skip to main content
10.1145/2792404.2792406acmconferencesArticle/Chapter ViewAbstractPublication PagesisstaConference Proceedingsconference-collections
short-paper

Code hunt as platform for gamification of cybersecurity training

Published:14 July 2015Publication History

ABSTRACT

The nation needs more cybersecurity professionals. Beyond just a general shortage, women, African Americans, and Latino Americans are underrepresented in the field. This not only contributes to the scarcity of qualified cybersecurity professionals, but the absence of diversity leads to a lack of perspective and differing viewpoints. Part of the problem is that cybersecurity suffers from barriers to entry that include expensive training, exclusionary culture, and the need for costly infrastructure. In order for students to start learning about cybersecurity, access to training, infrastructure and subject matter experts is imperative. The existing Code Hunt framework, used to help students master programming, could be a springboard to help reduce the challenges facing students interested in cybersecurity. Code Hunt offers gamification, community supported development, and a cloud infrastructure that provides an on-ramp to immediate learning. Leveraging Code Hunt's structured gaming model can addresses these weaknesses and makes cybersecurity training more accessible to those without the means or inclination to participate in more traditional cybersecurity competitions.

References

  1. J. A. Amorim, M. Hendrix, S. F. Andler, and P. M. Gustavsson. Gamified Training for Cyber Defence. In NATO Modelling and Simulation Group MSG Annual Conference. North Atlantic Treaty Organization, 2013.Google ScholarGoogle Scholar
  2. J. Bishop, R. N. Horspool, T. Xie, and N. Tillmann. Code Hunt: Experience with coding contests at scale. Proc ICSE, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  3. S. Combéfis and J. Wautelet. Programming Trainings and Informatics Teaching Through Online Contests. Olympiads in Informatics, 8:21–34, 2014.Google ScholarGoogle Scholar
  4. M. C. Libicki, D. Senty, and J. Pollak. Hackers Wanted: An Examination of the Cybersecurity Labor Market. Hackers Wanted: An Examination of the Cybersecurity Labor Market, June 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Nowicki, M. Matuszak, and A. Kwiatkowska. Teaching secondary school students programming using distance learning: a case study. In 10th IFIP World Conference on Computer in Education, pages 246–254, Toru´ n, Poland, 2013. Nicolaus Copernicus University Press.Google ScholarGoogle Scholar
  6. R. Shumba, K. Ferguson-Boucher, E. Sweedyk, C. Taylor, G. Franklin, C. Turner, C. Sande, G. Acholonu, R. Bace, and L. Hall. Cybersecurity, women and minorities: findings and recommendations from a preliminary investigation. In Proceedings of the 2013 Conference on Innovation and technology in Computer Ccience Education Working Group Reports. ACM, June 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. Sommestad and J. Hallberg. Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments. In Secure IT Systems, pages 47–60. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Tillmann, J. de Halleux, T. Xie, S. Gulwani, and J. Bishop. Teaching and learning programming and software engineering via interactive gaming. In ICSE ’13: Proceedings of the 2013 International Conference on Software Engineering. IEEE Press, May 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. Xie, J. Bishop, N. Tillmann, and J. de Halleux. Gamifying software security education and training via secure coding duels in code hunt. HotSoS, pages 26–2, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Code hunt as platform for gamification of cybersecurity training

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CHESE 2015: Proceedings of the 1st International Workshop on Code Hunt Workshop on Educational Software Engineering
            July 2015
            15 pages
            ISBN:9781450337113
            DOI:10.1145/2792404

            Copyright © 2015 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 14 July 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper

            Upcoming Conference

            ISSTA '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader