Capture-the-Flag: Learning Computer Security Under Fire
Clark John L.
MetadataShow full item record
In this paper, we describe the Capture-the-Flag (CTF) activity and argue that it contributes to a necessary component of the computer security curriculum. This component is the study of software vulnerability investigation. It is currently not properly emphasized in this curriculum. We discuss reasons for this situation and we go on to describe how CTF can be useful for educating students within this focus. CTF helps develop those computer security skills that enable students to identify new vulnerabilities before those with malicious intent find them. It also helps them to hone the core computer security skills. with malicious intent find them. It also helps them to hone the core computer security skills.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Wai, Hor Cheong (Monterey, California. Naval Postgraduate School, 2002-06);Computer Forensics involves the preservation, identification, extraction and documentation of computer evidence stored in the form of magnetically encoded information. With the proliferation of E-commerce initiatives and ...
Buchner, Michael S. (Monterey, California. Naval Postgraduate School, 1992-09);The fear of technology, particularly computers, appears to be widespread. this thesis defines computer fear and anxiety, its consequences, and provides recommendations to reduce its impact. Further, it attempts to quantify ...
Gray, Gary Kenneth. (Monterey, California. Naval Postgraduate School, 1983);Guidelines and discussions are presented for computer performance evaluation at two levels. The first level, Computer Performance Management (CPM) or Macro Performance Evaluation, involves an overall computer performance ...