Pedagogical Basis of Live Cybersecurity Exercises
The digitalisation of societies, working life, and education is changing their forms
and practices. As a component of digitalisation and new ways of operating in a
digital domain, change has also brought with it new risks for the digital operating
environment. ICT infrastructure constitutes a critical new development, and
cybersecurity competency needs for managing digital domains are growing and
evolving. To provide the knowledge and skills needed for working life, education
and training environments must also evolve in response to change. As part of
cybersecurity education, cybersecurity exercises have an established position in
competency development.
This study examined the pedagogical principles of cybersecurity training
and identified the pedagogical requirements for a comprehensive cyber arenastyle
education platform. The learning of individuals was measured through
both on-site and online cybersecurity exercises. Methodologies for evaluating
cybersecurity exercises were studied as part of the exercise lifecycle. The study
also examined the requirements for continuous learning from both curriculum
design and cybersecurity in-service training perspectives.
Keywords: cybersecurity, cybersecurity exercise, cybersecurity education, inservice
training, cyber range, cyber arena, pedagogy
...
Yhteiskuntien, työelämän ja koulutuksen digitalisoituminen muuttaa kaikkien
edellä mainittujen muotoa ja toimintatapoja. Osana digitalisoitumista ja sen mukanaan
tuomia uusia toimintatapoja on muutos tuonut mukanaan myös uusia digitaaliseen
toimintaympäristöön liittyviä riskejä. ICT-infrastruktuuri muodostaa
kaikkinensa uuden kriittisen infrastruktuurin, jonka hallitsemiseksi kyberturvallisuuden
osaamistarpeet kasvavat ja kehittyvät koko ajan. Jotta koulutuksessa kyetään
antamaan sellaiset tiedot ja taidot, joita työelämässä tarvitaan, tulee myös
koulutuksen ja koulutusympäristöjen kehittyä muutoksen mukana. Osana kyberturvallisuuden
koulutusta on kyberturvallisuuden harjoitustoiminta vakiinnuttanut
asemansa osaamisen kehittämisessä.
Tässä tutkimuksessa tutkittiin kyberturvallisuusharjoittelun pedagogisia periaatteita
ja niiden mukaisesti muodostettiin Cyber Arena -tyylisen kyberturvallisuuden
harjoitusalustan pedagogiset vaatimukset. Yksilön oppimista kyberturvallisuusharjoituksessa
mitattiin On-Site- sekä On-Line-metodilla järjestetyssä harjoituksessa.
Kyberharjoitusten arvioinnin metodologiaa tutkittiin osana harjoituksen
elinkaaren toiminteita. Tutkimuksessa tutkittiin myös jatkuvan oppimisen vaatimuksia
niin opetussuunnitelmien suunnittelutyön kuin täydennyskoulutuksena
annettavien kyberturvallisuusharjoitusten näkökulmasta.
Avainsanat: kyberturvallisuus, kyberturvallisuusharjoitus, kyberturvallisuuskoulutus,
täydennyskoulutus, kyberturvallisuusharjoitusalusta, pedagogiikka
...




ISBN
978-951-39-8738-1Contains publications
- Artikkeli I: Hautamäki, J., Karjalainen, M., Hämäläinen, T., & Häkkinen, P. (2019). Cyber security exercise: Literature review of pedagogical methodology. In L. G. Chova, A. L. Martínez, & I. C. Torres (Eds.), INTED 2019: 13th Annual International Technology, Education and Development Conference, Proceedings (pp. 3893–3898). IATED. DOI: 10.21125/inted.2019
- Artikkeli II: Karjalainen, M., Kokkonen, T. & Puuska, S. (2019). Pedagogical aspects of cyber security exercises. In 2019 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW), 103-108. IEEE. DOI: 10.1109/EuroSPW.2019.00018
- Artikkeli III: Karjalainen, M, Puuska, S, & Kokkonen, T. (2020). Measuring learning in a cyber security exercise. In ICETC'20: 2020 12th International Conference on Education Technology and Computers (pp. 205-209). ACM, New York.DOI: 10.1145/3436756.3437046
- Artikkeli IV: Karjalainen, M. & Kokkonen, T. (2020). Comprehensive cyber arena: The next generation cyber range. In 2020 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW) (pp. 11-16). IEEE. DOI: 10.1109/EuroSPW51379.2020.00011
- Artikkeli V: Karjalainen, M. & Kokkonen, T. (2020). Comprehensive cyber arena: The next generation cyber range. In 2020 IEEE European Symposium on Security and Privacy Workshops (Euro S&PW), 11-16. IEEE. DOI: 10.25046/aj050572
- Artikkeli VI: Karjalainen, M., Kokkonen, T., & Taari, N. (2021). Key elements of on-line cyber security exercise and survey of learning during the on-line cyber security exercise. In Cyber Security: Critical Infrastructure Protection. Springer, to appear.
- Artikkeli VII: Saharinen, K., Karjalainen, M., & Kokkonen, T. (2019). A design model for a degree programme in cyber security. In ICETC 2019: Proceedings of the 2019 11th International Conference on Education Technology and Computers. DOI: 10.1145/3369255.3369266 (pp. 3–7). ACM, New York.
- Artikkeli VIII: Rantonen, M. & Karjalainen, M. (2020). Conversion of emerging ICT- technology info curriculum courses. Journal of Strategic Innovation and Sustainability, 15(3), 70–77. DOI: 10.21125/inted.2020.2150
- Artikkeli IX Karjalainen, M. & Ojala, A-L. (2021). Authentic learning environment for in-service trainings of cyber security: A qualitative study. International Journal of Continuing Engineering Education and Life-Long Learning. Accepted/In print.
Metadata
Show full item recordCollections
- Väitöskirjat [3178]
Related items
Showing items with similar title or keywords.
-
Cyber security exercise : Literature review to pedagogical methodology
Hautamäki, J.; Karjalainen, M.; Hämäläinen, Timo; Häkkinen, Päivi (IATED Academy, 2019)This paper is a literature review, where we try to find out pedagogical principles has used in different virtual or simulated industry learning environments. The purpose is to use these findings to create in the future ... -
Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity
Shaikh, Faheem Ahmed; Siponen, Mikko (Elsevier, 2023)Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be ... -
Desired cybersecurity skills and skills acquisition methods in the organizations
Aaltola, Kirsi; Ruoslahti, Harri; Heinonen, Jarmo (Academic Conferences International Ltd, 2022)Key personnel and their competences play important roles in continuity management and improving resilience of cybersecurity in organizations. Researchers have addressed many topics and studies in the cybersecurity domain. ... -
Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime
Rauhala, Juhani; Tyrväinen, Pasi; Zaidenberg, Nezer (IGI Global, 2020)The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and ... -
Leveraging the benefits of big data with fast data for effective and efficient cybersecurity analytics systems : A robust optimisation approach
Rathod, Paresh; Hämäläinen, Timo (Academic Conferences International, 2020)In recent times, major cybersecurity breaches and cyber fraud within the public and private sectors are making international headlines. Majority of organisations are facing cybersecurity adversity and advanced threats. On ...