Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture

Cloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly valued. However, it is extremely challenging for...

Full description

Bibliographic Details
Main Authors: Taisho Sasada, Masataka Kawai, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10352156/
_version_ 1797376291994861568
author Taisho Sasada
Masataka Kawai
Yuto Masuda
Yuzo Taenaka
Youki Kadobayashi
author_facet Taisho Sasada
Masataka Kawai
Yuto Masuda
Yuzo Taenaka
Youki Kadobayashi
author_sort Taisho Sasada
collection DOAJ
description Cloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly valued. However, it is extremely challenging for companies to acquire such security personnel, leading to the proposal and increased attention towards cyber security training programs as an alternative to hiring new personnel. Many of the existing training programs focus on acquiring knowledge of security technologies and practicing incident response but often fail to provide the skills necessary for system architecture, such as system design and scaling. In the era of cloud computing, system architecture is indispensable, and there is a need for training programs that enable participants to acquire these related skills, regardless of their academic background in security technologies. In this study, we propose a novel cybersecurity training program that allows participants to learn as system architects, covering the entire process from design to implementation. We utilize the state-of-the-art system architecture model known as Zero Trust Architecture (ZTA) and expand it from a prototype of reverse proxy access control to encompass ZTA. This approach enables participants to acquire the skills necessary for system architects, including system scalability and security. Furthermore, we measure the educational effectiveness of the training program by collecting decision the ARCS questionnaire dataset from students and workers. The results of statistical tests and factor analysis conducted on the ARCS questionnaire confirm that the training program enhances learning motivation, regardless of the participants’ academic background in security technology. Additionally, these tests help identify the differences in factors that influence learning motivation between students and working adults.
first_indexed 2024-03-08T19:36:27Z
format Article
id doaj.art-7ceb1e7bd15b4e649ff4930aa15b9004
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-08T19:36:27Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-7ceb1e7bd15b4e649ff4930aa15b90042023-12-26T00:10:23ZengIEEEIEEE Access2169-35362023-01-011114135814137410.1109/ACCESS.2023.334109310352156Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust ArchitectureTaisho Sasada0https://orcid.org/0000-0003-2144-4949Masataka Kawai1Yuto Masuda2Yuzo Taenaka3Youki Kadobayashi4Graduate School of Science and Technology, Nara Institute Science and Technology (NAIST), Ikoma, JapanNRI SecureTechnologies Ltd., Tokyo, JapanNRI SecureTechnologies Ltd., Tokyo, JapanGraduate School of Science and Technology, Nara Institute Science and Technology (NAIST), Ikoma, JapanGraduate School of Science and Technology, Nara Institute Science and Technology (NAIST), Ikoma, JapanCloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly valued. However, it is extremely challenging for companies to acquire such security personnel, leading to the proposal and increased attention towards cyber security training programs as an alternative to hiring new personnel. Many of the existing training programs focus on acquiring knowledge of security technologies and practicing incident response but often fail to provide the skills necessary for system architecture, such as system design and scaling. In the era of cloud computing, system architecture is indispensable, and there is a need for training programs that enable participants to acquire these related skills, regardless of their academic background in security technologies. In this study, we propose a novel cybersecurity training program that allows participants to learn as system architects, covering the entire process from design to implementation. We utilize the state-of-the-art system architecture model known as Zero Trust Architecture (ZTA) and expand it from a prototype of reverse proxy access control to encompass ZTA. This approach enables participants to acquire the skills necessary for system architects, including system scalability and security. Furthermore, we measure the educational effectiveness of the training program by collecting decision the ARCS questionnaire dataset from students and workers. The results of statistical tests and factor analysis conducted on the ARCS questionnaire confirm that the training program enhances learning motivation, regardless of the participants’ academic background in security technology. Additionally, these tests help identify the differences in factors that influence learning motivation between students and working adults.https://ieeexplore.ieee.org/document/10352156/Cybersecurity trainingzero trust architecturesystem architectureexploratory factor analysiseducational data analysis
spellingShingle Taisho Sasada
Masataka Kawai
Yuto Masuda
Yuzo Taenaka
Youki Kadobayashi
Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture
IEEE Access
Cybersecurity training
zero trust architecture
system architecture
exploratory factor analysis
educational data analysis
title Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture
title_full Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture
title_fullStr Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture
title_full_unstemmed Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture
title_short Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture
title_sort factor analysis of learning motivation difference on cybersecurity training with zero trust architecture
topic Cybersecurity training
zero trust architecture
system architecture
exploratory factor analysis
educational data analysis
url https://ieeexplore.ieee.org/document/10352156/
work_keys_str_mv AT taishosasada factoranalysisoflearningmotivationdifferenceoncybersecuritytrainingwithzerotrustarchitecture
AT masatakakawai factoranalysisoflearningmotivationdifferenceoncybersecuritytrainingwithzerotrustarchitecture
AT yutomasuda factoranalysisoflearningmotivationdifferenceoncybersecuritytrainingwithzerotrustarchitecture
AT yuzotaenaka factoranalysisoflearningmotivationdifferenceoncybersecuritytrainingwithzerotrustarchitecture
AT youkikadobayashi factoranalysisoflearningmotivationdifferenceoncybersecuritytrainingwithzerotrustarchitecture