This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessArticle
A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats
by
Yongjoo Shin
Yongjoo Shin 1,†,
Hyukjin Kwon
Hyukjin Kwon 2,†,
Jaeyeong Jeong
Jaeyeong Jeong 3,4 and
Dongkyoo Shin
Dongkyoo Shin 3,4,*
1
Center for Military Analysis and Planning, Korea Institute for Defense Analyses, Seoul 02455, Republic of Korea
2
Department of Protection and Safety Engineering, Seoul National University of Science and Technology, Seoul 01811, Republic of Korea
3
Department of Computer Engineering, Sejong University, Seoul 05006, Republic of Korea
4
Department of Convergence Engineering for Intelligent Drones, Sejong University, Seoul 05006, Republic of Korea
*
Author to whom correspondence should be addressed.
†
These authors contributed equally to this work.
Electronics 2024, 13(19), 3867; https://doi.org/10.3390/electronics13193867 (registering DOI)
Submission received: 31 July 2024
/
Revised: 19 September 2024
/
Accepted: 26 September 2024
/
Published: 29 September 2024
Abstract
As cyberattacks become increasingly sophisticated with advancements in information and communication technology, the impact of cyberspace threats is growing in both civilian and defense sectors. The utilization of cyber capabilities in operations is on the rise, prompting major nations to continuously enhance their cyber capabilities. This study aims to establish a systematic approach to cyber operations training and propose a framework for the development of cyber training. A hybrid cyber training system is designed as a plan for temporal and spatial integration to simultaneously combine simulation-based training with real-world target training. To develop this concept, a literature review was conducted, expert consultations were held, and data were collected and analyzed through visits to relevant organizations and units. Additionally, the fundamental components of cyber training were examined from environmental, scenario-based, and operational perspectives, leading to the presentation of a development direction for effective cyber training. This study is anticipated to enhance response capabilities to evolving cyber threats and attacks, improve cyber operational proficiency, and secure cyber power to achieve dominance in cyberspace.
Share and Cite
MDPI and ACS Style
Shin, Y.; Kwon, H.; Jeong, J.; Shin, D.
A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats. Electronics 2024, 13, 3867.
https://doi.org/10.3390/electronics13193867
AMA Style
Shin Y, Kwon H, Jeong J, Shin D.
A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats. Electronics. 2024; 13(19):3867.
https://doi.org/10.3390/electronics13193867
Chicago/Turabian Style
Shin, Yongjoo, Hyukjin Kwon, Jaeyeong Jeong, and Dongkyoo Shin.
2024. "A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats" Electronics 13, no. 19: 3867.
https://doi.org/10.3390/electronics13193867
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details
here.
Article Metrics
Article Access Statistics
For more information on the journal statistics, click
here.
Multiple requests from the same IP address are counted as one view.