Enhancing Competency of Cybersecurity Through Implementation of the “CAPTURE THE FLAG” On College in Indonesia
DOI:
https://doi.org/10.55227/ijhess.v3i2.710Keywords:
Effectiveness, Competency, Gamification, Cybersecurity, CollegeAbstract
Academic institutions encounter several challenges when it comes to determining the most effective pedagogical approaches for enhancing their students' proficiency in the domain of cybersecurity. Conversely, cybersecurity gamification, exemplified by Capture the Flag (CTF) events in the industry, is widely considered an appropriate avenue for fostering cybersecurity learning. This research endeavors to assess the effectiveness of employing gamification as an instructional tool to enhance cybersecurity competency within the college context. The study employs a quantitative research method, adopting an experimental approach with a pre-experimental design. The research findings reveal the following key points 1) the implementation of gamification resulted in a significant enhancement of students' competency in cryptography, web vulnerability, and overall cybersecurity, 2) the gamification experiment demonstrated a stronger influence on enhancing practical skills as opposed to theoretical knowledge, 3) the evaluation of gamification's effectiveness in augmenting cybersecurity competency yielded a medium level (medium-g) of efficacy, reaching 65.91%. Although the medium level of effectiveness was observed in the context of gamification, it should be acknowledged that gamification holds substantial potential for advancing cybersecurity competency. For the attainment of optimal improvement in cybersecurity skills, a consistent and regular integration of gamification is recommended, while concurrently addressing the three pillars of cybersecurity. Furthermore, the utilization of gamification also presents opportunities for cultivating cybersecurity incident handling capabilities and the simulation of cyberwarfare scenarios
References
Costa, G., Lualdi, M., Ribaudo, M., & Valenza, A. (2020). A NERD DOGMA: Introducing CTF to Non-expert Audience. SIGITE 2020 - Proceedings of the 21st Annual Conference on Information Technology Education, 413–418. https://doi.org/10.1145/3368308.3415405
Creswell, John. W. (2013). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. In Research design Qualitative quantitative and mixed methods approaches.
Gasiba, T., Lechner, U., Pinto-Albuquerque, M., & Zouitni, A. (2020). Design of secure coding challenges for cybersecurity education in the industry. Communications in Computer and Information Science, 1266 CCIS. https://doi.org/10.1007/978-3-030-58793-2_18
Ghozali, I. (2018). Aplikasi Analisis Multivariate dengan Program IBM SPSS. Yogyakarta: Universitas Diponegoro. (Edisi 9). Semarang: Badan Penerbit Universitas Diponegoro.
Gonzalez, H., Llamas, R., & Montaño, O. (2019). Using a CTF Tournament for Reinforcing Learned Skills in Cybersecurity Course. Research in Computing Science, 148(5). https://doi.org/10.13053/rcs-148-5-15
Gultom, R. A. G., & Alrianto, B. (2016). Enhancing Network Security Environment by Empowering Modeling and Simulation Strategy. Eleventh International Conference on Internet Monitoring and Protection.
Guntara, Y. (2021). Normalized Gain: Ukuran Keefektifan Treatment. https://www.researchgate.net/profile/Yudi-Guntara/publication/340232572_Normalized_gain_ukuran_keefektifan_treatment/links/5e7df34092851caef4a24f24/Normalized-gain-ukuran-keefektifan-treatment.pdf
Hake, R. R. (1998). Interactive-engagement versus traditional methods: A six-thousand-student survey of mechanics test data for introductory physics courses. American Journal of Physics, 66(1). https://doi.org/10.1119/1.18809
Hamari, J. (2019). Gamification. In The Blackwell Encyclopedia of Sociology (pp. 1–3). John Wiley & Sons, Ltd. https://doi.org/10.1002/9781405165518.wbeos1321
Karagiannis, S., Maragkos-Belmpas, E., & Magkos, E. (2020). An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools. IFIP Advances in Information and Communication Technology, 579 IFIP. https://doi.org/10.1007/978-3-030-59291-2_5
Li, C., Kulkarni, M. R., & Kulkarni, R. (2016). Survey of Cybersecurity Education through Gamification Cybersecurity Education through Gamification-the CTF Approach.
Love, J., Selker, R., Marsman, M., Jamil, T., Dropmann, D., Verhagen, J., Ly, A., Gronau, Q. F., Šmíra, M., Epskamp, S., Matzke, D., Wild, A., Knight, P., Rouder, J. N., Morey, R. D., & Wagenmakers, E. J. (2019). JASP: Graphical statistical software for common statistical designs. Journal of Statistical Software, 88(1). https://doi.org/10.18637/jss.v088.i02
McAshan, H. H. (1979). Competency-based education and behavioral objectives. Englewood Cliffs, N.J. : Educational Technology Publications. https://archive.org/details/competencybasede0000mcas/page/n7/mode/2up
Shapiro, S. S., Wilk, M. B., & Chen, H. J. (1968). A Comparative Study of Various Tests for Normality. Journal of the American Statistical Association, 63(324). https://doi.org/10.1080/01621459.1968.10480932
Sitinjak, T. J., & Sugiarto. (2006). Lisrel. Penerbit Graha Ilmu.
Spafford, E. F. (1998). Teaching the Big Picture of InfoSec. 2nd National Colloquium for Information System Security Education. James Madison University.
Suliyanto. (2017). PERBEDAAN PANDANGAN SKALA LIKERT SEBAGAI SKALA ORDINAL ATAU SKALA INTERVAL. Sewindu Statistika.
von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004
W Liu, D. Y., Luo, X., Y Leung, A. C., Ho Patrio Chiu, P., Ho Au, M., Kong SAR, H., Wo Tarloff Im, S., M Lam, W. W., & Hong Kong SAR, K. (2019). Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines. https://doi.org/10.1109/tale48000.2019.9225863
Wibowo. (2013). Manajemen Kinerja edisi ketiga. In Manajemen Kinerja edisi ketiga.
Widiyanto, M. A. (2013). Statistika Terapan. Elex Media Komputindo.
Wiersma, W. (2000). Research Methods in Education an Introduction. Allyn and Bacon.
Yurcik, W., & Doss, D. (2001). Different Approaches in the Teaching of Information Systems Security. The Proceedings of the Information Systems Education Conference (ISECON). http://avirubin.com/courses.html
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Dudi Gurnadi Kartasasmita, F.G Cempaka Timur, Agus H.S Reksoprodjo
This work is licensed under a Creative Commons Attribution 4.0 International License.