Abstract
This paper gauges the experience of educational institutions currently utilizing a Cyber Range. A Cyber Range is implemented to provide hands-on training in the cyber security field. This hands-on training produces a more skilled worker that is better equipped to enter the Cyber Security industry. A survey was conducted to provide a better knowledge of the uses, benefits, costs, and methods used to implement a Cyber Range at an educational institution.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sibi Chakkaravarthy, S., Sangeetha, D., Venkata Rathnam, M., Srinithi, K., Vaidehi, V.: Futuristic cyber-attacks. Int. J. Knowl.-Based Intell. Eng. Syst. 22, 195–204 (2018)
Thor Teaches. https://thorteaches.com/cybersecurity-unemployment-rate-drops-to-zero-percent/
National Initiative for Cybersecurity Education (NICE). https://www.nist.gov/sites/default/files/documents/2018/02/13/cyber_ranges.pdf
Arkansas Business. https://www.arkansasbusiness.com/article/125394/uca-cyber-range-to-produce-needed-talent
Daily Press. https://www.dailypress.com/news/education/dp-nws-tncc-cybersecurity-20171017-story.html
Virginia Cyber Range. https://www.virginiacyberrange.org/about
Urias, V.E., Stout, W.M., Van Leeuwen, B., Lin, H.: Cyber range infrastructure limitations and needs of tomorrow: a position paper. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1–5. IEEE (2018)
Davis, J., Magrath, S.: A survey of cyber ranges and testbeds. Defence Science and Technology Organisation Edinburgh (Australia) Cyber and Electronic Warfare Div (2013)
Virginia Cyber Range. https://csrc.nist.gov/CSRC/media/Events/Federal-Information-Systems-Security-Educators-As/documents/24.pdf
Beuran, R., Pham, C., Tang, D., Chinen, K.-I., Tan, Y., Shinoda, Y.: Cybersecurity education and training support system: CyRIS. IEICE Trans. Inf. Syst. 101, 740–749 (2018)
Son, J., Irrechukwu, C., Fitzgibbons, P.: Virtual lab for online cyber security education. Commun. IIMA 12, 5 (2012)
Daneshgar, F., Sianaki, O.A., Ilyas, A.: Overcoming data security challenges of cloud of things: an architectural perspective. In: Conference on Complex, Intelligent, and Software Intensive Systems, pp. 646–659. Springer (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Darwish, O., Stone, C.M., Karajeh, O., Alsinglawi, B. (2020). Survey of Educational Cyber Ranges. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2020. Advances in Intelligent Systems and Computing, vol 1150. Springer, Cham. https://doi.org/10.1007/978-3-030-44038-1_96
Download citation
DOI: https://doi.org/10.1007/978-3-030-44038-1_96
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44037-4
Online ISBN: 978-3-030-44038-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)