Next Article in Journal
Target Trajectory Prediction-Based UAV Swarm Cooperative for Bird-Driving Strategy at Airport
Previous Article in Journal
Direction of Arrival Estimation Based on DNN and CNN
Previous Article in Special Issue
FedSpy: A Secure Collaborative Speech Steganalysis Framework Based on Federated Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats

1
Center for Military Analysis and Planning, Korea Institute for Defense Analyses, Seoul 02455, Republic of Korea
2
Department of Protection and Safety Engineering, Seoul National University of Science and Technology, Seoul 01811, Republic of Korea
3
Department of Computer Engineering, Sejong University, Seoul 05006, Republic of Korea
4
Department of Convergence Engineering for Intelligent Drones, Sejong University, Seoul 05006, Republic of Korea
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Electronics 2024, 13(19), 3867; https://doi.org/10.3390/electronics13193867 (registering DOI)
Submission received: 31 July 2024 / Revised: 19 September 2024 / Accepted: 26 September 2024 / Published: 29 September 2024
(This article belongs to the Special Issue Novel Technologies for Systems and Network Security)

Abstract

As cyberattacks become increasingly sophisticated with advancements in information and communication technology, the impact of cyberspace threats is growing in both civilian and defense sectors. The utilization of cyber capabilities in operations is on the rise, prompting major nations to continuously enhance their cyber capabilities. This study aims to establish a systematic approach to cyber operations training and propose a framework for the development of cyber training. A hybrid cyber training system is designed as a plan for temporal and spatial integration to simultaneously combine simulation-based training with real-world target training. To develop this concept, a literature review was conducted, expert consultations were held, and data were collected and analyzed through visits to relevant organizations and units. Additionally, the fundamental components of cyber training were examined from environmental, scenario-based, and operational perspectives, leading to the presentation of a development direction for effective cyber training. This study is anticipated to enhance response capabilities to evolving cyber threats and attacks, improve cyber operational proficiency, and secure cyber power to achieve dominance in cyberspace.
Keywords: cyber range; cyber operations training; cyber exercise; hybrid cyber training; cyber training scenario cyber range; cyber operations training; cyber exercise; hybrid cyber training; cyber training scenario

Share and Cite

MDPI and ACS Style

Shin, Y.; Kwon, H.; Jeong, J.; Shin, D. A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats. Electronics 2024, 13, 3867. https://doi.org/10.3390/electronics13193867

AMA Style

Shin Y, Kwon H, Jeong J, Shin D. A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats. Electronics. 2024; 13(19):3867. https://doi.org/10.3390/electronics13193867

Chicago/Turabian Style

Shin, Yongjoo, Hyukjin Kwon, Jaeyeong Jeong, and Dongkyoo Shin. 2024. "A Study on Designing Cyber Training and Cyber Range to Effectively Respond to Cyber Threats" Electronics 13, no. 19: 3867. https://doi.org/10.3390/electronics13193867

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop