Down the Rabbit Hole: Fostering Active Learning through Guided Exploration of a SCADA Cyber Range
Prior experience from the authors has shown that a heavily theoretical approach for cybersecurity training has multiple shortcomings, mostly due to the demanding and diversified nature of the prerequisites, often involving concepts about operating system design, networking and computer architecture,...
Main Authors: | Tiago Cruz, Paulo Simões |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-10-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/11/20/9509 |
Similar Items
-
Design and Implementation of Multi-Cyber Range for Cyber Training and Testing
by: Moosung Park, et al.
Published: (2022-12-01) -
Cyber Security in Industrial Control Systems and SCADA Applications: Modbus TCP Protocol Example
by: Erdal IRMAK, et al.
Published: (2018-03-01) -
Addressing the Security Gap in IoT: Towards an IoT Cyber Range
by: Oliver Nock, et al.
Published: (2020-09-01) -
The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems
by: Asaad Balla, et al.
Published: (2023-01-01) -
Cyber ranges: survey and perspective
by: ZOU Xing, et al.
Published: (2024-10-01)