Analysis of Cyber Range Scenario Design

–A Case Study

  • Conference paper
  • First Online:
Blended Learning. Intelligent Computing in Education (ICBL 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14797))

Included in the following conference series:

  • 58 Accesses

Abstract

This study explores the relationship between the design of cyber range scenarios and the objectives of classroom teaching, elucidating the significant role of cyber range in cybersecurity education. It analyzes one workshop session as a teaching case by discussing the principles, strategies, key elements, and actual outcomes of experimental courses across various themes. The authors suggest that cyber range design should put focus on interactivity, timeliness, and engagement, and be closely aligned with students’ prior cybersecurity knowledge. An evaluation of students’ performance and feedback during their cyber range training is discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 56.49
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 69.62
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kwok, L.-F., Chen, Y., Lam, S.: Technology-enhanced cybersecurity education: a VPET approach. In: Cheung, S.K.S., Wang, F.L., Paoprasert, N., Charnsethikul, P., Li, K.C., Phusavat, K. (eds.) ICTE 2023. CCIS, vol. 1974, pp. 20–31. Springer, Singapore (2023). https://doi.org/10.1007/978-981-99-8255-4_3

  2. Parrish, A., et al.: Global perspectives on cybersecurity education for 2030: a case for a meta-discipline. In: Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, pp. 36–54. Association for Computing Machinery (ACM), New York (2018)

    Google Scholar 

  3. Wang, X.: Research on the teaching reform of cyber security courses. Comput. Knowl. Technol. 12(35) (2016)

    Google Scholar 

  4. Dark, M., Mirkovic, J.: Evaluation theory and practice applied to cybersecurity education. IEEE Secur. Priv. 13(2), 75–80 (2015)

    Article  Google Scholar 

  5. Payne, B.K., Mayes, L., Paredes, T., Smith, E., Wu, H., **n, C.: Applying high impact practices in an interdisciplinary cybersecurity program. J. Cybersecur. Educ. Res. Pract. 2020(2) (2021)

    Google Scholar 

  6. Wang, H., Song, L.: A brief analysis of the concept, classification and system architecture of cyber ranges. Secrecy Sci. Technol. (000–006) (2021)

    Google Scholar 

  7. Kavallieratos, G., Katsikas, S.K., Gkioulos, V.: Towards a cyber-physical range. In: Proceedings of the 5th on Cyber-Physical System Security Workshop, CPSS 2019, p. 2534. Association for Computing Machinery (ACM), New York (2019)

    Google Scholar 

  8. Ferguson, B., Tall, A., Olsen, D.: National cyber range overview. In: 2014 IEEE Military Communications Conference, pp. 123–128. IEEE (2014)

    Google Scholar 

  9. **a, P.: Reform of network security technology practice teaching system based on virtual simulation training platform. In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 199–203 (2020)

    Google Scholar 

  10. Tirado-Morueta, R., Ceada-Garrido, Y., Barragán, A.J., Enrique, J.M., Andujar, J.M.: Factors explaining students’ engagement and self-reported outcomes in a project-based learning case. J. Educ. Res. 115(6), 333–348 (2022)

    Article  Google Scholar 

  11. Reddy, G.N., Reddy, G.J.: A study of cyber security challenges and its emerging trends on latest technologies. ar**v preprint ar**v:1402.1842 (2014)

  12. Kam, H.-J., Menard, P., Ormond, D., Crossler, R.E.: Cultivating cybersecurity learning: an integration of self-determination and flow. Comput. Secur. 96, 101875 (2020)

    Article  Google Scholar 

  13. Li, J.: Research on teaching cyber security course in colleges. J. Huaibei Coal Ind. Teach. Coll. (Nat. Sci.) 30(1), 94–96 (2009)

    Google Scholar 

  14. Dawson, J., Thomson, R.: The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Front. Psychol. 9, 284332 (2018)

    Article  Google Scholar 

  15. Chen, Y., Tao, T.: The design of evaluation index for learning-oriented classroom teaching. Curric. Teach. Mater. Method (2016)

    Google Scholar 

  16. Cai, H.M., Xu, X.D.: Construction of quality evaluation system of classroom teaching in colleges and universities. Res. High. Educ. Eng. 3, 177–180 (2014)

    Google Scholar 

Download references

Acknowledgments

This study is partially supported by the Enhancement and Start-up Grant Scheme for Self-financing Post-secondary Education (ESGS/2021/APP-19).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lam-For Kwok .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yi, C., Wang, W., Kwok, LF. (2024). Analysis of Cyber Range Scenario Design. In: Ma, W.W.K., Li, C., Fan, C.W., U, L.H., Lu, A. (eds) Blended Learning. Intelligent Computing in Education. ICBL 2024. Lecture Notes in Computer Science, vol 14797. Springer, Singapore. https://doi.org/10.1007/978-981-97-4442-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-4442-8_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-4441-1

  • Online ISBN: 978-981-97-4442-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation