Enhancing Competency of Cybersecurity Through Implementation of the “CAPTURE THE FLAG” On College in Indonesia

Authors

  • Dudi Gurnadi Kartasasmita Assymmetric Warfare, Indonesia Defense University, Indonesia
  • F.G Cempaka Timur
  • Agus H.S Reksoprodjo Assymmetric Warfare, Indonesia Defense University, Indonesia

DOI:

https://doi.org/10.55227/ijhess.v3i2.710

Keywords:

Effectiveness, Competency, Gamification, Cybersecurity, College

Abstract

Academic institutions encounter several challenges when it comes to determining the most effective pedagogical approaches for enhancing their students' proficiency in the domain of cybersecurity. Conversely, cybersecurity gamification, exemplified by Capture the Flag (CTF) events in the industry, is widely considered an appropriate avenue for fostering cybersecurity learning. This research endeavors to assess the effectiveness of employing gamification as an instructional tool to enhance cybersecurity competency within the college context. The study employs a quantitative research method, adopting an experimental approach with a pre-experimental design. The research findings reveal the following key points 1) the implementation of gamification resulted in a significant enhancement of students' competency in cryptography, web vulnerability, and overall cybersecurity, 2) the gamification experiment demonstrated a stronger influence on enhancing practical skills as opposed to theoretical knowledge, 3) the evaluation of gamification's effectiveness in augmenting cybersecurity competency yielded a medium level (medium-g) of efficacy, reaching 65.91%. Although the medium level of effectiveness was observed in the context of gamification, it should be acknowledged that gamification holds substantial potential for advancing cybersecurity competency. For the attainment of optimal improvement in cybersecurity skills, a consistent and regular integration of gamification is recommended, while concurrently addressing the three pillars of cybersecurity. Furthermore, the utilization of gamification also presents opportunities for cultivating cybersecurity incident handling capabilities and the simulation of cyberwarfare scenarios

References

Costa, G., Lualdi, M., Ribaudo, M., & Valenza, A. (2020). A NERD DOGMA: Introducing CTF to Non-expert Audience. SIGITE 2020 - Proceedings of the 21st Annual Conference on Information Technology Education, 413–418. https://doi.org/10.1145/3368308.3415405

Creswell, John. W. (2013). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. In Research design Qualitative quantitative and mixed methods approaches.

Gasiba, T., Lechner, U., Pinto-Albuquerque, M., & Zouitni, A. (2020). Design of secure coding challenges for cybersecurity education in the industry. Communications in Computer and Information Science, 1266 CCIS. https://doi.org/10.1007/978-3-030-58793-2_18

Ghozali, I. (2018). Aplikasi Analisis Multivariate dengan Program IBM SPSS. Yogyakarta: Universitas Diponegoro. (Edisi 9). Semarang: Badan Penerbit Universitas Diponegoro.

Gonzalez, H., Llamas, R., & Montaño, O. (2019). Using a CTF Tournament for Reinforcing Learned Skills in Cybersecurity Course. Research in Computing Science, 148(5). https://doi.org/10.13053/rcs-148-5-15

Gultom, R. A. G., & Alrianto, B. (2016). Enhancing Network Security Environment by Empowering Modeling and Simulation Strategy. Eleventh International Conference on Internet Monitoring and Protection.

Guntara, Y. (2021). Normalized Gain: Ukuran Keefektifan Treatment. https://www.researchgate.net/profile/Yudi-Guntara/publication/340232572_Normalized_gain_ukuran_keefektifan_treatment/links/5e7df34092851caef4a24f24/Normalized-gain-ukuran-keefektifan-treatment.pdf

Hake, R. R. (1998). Interactive-engagement versus traditional methods: A six-thousand-student survey of mechanics test data for introductory physics courses. American Journal of Physics, 66(1). https://doi.org/10.1119/1.18809

Hamari, J. (2019). Gamification. In The Blackwell Encyclopedia of Sociology (pp. 1–3). John Wiley & Sons, Ltd. https://doi.org/10.1002/9781405165518.wbeos1321

Karagiannis, S., Maragkos-Belmpas, E., & Magkos, E. (2020). An Analysis and Evaluation of Open Source Capture the Flag Platforms as Cybersecurity e-Learning Tools. IFIP Advances in Information and Communication Technology, 579 IFIP. https://doi.org/10.1007/978-3-030-59291-2_5

Li, C., Kulkarni, M. R., & Kulkarni, R. (2016). Survey of Cybersecurity Education through Gamification Cybersecurity Education through Gamification-the CTF Approach.

Love, J., Selker, R., Marsman, M., Jamil, T., Dropmann, D., Verhagen, J., Ly, A., Gronau, Q. F., Šmíra, M., Epskamp, S., Matzke, D., Wild, A., Knight, P., Rouder, J. N., Morey, R. D., & Wagenmakers, E. J. (2019). JASP: Graphical statistical software for common statistical designs. Journal of Statistical Software, 88(1). https://doi.org/10.18637/jss.v088.i02

McAshan, H. H. (1979). Competency-based education and behavioral objectives. Englewood Cliffs, N.J. : Educational Technology Publications. https://archive.org/details/competencybasede0000mcas/page/n7/mode/2up

Shapiro, S. S., Wilk, M. B., & Chen, H. J. (1968). A Comparative Study of Various Tests for Normality. Journal of the American Statistical Association, 63(324). https://doi.org/10.1080/01621459.1968.10480932

Sitinjak, T. J., & Sugiarto. (2006). Lisrel. Penerbit Graha Ilmu.

Spafford, E. F. (1998). Teaching the Big Picture of InfoSec. 2nd National Colloquium for Information System Security Education. James Madison University.

Suliyanto. (2017). PERBEDAAN PANDANGAN SKALA LIKERT SEBAGAI SKALA ORDINAL ATAU SKALA INTERVAL. Sewindu Statistika.

von Solms, R., & van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004

W Liu, D. Y., Luo, X., Y Leung, A. C., Ho Patrio Chiu, P., Ho Au, M., Kong SAR, H., Wo Tarloff Im, S., M Lam, W. W., & Hong Kong SAR, K. (2019). Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines. https://doi.org/10.1109/tale48000.2019.9225863

Wibowo. (2013). Manajemen Kinerja edisi ketiga. In Manajemen Kinerja edisi ketiga.

Widiyanto, M. A. (2013). Statistika Terapan. Elex Media Komputindo.

Wiersma, W. (2000). Research Methods in Education an Introduction. Allyn and Bacon.

Yurcik, W., & Doss, D. (2001). Different Approaches in the Teaching of Information Systems Security. The Proceedings of the Information Systems Education Conference (ISECON). http://avirubin.com/courses.html

Downloads

Published

2023-10-26

How to Cite

Dudi Gurnadi Kartasasmita, F.G Cempaka Timur, & Agus H.S Reksoprodjo. (2023). Enhancing Competency of Cybersecurity Through Implementation of the “CAPTURE THE FLAG” On College in Indonesia. International Journal Of Humanities Education and Social Sciences, 3(2). https://doi.org/10.55227/ijhess.v3i2.710

Issue

Section

Social Science