Øving på cybersikkerheit: Ein casestudie av ei cybersikkerheitsøving
This article presents a case study of a cyber security exercise in military education, and uses this case study to reflect on some challenges with cyber security exercise for educational purposes. The case study discusses central decisions in the design of the exercise, the evaluation of the exercis...
| Published in: | Scandinavian Journal of Military Studies |
|---|---|
| Main Author: | Mass Soldal Lund |
| Format: | Article |
| Language: | English |
| Published: |
Scandinavian Military Studies
2022-09-01
|
| Subjects: | |
| Online Access: | https://sjms.nu/articles/119 |
Similar Items
The system of cybersecurity bodies in Ukraine
by: Andrii V. Svintsytskyi
Published: (2022-04-01)
by: Andrii V. Svintsytskyi
Published: (2022-04-01)
The ecosystem of cyber defense cognitive readiness
by: Morteza Talebi, et al.
Published: (2024-11-01)
by: Morteza Talebi, et al.
Published: (2024-11-01)
Artificial Intelligence Enabled Cyberspace Security Defense
by: Jia Yan, et al.
Published: (2021-06-01)
by: Jia Yan, et al.
Published: (2021-06-01)
Optimizing offensive cyber operation planner‘s development: exploring tailored training paths and framework evolution
by: Marko Arik, et al.
Published: (2024-06-01)
by: Marko Arik, et al.
Published: (2024-06-01)
A novel autonomous container-based platform for cybersecurity training and research
by: Nestoras Chouliaras, et al.
Published: (2023-09-01)
by: Nestoras Chouliaras, et al.
Published: (2023-09-01)
СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ
by: Oleksandr M. Kosohov, et al.
Published: (2015-12-01)
by: Oleksandr M. Kosohov, et al.
Published: (2015-12-01)
Islamic Republic of Iran Army Cyber Offensive Evaluation Model
by: Mohammad Ghasemi, et al.
Published: (2023-08-01)
by: Mohammad Ghasemi, et al.
Published: (2023-08-01)
Recent Objectives of Cyber Defence in the Department of Defence
by: Miroslav Feix, et al.
Published: (2017-09-01)
by: Miroslav Feix, et al.
Published: (2017-09-01)
Securing the Required Cyber Defence Capabilities
by: Miroslav Feix, et al.
Published: (2017-12-01)
by: Miroslav Feix, et al.
Published: (2017-12-01)
Security pattern in the cyberspace of the Islamic Republic of Iran with a futuristic approach
by: Amir Huseen Moghadasi Lichahi, et al.
Published: (2018-11-01)
by: Amir Huseen Moghadasi Lichahi, et al.
Published: (2018-11-01)
I.R.I Army cybersecurity effective factors. (Case study: I.R.I Army general staff )
by: Mahdi Mahdavipur, et al.
Published: (2022-08-01)
by: Mahdi Mahdavipur, et al.
Published: (2022-08-01)
Is a Theory of Cyberspace Dominance Possible? An Assessment from the Perspective of China’s Cyber Sovereignty Approach
by: Aybala Lale Kahraman
Published: (2024-12-01)
by: Aybala Lale Kahraman
Published: (2024-12-01)
LAW OF 11 MARCH 2022 ON HOMELAND DEFENSE IMPLICATIONS FOR THE CYBERSECURITY OF POLAND
by: Piotr Kobielski
Published: (2022-11-01)
by: Piotr Kobielski
Published: (2022-11-01)
Cyber hygiene of the digital twin of the civil aviation occupational safety management system in the context of quantum transformation
by: Kayrat Koshekov, et al.
Published: (2025-02-01)
by: Kayrat Koshekov, et al.
Published: (2025-02-01)
Research on Quantitative Prioritization Techniques for Selecting Optimal Security Measures
by: Jang Jisoo, et al.
Published: (2024-01-01)
by: Jang Jisoo, et al.
Published: (2024-01-01)
HOW THE RUSSIA-UKRAINE WAR MAY CHANGE THE CYBERCRIME ECOSYSTEM
by: Claudia–Alecsandra GABRIAN
Published: (2023-01-01)
by: Claudia–Alecsandra GABRIAN
Published: (2023-01-01)
The conceptual model of the country's cyber defense ecosystem
by: alireza keramatipour, et al.
Published: (2024-09-01)
by: alireza keramatipour, et al.
Published: (2024-09-01)
A Study on Cyber Target Importance Quantification and Ranking Algorithm
by: Kookjin Kim, et al.
Published: (2022-02-01)
by: Kookjin Kim, et al.
Published: (2022-02-01)
The influence of the digital environment on the spread of cyber terrorism
by: Baltezarević Ivana Ž., et al.
Published: (2022-01-01)
by: Baltezarević Ivana Ž., et al.
