Capture the flag challenge design and implementation – part 2
Originally designed as a form of cybersecurity training, Capture the Flag (CTFs) competitions are an effective means of introducing cybersecurity concepts while providing a fun and out of the box environment. With all the tests, assignments, and deadlines that students in tertiary education face, it...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/166635 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | Originally designed as a form of cybersecurity training, Capture the Flag (CTFs) competitions are an effective means of introducing cybersecurity concepts while providing a fun and out of the box environment. With all the tests, assignments, and deadlines that students in tertiary education face, it often stifles creativity and promotes learning for grades rather than learning practical skills and abilities that can be useful for future growth. This is where CTFs come in as they provide a fun and innovative avenue for students to learn more and develop new skill sets that might not be taught in the normal classroom scenario. Recent CTFs focus more on making fun and educational challenges through gamifying cybersecurity concepts that are necessary to obtaining a solution. CTFs are increasingly being used in informal settings such as GoogleCTF as a form of competition but they are not frequently used for educational purposes in institutions of higher learning yet.
This project aims to supplement Nanyang Technological University’s CE/CZ4067 Software Security course curriculum through design of CTF challenges with docker files which can easily be pushed into docker containers that are easily implementable. This paper evaluates the design considerations of various CTF challenges as well as the cybersecurity concepts behind them and the value these challenges contribute to the learning environment through practical hands-on experience and evaluation of students’ current capabilities and knowledge. Lastly, this paper will talk about the challenges as well as test results with the AY2022/2023 cohort of CE/CZ 4067 students. |
---|