University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Opinnäytteet
  • Väitöskirjat
  • View Item
JYX > Opinnäytteet > Väitöskirjat > View Item

Pedagogical Basis of Live Cybersecurity Exercises

Thumbnail
View/Open
7.1 Mb

Downloads:  
Show download detailsHide download details  
Published in
JYU dissertations
Authors
Karjalainen, Mika
Date
2021

 
The digitalisation of societies, working life, and education is changing their forms and practices. As a component of digitalisation and new ways of operating in a digital domain, change has also brought with it new risks for the digital operating environment. ICT infrastructure constitutes a critical new development, and cybersecurity competency needs for managing digital domains are growing and evolving. To provide the knowledge and skills needed for working life, education and training environments must also evolve in response to change. As part of cybersecurity education, cybersecurity exercises have an established position in competency development. This study examined the pedagogical principles of cybersecurity training and identified the pedagogical requirements for a comprehensive cyber arenastyle education platform. The learning of individuals was measured through both on-site and online cybersecurity exercises. Methodologies for evaluating cybersecurity exercises were studied as part of the exercise lifecycle. The study also examined the requirements for continuous learning from both curriculum design and cybersecurity in-service training perspectives. Keywords: cybersecurity, cybersecurity exercise, cybersecurity education, inservice training, cyber range, cyber arena, pedagogy ...
 
Yhteiskuntien, työelämän ja koulutuksen digitalisoituminen muuttaa kaikkien edellä mainittujen muotoa ja toimintatapoja. Osana digitalisoitumista ja sen mukanaan tuomia uusia toimintatapoja on muutos tuonut mukanaan myös uusia digitaaliseen toimintaympäristöön liittyviä riskejä. ICT-infrastruktuuri muodostaa kaikkinensa uuden kriittisen infrastruktuurin, jonka hallitsemiseksi kyberturvallisuuden osaamistarpeet kasvavat ja kehittyvät koko ajan. Jotta koulutuksessa kyetään antamaan sellaiset tiedot ja taidot, joita työelämässä tarvitaan, tulee myös koulutuksen ja koulutusympäristöjen kehittyä muutoksen mukana. Osana kyberturvallisuuden koulutusta on kyberturvallisuuden harjoitustoiminta vakiinnuttanut asemansa osaamisen kehittämisessä. Tässä tutkimuksessa tutkittiin kyberturvallisuusharjoittelun pedagogisia periaatteita ja niiden mukaisesti muodostettiin Cyber Arena -tyylisen kyberturvallisuuden harjoitusalustan pedagogiset vaatimukset. Yksilön oppimista kyberturvallisuusharjoituksessa mitattiin On-Site- sekä On-Line-metodilla järjestetyssä harjoituksessa. Kyberharjoitusten arvioinnin metodologiaa tutkittiin osana harjoituksen elinkaaren toiminteita. Tutkimuksessa tutkittiin myös jatkuvan oppimisen vaatimuksia niin opetussuunnitelmien suunnittelutyön kuin täydennyskoulutuksena annettavien kyberturvallisuusharjoitusten näkökulmasta. Avainsanat: kyberturvallisuus, kyberturvallisuusharjoitus, kyberturvallisuuskoulutus, täydennyskoulutus, kyberturvallisuusharjoitusalusta, pedagogiikka ...
 
ISBN
978-951-39-8738-1
Contains publications
  • Artikkeli I: Hautamäki, J., Karjalainen, M., Hämäläinen, T., & Häkkinen, P. (2019). Cyber security exercise: Literature review of pedagogical methodology. In L. G. Chova, A. L. Martínez, & I. C. Torres (Eds.), INTED 2019: 13th Annual International Technology, Education and Development Conference, Proceedings (pp. 3893–3898). IATED. DOI: 10.21125/inted.2019
  • Artikkeli II: Karjalainen, M., Kokkonen, T. & Puuska, S. (2019). Pedagogical aspects of cyber security exercises. In 2019 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW), 103-108. IEEE. DOI: 10.1109/EuroSPW.2019.00018
  • Artikkeli III: Karjalainen, M, Puuska, S, & Kokkonen, T. (2020). Measuring learning in a cyber security exercise. In ICETC'20: 2020 12th International Conference on Education Technology and Computers (pp. 205-209). ACM, New York.DOI: 10.1145/3436756.3437046
  • Artikkeli IV: Karjalainen, M. & Kokkonen, T. (2020). Comprehensive cyber arena: The next generation cyber range. In 2020 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW) (pp. 11-16). IEEE. DOI: 10.1109/EuroSPW51379.2020.00011
  • Artikkeli V: Karjalainen, M. & Kokkonen, T. (2020). Comprehensive cyber arena: The next generation cyber range. In 2020 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW), 11-16. IEEE. DOI: 10.25046/aj050572
  • Artikkeli VI: Karjalainen, M., Kokkonen, T., & Taari, N. (2021). Key elements of on-line cyber security exercise and survey of learning during the on-line cyber security exercise. In Cyber Security: Critical Infrastructure Protection. Springer, to appear.
  • Artikkeli VII: Saharinen, K., Karjalainen, M., & Kokkonen, T. (2019). A design model for a degree programme in cyber security. In ICETC 2019: Proceedings of the 2019 11th International Conference on Education Technology and Computers. DOI: 10.1145/3369255.3369266 (pp. 3–7). ACM, New York.
  • Artikkeli VIII: Rantonen, M. & Karjalainen, M. (2020). Conversion of emerging ICT- technology info curriculum courses. Journal of Strategic Innovation and Sustainability, 15(3), 70–77. DOI: 10.21125/inted.2020.2150
  • Artikkeli IX Karjalainen, M. & Ojala, A-L. (2021). Authentic learning environment for in-service trainings of cyber security: A qualitative study. International Journal of Continuing Engineering Education and Life-Long Learning. Accepted/In print.
URI

http://urn.fi/URN:ISBN:978-951-39-8738-1

Metadata
Show full item record
Collections
  • Väitöskirjat [3178]

Related items

Showing items with similar title or keywords.

  • Cyber security exercise : Literature review to pedagogical methodology 

    Hautamäki, J.; Karjalainen, M.; Hämäläinen, Timo; Häkkinen, Päivi (IATED Academy, 2019)
    This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future ...
  • Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity 

    Shaikh, Faheem Ahmed; Siponen, Mikko (Elsevier, 2023)
    Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be ...
  • Desired cybersecurity skills and skills acquisition methods in the organizations 

    Aaltola, Kirsi; Ruoslahti, Harri; Heinonen, Jarmo (Academic Conferences International Ltd, 2022)
    Key personnel and their competences play important roles in continuity management and improving resilience of cybersecurity in organizations. Researchers have addressed many topics and studies in the cybersecurity domain. ...
  • Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime 

    Rauhala, Juhani; Tyrväinen, Pasi; Zaidenberg, Nezer (IGI Global, 2020)
    The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and ...
  • Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach 

    Rathod, Paresh; Hämäläinen, Timo (Academic Conferences International, 2020)
    In recent times, major cybersecurity breaches and cyber fraud within the public and private sectors are making international headlines. Majority of organisations are facing cybersecurity adversity and advanced threats. On ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre