Analysis of Cyber Security Knowledge and Skills for Capture the Flag Competition
dc.contributor.advisor | ., Nelmiawati | |
dc.contributor.author | Gilbert,Joy | |
dc.contributor.author | Tirstan,Jean | |
dc.date.accessioned | 2025-01-04T01:42:46Z | |
dc.date.issued | 2022-04-12 | |
dc.description | In the past six years, Capture The Flag (CTF) competitions have become crucial for advancing cybersecurity education. To ensure continued growth, it's important to evaluate the progress made. This research analyzes around 500 CTF solutions from the CTFtime platform to identify the necessary skills and techniques for different types of CTF challenges. These findings were used to create questions for the PCT (Polibatam Cyber Team) regeneration platform, a team of Cyber Security Engineering students. Unlike other CTFs, our approach focuses on skill and technique development, which has successfully engaged 80% of participants, helping them improve their cybersecurity skills in a competitive setting. | |
dc.description.abstract | CTF (Capture The Flag) competitions have emerged as a pivotal instrument in development of cyber security education over the past six years. It is imperative to ensure that the CTF competitions continue to develop to facilitate growth of cyber security education. To achieve the desired growth, it is necessary to analyze the progress achieved in the last six years the program has been implemented. This research collects and analyzes approximately 500 CTF solutions from the CTFtime platform. From the results of this analysis, we have identified that skills and techniques are needed in each category of CTF questions. We use the results of this analysis as a reference for questions on the CTF Platform that we created during PCT (Polibatam Cyber Team) regeneration. PCT consists of a group of students from the Cyber Security Engineering study program who are prepared to be at the forefront in participating in various activities related to Cyber Security.The method we use is different from other CTFs, in thatwe use a skill-based and technique-based approach. We found that this approach was able to attract 80% of participants in solving and improving their skills in Cyber Security towards any challenges in a competitive environment. | |
dc.identifier.citation | IEEE | |
dc.identifier.issn | 2548-9828 | |
dc.identifier.kodeprodi | KODEPRODI57302#REKAYASA KEAMANAN SIBER | |
dc.identifier.nidn | NIDN0029088902 | |
dc.identifier.nim | NIM4332001026 | |
dc.identifier.nim | NIM4332001016 | |
dc.identifier.uri | http://103.209.1.147:4000/handle/PL029/3239 | |
dc.language.iso | en_US | |
dc.publisher | Jurnal Integrasi | |
dc.relation.ispartofseries | 14; 1 | |
dc.subject | SOCIAL SCIENCES::Statistics, computer and systems science::Informatics, computer and systems science::Information technology | |
dc.subject | SOCIAL SCIENCES::Social sciences::Education | |
dc.title | Analysis of Cyber Security Knowledge and Skills for Capture the Flag Competition | |
dc.type | Article |
Files
Original bundle
1 - 3 of 3
Repository Politeknik Negeri Batam
- Name:
- 4332001026_Tugas Akhir/Artikel.pdf
- Size:
- 237.33 KB
- Format:
- Adobe Portable Document Format
Repository Politeknik Negeri Batam
- Name:
- Lembar_Pengesahan.pdf
- Size:
- 85.24 KB
- Format:
- Adobe Portable Document Format
Repository Politeknik Negeri Batam
- Name:
- Borang_Publikasi.pdf
- Size:
- 139.3 KB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
Repository Politeknik Negeri Batam
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: