Design and Use of Privacy Capture-the-Flag Challenges in an Introductory Class on Information Privacy and Security

被引:0
作者
Vigl, Wolfgang [1 ]
Abramova, Svetlana [1 ]
机构
[1] Univ Innsbruck, Dept Comp Sci, Innsbruck, Austria
来源
PROCEEDINGS OF THE 2024 CONFERENCE INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, VOL 1, ITICSE 2024 | 2024年
关键词
Privacy; Capture-The-Flag; CTF; Education; Cybersecurity; Student engagement; DE-ANONYMIZATION; MODEL;
D O I
10.1145/3649217.3653572
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the advancement of data-intensive technologies and online tracking opportunities, education on privacy is becoming a bigger priority in cybersecurity curricula. Owing to its multidimensional and context-dependent nature, privacy and its protection goals can be introduced to computer science students as collective efforts of system designers to enable data protection, user's informational control, and privacy-preserving data sharing with third parties. Since engaging course participants into hands-on and gamified exercises is generally known to enhance learning experience and effect, we adopted the teaching practice of using Capture-the-Flag (CTF) security challenges and validated its applicability in the privacy education domain. This work presents a pioneering set of 8 CTF-style tasks intentionally designed for the study and demonstration of handpicked privacy concepts, techniques, and attacks. Drawing upon both quantitative and qualitative feedback collected from 27 course participants, this format of homework exercises is found to increase students' confidence in this knowledge domain and perceived as an enjoyable, motivating, and engaging way of learning about information privacy.
引用
收藏
页码:618 / 624
页数:7
相关论文
共 38 条
[1]  
[Anonymous], 2020, [No title captured], DOI [10.1145/3467967, DOI 10.1145/3467967]
[2]   PRIVACY AND FREEDOM - WESTIN,AF [J].
BOGUSLAW, R .
AMERICAN SOCIOLOGICAL REVIEW, 1968, 33 (01) :173-175
[3]  
Carlini N, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P267
[4]  
Carlisle Martin C., 2015, 2015 USENIX SUMM GAM
[5]  
Chung K., 2014, P 2014 USENIX SUMM G
[6]  
Cohen J. W, 1988, STAT POWER ANAL BEHA, DOI 10.4324/9780203771587
[7]   Impact of Capture The Flag (CTF)-style vs. Traditional Exercises in an Introductory Computer Security Class [J].
Cole, Stephen V. .
PROCEEDINGS OF THE 27TH ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, ITICSE 2022, VOL 1, 2022, :470-476
[8]  
CS2023 Task Force, 2023, Computer Science Curricula 2023: Version Beta
[9]  
Denning D.E. R., 1982, Cryptography and Data Security, V112
[10]   Anonymizing NYC Taxi Data: Does It Matter? [J].
Douriez, Marie ;
Doraiswamy, Harish ;
Freire, Juliana ;
Silva, Claudio T. .
PROCEEDINGS OF 3RD IEEE/ACM INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS, (DSAA 2016), 2016, :140-148