Affiliation:
1. Department of Automatic Control and Applied Informatics, “Gheorghe Asachi” Technical University of Iasi, 700050 Iasi, Romania
Abstract
In today’s dynamic and evolving digital landscape, safeguarding network infrastructure against cyber threats has become a paramount concern for organizations worldwide. This paper presents a novel and practical approach to enhancing cybersecurity readiness. The competition, designed as a simulated cyber battleground, involves a Red Team emulating attackers and a Blue Team defending against their orchestrated assaults. Over two days, multiple teams engage in strategic maneuvers to breach and fortify digital defenses. The core objective of this study is to assess the efficacy of the Red and Blue cybersecurity competition in fostering real-world incident response capabilities and honing the skills of cybersecurity practitioners. This paper delves into the competition’s structural framework, including the intricate network architecture and the roles of the participating teams. This study gauges the competition’s impact on enhancing teamwork and incident response strategies by analyzing participant performance data and outcomes. The findings underscore the significance of immersive training experiences in cultivating proactive cybersecurity mindsets. Participants not only showcase heightened proficiency in countering cyber threats but also develop a profound understanding of attacker methodologies. Furthermore, the competition fosters an environment of continuous learning and knowledge exchange, propelling participants toward heightened cyber resilience.
Reference30 articles.
1. Karjalainen, M., and Kokkonen, T. (2022, January 6–10). Comprehensive cyber arena; the next generation cyber range. Proceedings of the IEEE European Symposium on Security and Privacy Workshops, Genoa, Italy.
2. Attiah, A., Chatterjee, M., and Zou, C.C. (2018, January 20–24). A game theoretic approach to model cyber attack and defense strategies. Proceedings of the International Conference on Communications, Kansas City, MO, USA.
3. Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview;Mijwil;Mesopotamian J. Cybersecur.,2023
4. Artificial intelligence for cybersecurity: Literature review and future research directions;Kaur;Inf. Fusion,2023
5. Aktayeva, A., Makatov, Y., Tulegenovna, A.K., Dautov, A., Niyazova, R., Zhamankarin, M., and Khan, S. (2023). Cybersecurity Risk Assessments within Critical Infrastructure Social Networks. Data, 8.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing the Supply Chain;Advances in Information Security, Privacy, and Ethics;2024-02-02