Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture
Cloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly valued. However, it is extremely challenging for...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10352156/ |
_version_ | 1797376291994861568 |
---|---|
author | Taisho Sasada Masataka Kawai Yuto Masuda Yuzo Taenaka Youki Kadobayashi |
author_facet | Taisho Sasada Masataka Kawai Yuto Masuda Yuzo Taenaka Youki Kadobayashi |
author_sort | Taisho Sasada |
collection | DOAJ |
description | Cloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly valued. However, it is extremely challenging for companies to acquire such security personnel, leading to the proposal and increased attention towards cyber security training programs as an alternative to hiring new personnel. Many of the existing training programs focus on acquiring knowledge of security technologies and practicing incident response but often fail to provide the skills necessary for system architecture, such as system design and scaling. In the era of cloud computing, system architecture is indispensable, and there is a need for training programs that enable participants to acquire these related skills, regardless of their academic background in security technologies. In this study, we propose a novel cybersecurity training program that allows participants to learn as system architects, covering the entire process from design to implementation. We utilize the state-of-the-art system architecture model known as Zero Trust Architecture (ZTA) and expand it from a prototype of reverse proxy access control to encompass ZTA. This approach enables participants to acquire the skills necessary for system architects, including system scalability and security. Furthermore, we measure the educational effectiveness of the training program by collecting decision the ARCS questionnaire dataset from students and workers. The results of statistical tests and factor analysis conducted on the ARCS questionnaire confirm that the training program enhances learning motivation, regardless of the participants’ academic background in security technology. Additionally, these tests help identify the differences in factors that influence learning motivation between students and working adults. |
first_indexed | 2024-03-08T19:36:27Z |
format | Article |
id | doaj.art-7ceb1e7bd15b4e649ff4930aa15b9004 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-03-08T19:36:27Z |
publishDate | 2023-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-7ceb1e7bd15b4e649ff4930aa15b90042023-12-26T00:10:23ZengIEEEIEEE Access2169-35362023-01-011114135814137410.1109/ACCESS.2023.334109310352156Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust ArchitectureTaisho Sasada0https://orcid.org/0000-0003-2144-4949Masataka Kawai1Yuto Masuda2Yuzo Taenaka3Youki Kadobayashi4Graduate School of Science and Technology, Nara Institute Science and Technology (NAIST), Ikoma, JapanNRI SecureTechnologies Ltd., Tokyo, JapanNRI SecureTechnologies Ltd., Tokyo, JapanGraduate School of Science and Technology, Nara Institute Science and Technology (NAIST), Ikoma, JapanGraduate School of Science and Technology, Nara Institute Science and Technology (NAIST), Ikoma, JapanCloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly valued. However, it is extremely challenging for companies to acquire such security personnel, leading to the proposal and increased attention towards cyber security training programs as an alternative to hiring new personnel. Many of the existing training programs focus on acquiring knowledge of security technologies and practicing incident response but often fail to provide the skills necessary for system architecture, such as system design and scaling. In the era of cloud computing, system architecture is indispensable, and there is a need for training programs that enable participants to acquire these related skills, regardless of their academic background in security technologies. In this study, we propose a novel cybersecurity training program that allows participants to learn as system architects, covering the entire process from design to implementation. We utilize the state-of-the-art system architecture model known as Zero Trust Architecture (ZTA) and expand it from a prototype of reverse proxy access control to encompass ZTA. This approach enables participants to acquire the skills necessary for system architects, including system scalability and security. Furthermore, we measure the educational effectiveness of the training program by collecting decision the ARCS questionnaire dataset from students and workers. The results of statistical tests and factor analysis conducted on the ARCS questionnaire confirm that the training program enhances learning motivation, regardless of the participants’ academic background in security technology. Additionally, these tests help identify the differences in factors that influence learning motivation between students and working adults.https://ieeexplore.ieee.org/document/10352156/Cybersecurity trainingzero trust architecturesystem architectureexploratory factor analysiseducational data analysis |
spellingShingle | Taisho Sasada Masataka Kawai Yuto Masuda Yuzo Taenaka Youki Kadobayashi Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture IEEE Access Cybersecurity training zero trust architecture system architecture exploratory factor analysis educational data analysis |
title | Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture |
title_full | Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture |
title_fullStr | Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture |
title_full_unstemmed | Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture |
title_short | Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture |
title_sort | factor analysis of learning motivation difference on cybersecurity training with zero trust architecture |
topic | Cybersecurity training zero trust architecture system architecture exploratory factor analysis educational data analysis |
url | https://ieeexplore.ieee.org/document/10352156/ |
work_keys_str_mv | AT taishosasada factoranalysisoflearningmotivationdifferenceoncybersecuritytrainingwithzerotrustarchitecture AT masatakakawai factoranalysisoflearningmotivationdifferenceoncybersecuritytrainingwithzerotrustarchitecture AT yutomasuda factoranalysisoflearningmotivationdifferenceoncybersecuritytrainingwithzerotrustarchitecture AT yuzotaenaka factoranalysisoflearningmotivationdifferenceoncybersecuritytrainingwithzerotrustarchitecture AT youkikadobayashi factoranalysisoflearningmotivationdifferenceoncybersecuritytrainingwithzerotrustarchitecture |