Here it is what CINI is doing. See you in Rome.
Rocco
The CINI unit is developing cyber exercises aiming at raising the
awareness of people. In particular, the initiatives target different
levels of involvement, from non expert, to cybersecurity trainee and
professionals.
The first initiative is a live CTF open to the public. The idea behind
this event is to develop a game that can by played by a vast audience.
The game is based on a room escape format (which is becoming very
popular nowadays). However, we also introduce a number of new aspects in
the game. Mainly, the players have to solve real cybersecurity
challenges that require to acquire a new, specific knowledge. For
instance, one of the challenges consists of a brute-force attack to a
password. A the same time, the participants have the support of a
trainer that helps them with useful hints. Eventually, the participants
have a direct experience of what happens when, e.g., they use weak
passwords.
Another initiative of CINI is to implement cyber exercises for virtual
cyber ranges. Cyber exercises are meant to drive the training sessions
for security experts. In particular, we plan to design scenarios where
the attacking and defending teams have to deal with a complex and
realistic infrastructure. Moreover, the infrastructure will be injected
with security vulnerabilities that the attackers (defenders) want to
exploit (patch). More importantly, vulnerabilities will not be randomly
injected (which would decrease the effectiveness of the training
session). In fact, we will deploy vulnerabilities with specific training
objectives, e.g., requiring the attacker to apply a certain strategy. As
a consequence, each security exploit will be part of a non-trivial
sequence of lateral movements allowing the attackers to approach their
final target.
On 06/09/2019 15:42, Jan Hajny wrote:
Dear WP9 Partners,
Soon, we will be starting activities focused on practical training and
lab federations. Furthermore, we will be working on better hands-on
training environments.
At this moment, I’d like to ask you about your experience with
cyberrange software tools. Does anyone has any experience? What tools
are you using to realise your cyberranges?
Anyone uses open tools, like Open-Source AWS Cyber Range or Open Cyber
Challenge Platform?
Thank you,
Kind regards,
Jan
——
doc. Ing. Jan Hajný, Ph.D.
Advanced Cybersecurity
Brno University of Technology
Phone: +420 541 146 961
WWW:
http://crypto.utko.feec.vutbr.cz
--
Prof. Rocco De Nicola - IMT School for Advanced Studies Lucca
Direttore Centro Competenza Cybersecurity Toscano -
www.c3t.it
Tel: +39 0583 4326730 - Mobile +39 329 4309862