Published: (2022-01-01)
Cyber Sanctions as a Tool of Competition in Global Cyberspace
by: S. I. Balakhonova
Published: (2023-04-01)
by: S. I. Balakhonova
Published: (2023-04-01)
Management technologies of cyberspace endogenous safety and security test site
by: Hongyi ZHU, et al.
Published: (2021-03-01)
by: Hongyi ZHU, et al.
Published: (2021-03-01)
Management technologies of cyberspace endogenous safety and security test site
by: Hongyi ZHU, et al.
Published: (2021-03-01)
by: Hongyi ZHU, et al.
Published: (2021-03-01)
Study on Cyber Common Operational Picture Framework for Cyber Situational Awareness
by: Kookjin Kim, et al.
Published: (2023-02-01)
by: Kookjin Kim, et al.
Published: (2023-02-01)
Analysis of the situation and problem on the legislation of cyberspace in China
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
Assessing Attribution and Credible Deterrence in Cyberspace
by: Muhammad Imtiaz Sabir
Published: (2024-07-01)
by: Muhammad Imtiaz Sabir
Published: (2024-07-01)
The use of cyberspace in the context of hybrid warfare
by: Vuletić Dejan V.
Published: (2017-01-01)
by: Vuletić Dejan V.
Published: (2017-01-01)
Analysis of the situation and problem on the legislation of cyberspace in China
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
by: Yong-jiang XIE, et al.
Published: (2015-12-01)
Cyber Ranges and TestBeds for Education, Training, and Research
by: Nestoras Chouliaras, et al.
Published: (2021-02-01)
by: Nestoras Chouliaras, et al.
Published: (2021-02-01)
National security and the challenges of the digital age
by: Lakušić Milovan, et al.
Published: (2022-01-01)
by: Lakušić Milovan, et al.
Published: (2022-01-01)
Cyber Diplomacy: A New Frontier for Global Cooperation in the Digital Age
by: Ioana-Cristina VASILOIU
Published: (2023-01-01)
by: Ioana-Cristina VASILOIU
Published: (2023-01-01)
FROM CYBER WARFARE TO CYBER PEACE
by: Gheorghe BOARU
Published: (2025-09-01)
by: Gheorghe BOARU
Published: (2025-09-01)
Developing cyber defense strategies against future enemy threats on the horizon of 1405
by: Mohammad Sepehri
Published: (2022-02-01)
by: Mohammad Sepehri
Published: (2022-02-01)
A model of factors influencing deck officers’ cyber risk perception in offshore operations
by: Marie Haugli Larsen, et al.
Published: (2022-01-01)
by: Marie Haugli Larsen, et al.
Published: (2022-01-01)
International Law Issues of Cyber Defense
by: A. Yeremyan, et al.
Published: (2022-07-01)
by: A. Yeremyan, et al.
Published: (2022-07-01)
THE STRATEGY FOR ENSURING THE CYBER SECURITY OF THE ARMED FORCES OF UKRAINE
by: Oleksandr O. Chernonoh, et al.
Published: (2015-12-01)
by: Oleksandr O. Chernonoh, et al.
Published: (2015-12-01)
The rise of cyber power in Brazil
by: Joe Devanny, et al.
Published: (2022-09-01)
by: Joe Devanny, et al.
Published: (2022-09-01)
Cyber Potential Metaphorical Map Method Based on GMap
by: Dongyu Si, et al.
Published: (2025-01-01)
by: Dongyu Si, et al.
Published: (2025-01-01)
Public and private just wars: Distributed cyber deterrence based on Vitoria and Grotius
by: Johannes Thumfart
Published: (2020-09-01)
by: Johannes Thumfart
Published: (2020-09-01)
Modeling and Simulation of Cyber Battlefield
by: AliJabar Rashidi, et al.
Published: (2017-12-01)
by: AliJabar Rashidi, et al.
Published: (2017-12-01)
Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension
by: Khodadad Halili, et al.
Published: (2024-12-01)
by: Khodadad Halili, et al.
Published: (2024-12-01)
Similar Items
-
The system of cybersecurity bodies in Ukraine
by: Andrii V. Svintsytskyi
Published: (2022-04-01) -
The ecosystem of cyber defense cognitive readiness
by: Morteza Talebi, et al.
Published: (2024-11-01) -
Artificial Intelligence Enabled Cyberspace Security Defense
by: Jia Yan, et al.
Published: (2021-06-01) -
Optimizing offensive cyber operation planner‘s development: exploring tailored training paths and framework evolution
by: Marko Arik, et al.
Published: (2024-06-01) -
A novel autonomous container-based platform for cybersecurity training and research
by: Nestoras Chouliaras, et al.
Published: (2023-09-01)
