Cyber Security studies at JAMK and RUAS : Designing cyber security exercises for S.A.R.E.N. Cyber Range
Puumalainen, Pasi (2019)
Puumalainen, Pasi
2019
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2019060414614
https://urn.fi/URN:NBN:fi:amk-2019060414614
Tiivistelmä
JAMK University of Applied Sciences offers cyber security students the opportunity to go to Rotterdam University of Applied Sciences as an exchange student. During this exchange period an opportunity arose for writing a thesis about researching and comparing cyber security studies in these two institutes. This included designing cyber security related exercises to a cyber security training environment which was being built by a Dutch student. The idea for this training environment was initiated by a lecturer of the Security Lab minor who visited JAMK and JYVSECTEC’s facilities to familiarize himself with the RGCE.
The research was divided into two parts. Studying and comparing cyber security related studies at JAMK and RUAS, and designing different cyber security exercise scenarios for the prototype of the training environment (S.A.R.E.N.) that was being built concurrently.
As a result, a clear picture was achieved of cyber security studies and their differences between the schools, which enabled reflection for suggestions to combine and improve the courses. Consideration for ways to increase collaboration between the institutes was also conducted. The available equipment was used for creating a prototype of the cyber range training environment, which can be further developed and expanded as needed by adding various services. Different types of exercises related to cyber security were designed to be implemented into the environment.
The differences between the degrees at JAMK and RUAS exist due to the fact that JAMK offers more cyber security related courses than RUAS and they provide a practice environment for this purpose, which enables suitable exercises to be arranged. RUAS’s equivalent for this practice environment has been built only in the form of a prototype.
The research was divided into two parts. Studying and comparing cyber security related studies at JAMK and RUAS, and designing different cyber security exercise scenarios for the prototype of the training environment (S.A.R.E.N.) that was being built concurrently.
As a result, a clear picture was achieved of cyber security studies and their differences between the schools, which enabled reflection for suggestions to combine and improve the courses. Consideration for ways to increase collaboration between the institutes was also conducted. The available equipment was used for creating a prototype of the cyber range training environment, which can be further developed and expanded as needed by adding various services. Different types of exercises related to cyber security were designed to be implemented into the environment.
The differences between the degrees at JAMK and RUAS exist due to the fact that JAMK offers more cyber security related courses than RUAS and they provide a practice environment for this purpose, which enables suitable exercises to be arranged. RUAS’s equivalent for this practice environment has been built only in the form of a prototype.
Kokoelmat
Samankaltainen aineisto
Näytetään aineisto, joilla on samankaltaisia nimekkeitä, tekijöitä tai asiasanoja.
-
Comprehensive cyber arena; the next generation cyber range
Karjalainen, Mika; Kokkonen, Tero (IEEE, 2020)The cyber domain and all the interdependencies between networked systems form an extremely complex ensemble. Incidents in the cyber domain may have an abundance effect on the physical domain. For example, a cyber attack ... -
Analysing and protecting against existing cyber attacks
Lamberti, Lorenzo (2019)Too often, companies tend to underestimate the importance of cyber security. Either too expensive or too complicated, cyber security measures are sometimes overlooked and some systems reveal to be openly vulnerable to any ... -
The Operative Level Perception of Cyber crime (Threats and Prevention ) in a Logistic Company
Odhomi, Elohor Eddy (2021)The Thesis work has explored the effects of cybercrime and their motives behind the actions of the hackers for taking such an act, in disrupting companies services, networks, and most obviously, the financial consequences ...