OŠLEJŠEK, Radek and Tomáš PITNER. Optimization of Cyber Defense Exercises Using Balanced Software Development Methodology. International Journal of Information Technologies and Systems Approach. IGI Global, 2021, vol. 14, No 1, p. 136-155. ISSN 1935-570X. Available from: https://dx.doi.org/10.4018/IJITSA.2021010108.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Optimization of Cyber Defense Exercises Using Balanced Software Development Methodology
Authors OŠLEJŠEK, Radek (203 Czech Republic, guarantor, belonging to the institution) and Tomáš PITNER (203 Czech Republic, belonging to the institution).
Edition International Journal of Information Technologies and Systems Approach, IGI Global, 2021, 1935-570X.
Other information
Original language English
Type of outcome Article in a journal
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher United States of America
Confidentiality degree is not subject to a state or trade secret
WWW Permalink to the web of publisher
RIV identification code RIV/00216224:14330/21:00120611
Organization unit Faculty of Informatics
Doi http://dx.doi.org/10.4018/IJITSA.2021010108
UT WoS 000644820000009
Keywords in English Cybersecurity; Training; Learning; Phase; Discipline; Agile; Disciplined; Cyber Range; Development Method; CDX; SPEM
Tags International impact, Reviewed
Changed by Changed by: doc. RNDr. Radek Ošlejšek, Ph.D., učo 3636. Changed: 7/7/2021 12:54.
Abstract
Cyber defense exercises (CDXs) represent an effective way to train cybersecurity experts. However, their development is lengthy and expensive. The reason lies in current practice where the CDX life cycle is not sufficiently mapped and formalized, and then exercises are developed ad-hoc. However, the CDX development shares many aspects with software development, especially with ERP systems. This paper presents a generic CDX development method that has been derived from existing CDX life cycles using the SPEM standard meta-model. The analysis of the method revealed bottlenecks in the CDX development process. Observations made from the analysis and discussed in the paper indicate that the organization of CDXs can be significantly optimized by applying a balanced mixed approach with agile preparation and plan-driven disciplined evaluation.
Links
EF16_019/0000822, research and development projectName: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur
Type Name Uploaded/Created by Uploaded/Created Rights
2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.pdf Licence Creative Commons  File version Ošlejšek, R. 13/4/2022

Properties

Address within IS
https://is.muni.cz/auth/publication/1651536/2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.pdf
Address for the users outside IS
https://is.muni.cz/publication/1651536/2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.pdf
Address within Manager
https://is.muni.cz/auth/publication/1651536/2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.pdf?info
Address within Manager for the users outside IS
https://is.muni.cz/publication/1651536/2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.pdf?info
Uploaded/Created
Wed 13/4/2022 12:56, doc. RNDr. Radek Ošlejšek, Ph.D.

Rights

Right to read
  • anyone on the Internet
  • a concrete person doc. RNDr. Radek Ošlejšek, Ph.D., učo 3636
  • a concrete person prof. RNDr. Tomáš Pitner, Ph.D., učo 94
Right to upload
 
Right to administer:
  • a concrete person doc. RNDr. Radek Ošlejšek, Ph.D., učo 3636
  • a concrete person prof. RNDr. Tomáš Pitner, Ph.D., učo 94
Attributes
 

2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.pdf

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1651536/2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.pdf
Address for the users outside IS
https://is.muni.cz/publication/1651536/2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.pdf
File type
PDF (application/pdf)
Size
1,7 MB
Hash md5
2e4325144392b848aef286015b0ceaa5
Uploaded/Created
Wed 13/4/2022 12:56

2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology_Archive.pdf

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1651536/2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology_Archive.pdf
Address for the users outside IS
https://is.muni.cz/publication/1651536/2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology_Archive.pdf
File type
PDF/A (application/x-pdf)
Size
10,3 MB
Hash md5
bfdae66c60e67a581365808292335869
Uploaded/Created
Wed 13/4/2022 13:18

2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.txt

Application
Open the file
Download file.
Address within IS
https://is.muni.cz/auth/publication/1651536/2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.txt
Address for the users outside IS
https://is.muni.cz/publication/1651536/2021-IJITSA-optimization-cyber-defense-exercises-using-balanced-software-development-methodology.txt
File type
plain text (text/plain)
Size
69,3 KB
Hash md5
83d9f6d64089f68e5c10bab58c246f20
Uploaded/Created
Wed 13/4/2022 13:20
Print
Report a file uploaded without authorization. Displayed: 25/4/2024 19:02