Abstract
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations. Consequently, the need for security-aware employees in every role of an organisation increases in accordance. Cyber Range training emerges as a promising solution, allowing employees to train in both realistic environments and scenarios and gaining hands-on experience in security aspects of varied complexity, depending on their role and level of expertise. To that end, this work introduces a model-driven approach for Cyber Range training that facilitates the generation of tailor-made training scenarios based on a comprehensive model-based description of the organisation and its security posture. Additionally, our approach facilitates the auto- mated deployment of such training environments, tailored to each defined scenario, through simulation and emulation means. To further highlight the usability of the proposed approach, this work also presents scenarios focusing on phishing threats, with increasing level of complexity and difficulty.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
A guide to the Internet of Things (2015). https://www-ssl.intel.com/content/www/us/en/internet-of-things/infographics/guide-to-iot.html
Rantos, K., Fysarakis, K., Manifavas, C.: How effective is your security awareness program? An evaluation methodology. Inf. Secur. J.: Glob. Perspect. 21(6), 328–345 (2012)
Lack of Security Awareness Training Leaves Healthcare Organizations Exposed to Cyberattacks. https://www.hipaajournal.com/lack-of-security-awareness-training-healthcare-cyberattacks/
ENISA Smart Grid Security. https://www.enisa.europa.eu/topics/critical-information-infrastructures-and-services/smart-grids/smart-grids-and-smart-metering/ENISA_Annex%20II%20-%20Security%20Aspects%20of%20Smart%20Grid.pdf
National Vulnerability Database (NVD). NIST. https://www.nist.gov/programs-projects/national-vulnerability-database-nvd
Lagazio, M., Barnard-Wills, D., Rodrigues, R., Wright, D.: Certification Schemes for Cloud Computing. EU Commission Report, Digital Agenta for Europe (2014)
CUMULUS Project. Certification infrastructure for multi-layer cloud services project. D2.2 Certification models (2012). http://cordis.europa.eu/docs/projects/cnect/0/318580/080/deliverables/001-D22Certificationmodelsv1.pdf
Cloud Security Alliance, CSA Security, Trust and Assurance Registry (STAR). https://cloudsecurityalliance.org/star/
EuroCloud Start Audit. https://resilience.enisa.europa.eu/cloud-computing-certification/list-of-cloud-certification-schemes/eurocloud-star-audit
GNS3. https://www.gns3.com/
Netkit. http://wiki.netkit.org/
OMNet++ Discrete Event Simulator. http://www.omnetpp.org
OpenStack. https://www.openstack.org/
Docker. https://www.docker.com/
OWASP Attack Categories. OWASP. https://www.owasp.org/index.php/Category:Attack
ENISA. https://www.enisa.europa.eu/
CIPSEC-EU Project. http://www.cipsec.eu/
Kaspersky Interactive Protection Simulation (KIPS). https://www.kaspersky.com/enterprise-security/security-awareness
MediaPro’s Adaptive Awareness Portal. http://www.mediapro.com/adaptive-awareness-framework/adaptive-awareness-portal
Sophos Phish Threat. https://www.sophos.com/en-us/products/phish-threat.aspx
Inspired eLearning’s Security Awareness Training. https://inspiredelearning.com/security-awareness/
Amorim, J.A., et al.: Gamified Training for Cyber Defence: Methods and Automated Tools for Situation and Threat Assessment (2013)
Boopathi, K., et al.: Learning Cyber Security Through Gamification (2015)
PwC’s Game of Threats. https://www.pwc.co.uk/issues/cyber-security-data-privacy/services/game-of-threats.html
Jasima Discrete Event Simulator. https://www.simplan.de/en/software-2/jasima/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Somarakis, I., Smyrlis, M., Fysarakis, K., Spanoudakis, G. (2020). Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective. In: Fournaris, A., et al. Computer Security. IOSEC MSTEC FINSEC 2019 2019 2019. Lecture Notes in Computer Science(), vol 11981. Springer, Cham. https://doi.org/10.1007/978-3-030-42051-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-42051-2_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-42050-5
Online ISBN: 978-3-030-42051-2
eBook Packages: Computer ScienceComputer Science (R0)