Capture-the-Flag: Learning Computer Security Under Fire
Clark John L.
MetadataShow full item record
In this paper, we describe the Capture-the-Flag (CTF) activity and argue that it contributes to a necessary component of the computer security curriculum. This component is the study of software vulnerability investigation. It is currently not properly emphasized in this curriculum. We discuss reasons for this situation and we go on to describe how CTF can be useful for educating students within this focus. CTF helps develop those computer security skills that enable students to identify new vulnerabilities before those with malicious intent find them. It also helps them to hone the core computer security skills. with malicious intent find them. It also helps them to hone the core computer security skills.
Showing items related by title, author, creator and subject.
MacLennan, Bruce J. (Monterey, California. Naval Postgraduate School, 1987-09); NPS52-87-040Most current AI technology has been based on propositionally represented theoretical knowledge. It is argued that if AI is to accomplish its goals, especially in the tasks of sensory interpretation and sensorimotor ...
McCay, M. Eric; Stanica, Pantelimon; Butler, Jon T. (2012-09);Algebraic immunity (Al) is a property of a Boolean function f that measures its susceptibility to an alebraic attack. If f has a low algebraic immunity and f is used in an encryption protocol, then there are ways to ...
Freund, Richard F.; Michael Gherrity; Stephen Ambrosius; Mark Campbell Y.; Mike Halderman; Hensgen, Debra Z.; Elaine Keith Y.; Taylor Kidd; Matt Kussow Y.; John D. Lima Y; Francesca Mirabile; Lantz Moore; Brad Rust Y.; H. J. Siegel (1998);It is increasingly common for computer users to have access to several computers on a network, and hence tobe able to execute many of their tasks on any of several computers. The choice of which computers execute which ...