An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education

Tom Chothia, Chris Novakovic

Research output: Contribution to conference (unpublished)Paperpeer-review

37 Citations (Scopus)

Abstract

Online Capture The Flag (CTF) competitions are a popular means of engaging students with the world of cybersecurity. This paper reports on the use of a virtual machine (VM) framework that has been developed as part of cybersecurity courses offered to both second-year undergraduate and master's degree students in the School of Computer Science at the University of Birmingham; the framework features CTF-style challenges that must be solved in order to complete the courses' formative assessment. As well as acquiring flags from the framework, students must also provide traditional written answers to questions and sit an examination. We analyse how well students' performance on the CTF-style challenges correlates with their achievement in the remaining formative assessment and examination, thus providing evidence to show whether CTFs are effective as an assessment tool in academic cybersecurity courses.

Original languageEnglish
Publication statusPublished - 2015
Event2015 USENIX Summit on Gaming, Games, and Gamification in Security Education, 3GSE 2015 - Washington, United States
Duration: 11 Aug 2015 → …

Conference

Conference2015 USENIX Summit on Gaming, Games, and Gamification in Security Education, 3GSE 2015
Country/TerritoryUnited States
CityWashington
Period11/08/15 → …

Bibliographical note

Publisher Copyright:
© 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education, 3GSE 2015. All rights reserved.

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Safety, Risk, Reliability and Quality
  • Education
  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education'. Together they form a unique fingerprint.

Cite this