Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi !

Computer-based Methods for Assessing Information Security Competencies (CROSBI ID 676712)

Prilog sa skupa u zborniku | izvorni znanstveni rad | međunarodna recenzija

Deljkić, Žad ; Pale, Predrag ; Petrović, Juraj Computer-based Methods for Assessing Information Security Competencies // MIPRO / Skala, Karolj (ur.). 2019. str. 1697-1702 doi: 10.23919/MIPRO.2019.8757201

Podaci o odgovornosti

Deljkić, Žad ; Pale, Predrag ; Petrović, Juraj

engleski

Computer-based Methods for Assessing Information Security Competencies

With the growing importance of information security and cybersecurity, there is a widely recognized need for more security experts and a higher level of security education among all members of society. Effective methods for assessing information security competencies are a necessary prerequisite for developing, evaluating and improving security education. Procedural knowledge is a key part of information security competencies. In the context of information security, assessment methods such as written exams are often inadequate for assessing procedural knowledge, because with such methods, the person being assessed must explain what they would do in a certain situation instead of actually doing it. On the other hand, computer-based assessment methods can place a person in an authentic environment where he can directly react to a simulated situation and apply his knowledge. In the information security domain, such computer-based methods are therefore a natural solution for a direct assessment of procedural knowledge. In this paper, a list of requirements for evaluating assessment methods of information security competencies is proposed. These requirements are primarily focused on delivering an assessment that is both effective and feasible for use in education. Existing assessment methods are surveyed through the lens of these requirements.

computer based assessment ; formative assessment ; procedural knowledge ; security education ; information security ; cybersecurity ; security ; cyber range ; cyber exercise ; cyber defense exercise ; security competitons ; capture-the-flag ; capture the flag ; CTF ; virtual learning environment ; simulation ; scalable assessment ; automatic assessment ; automatic problem generation ; automatic scoring ; gamification ; security mindset ; adverserial thinking

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o prilogu

1697-1702.

2019.

objavljeno

10.23919/MIPRO.2019.8757201

Podaci o matičnoj publikaciji

MIPRO, 2019 Proceedings of the 42nd International Convention

Skala, Karolj

Rijeka:

1847-3946

Podaci o skupu

MIPRO 2019

predavanje

20.05.2019-24.05.2019

Opatija, Hrvatska

Povezanost rada

Računarstvo

Poveznice
Indeksiranost