT systems that we are using are becoming extrem...
More often than not, students in higher education are driven by assessments and achievements rather ...
CTF (Capture The Flag) competitions have emerged as a pivotal instrument in development of cyber sec...
Academic institutions worldwide have harnessed Capture the Flag (CTF) cybersecurity challenges as ef...
This research investigates the use of build-your-own capture the flag ethical hacking simulations to...
The current consensus is that a lack of skilled young persons entering the cyber security industry i...
Capture the flag (CTF) challenges are broadly used for engaging trainees in the technical aspects of...
The efficacy of cybersecurity education and training relies on the availability of immersive, hands-...
In the very rapid digital revolution we are experiencing, the availability of cybersecurity experts ...
Cybersecurity attacks are on the rise, and the current response is not effective enough. The need fo...
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environme...
In order to combat malicious actors of the digital age, cybersecurity experts have quickly become es...
The field of cybersecurity is adversarial – the real challenge lies in outsmarting motivated and kno...
With increased digitalization, our societies have become more vulnerable to cyber attacks, and we ar...
Cybersecurity is an important aspect within organizations as threats are many and often not fully un...
With rapid digitalization and technical growth, the IT systems that we are using are becoming extrem...
More often than not, students in higher education are driven by assessments and achievements rather ...
CTF (Capture The Flag) competitions have emerged as a pivotal instrument in development of cyber sec...
Academic institutions worldwide have harnessed Capture the Flag (CTF) cybersecurity challenges as ef...
This research investigates the use of build-your-own capture the flag ethical hacking simulations to...
The current consensus is that a lack of skilled young persons entering the cyber security industry i...
Capture the flag (CTF) challenges are broadly used for engaging trainees in the technical aspects of...
The efficacy of cybersecurity education and training relies on the availability of immersive, hands-...
In the very rapid digital revolution we are experiencing, the availability of cybersecurity experts ...
Cybersecurity attacks are on the rise, and the current response is not effective enough. The need fo...
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environme...
In order to combat malicious actors of the digital age, cybersecurity experts have quickly become es...
The field of cybersecurity is adversarial – the real challenge lies in outsmarting motivated and kno...
With increased digitalization, our societies have become more vulnerable to cyber attacks, and we ar...
Cybersecurity is an important aspect within organizations as threats are many and often not fully un...
With rapid digitalization and technical growth, the IT systems that we are using are becoming extrem...