Capture the flag challenge design and implementation – part 2

Originally designed as a form of cybersecurity training, Capture the Flag (CTFs) competitions are an effective means of introducing cybersecurity concepts while providing a fun and out of the box environment. With all the tests, assignments, and deadlines that students in tertiary education face, it...

Full description

Saved in:
Bibliographic Details
Main Author: Tan, Chuan Jie
Other Authors: Li Yi
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/166635
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:Originally designed as a form of cybersecurity training, Capture the Flag (CTFs) competitions are an effective means of introducing cybersecurity concepts while providing a fun and out of the box environment. With all the tests, assignments, and deadlines that students in tertiary education face, it often stifles creativity and promotes learning for grades rather than learning practical skills and abilities that can be useful for future growth. This is where CTFs come in as they provide a fun and innovative avenue for students to learn more and develop new skill sets that might not be taught in the normal classroom scenario. Recent CTFs focus more on making fun and educational challenges through gamifying cybersecurity concepts that are necessary to obtaining a solution. CTFs are increasingly being used in informal settings such as GoogleCTF as a form of competition but they are not frequently used for educational purposes in institutions of higher learning yet. This project aims to supplement Nanyang Technological University’s CE/CZ4067 Software Security course curriculum through design of CTF challenges with docker files which can easily be pushed into docker containers that are easily implementable. This paper evaluates the design considerations of various CTF challenges as well as the cybersecurity concepts behind them and the value these challenges contribute to the learning environment through practical hands-on experience and evaluation of students’ current capabilities and knowledge. Lastly, this paper will talk about the challenges as well as test results with the AY2022/2023 cohort of CE/CZ 4067 students.