Vis enkel innførsel

dc.contributor.authorYamin, Muhammad Mudassar
dc.contributor.authorTorseth, Espen
dc.contributor.authorLaszlo, Erdodi
dc.contributor.authorKatt, Basel
dc.date.accessioned2023-03-02T15:26:49Z
dc.date.available2023-03-02T15:26:49Z
dc.date.created2023-02-23T16:44:54Z
dc.date.issued2022
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/3055524
dc.description.abstractCyber security is a big challenge nowadays. However, the lack of qualified individuals and awareness is making the current situation more problematic. One way to address this problem is through National cyber security competitions. Such competitions provide large-scale awareness of cyber security issues and motivate individuals to join the cyber security workforce. ENISA (European Network and Information Security Argent) motivated European countries to organize national-level cyber security competitions in early 2014, similar to national-level football competitions. After that, ENISA organized a European-level competition similar to UEFA football league in which multiple countries participated with their national teams. This cyber security competition is known as a ECSC (European Cyber Security Challenge). Individuals aged between 14–25 participate and try to solve different cyber security challenges related to web, forensics, crypto, OSINT (Open Source Intelligence), and reversing. To select individuals and to teach those skills, different countries apply different strategies. In this study, we focus on how different countries select cyber talent and train them for national competitions and how they impact their overall cyber security ecosystem to produce skilled individuals for a cyber security workforce.en_US
dc.language.isoengen_US
dc.publisherSpringeren_US
dc.titleSelecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Studyen_US
dc.title.alternativeSelecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Studyen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.volume13310en_US
dc.source.journalLecture Notes in Computer Science (LNCS)en_US
dc.identifier.doihttps://doi.org/10.1007/978-3-031-05457-0_24
dc.identifier.cristin2128708
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel