ICSTASY: An Integrated Cybersecurity Training System for Military Personnelopen access
- Authors
- Lee, Donghwan; Kim, Donghwa; Lee, Changwon; Ahn, Myung Kil; Lee, Wonjun
- Issue Date
- 2022
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Training; Computer security; Military aircraft; Cyberattack; Behavioral sciences; Prototypes; Personnel; Cybersecurity training; cybersecurity training system; cyber trainer; prototype demonstration
- Citation
- IEEE ACCESS, v.10, pp.62232 - 62246
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE ACCESS
- Volume
- 10
- Start Page
- 62232
- End Page
- 62246
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/143261
- DOI
- 10.1109/ACCESS.2022.3182383
- ISSN
- 2169-3536
- Abstract
- Cyberwarfare can occur at any moment, anywhere on the planet, and it happens more often than we realize. The new form of warfare is wreaking havoc on not only the military but also on every aspect of our daily lives. Since cybersecurity has only recently established itself as a critical element of the military, the military community relies heavily on the private sector to ensure cyber mission assurance. Given the military's secrecy, such reliance may increase the danger of mission degradation or failure. To address this issue, the military has attempted to build a dedicated cybersecurity training system for the purpose of internalizing cybersecurity training. However, existing cybersecurity training systems frequently lack comprehensive support for effective and efficient cybersecurity training. In this study, we propose ICSTASY, a scenario-based, interactive, and immersive cybersecurity training platform that supports a variety of training features holistically. hl The primary requirements and design principles required to overcome the challenges inherent in developing a cyber training system were offered based on a review of prior work. Through the demonstration of our prototype, we have proven the feasibility of efficient and truly realistic cyber training, not only for the military environment but also for the private sector.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.