Review on Cybersecurity Threats Related to Cyber Ranges

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Abstract

Cyber ranges are often used to enhance the cybersecurity posture of a company by training relevant skills. These environments are traditionally used to host exercises that simulate cybersecurity scenarios, improve the cybersecurity skills of employees and enhance the security of networks and processes.
By using digital twins, it is possible to organise cyber range trainings also to the critical infrastructure sector. However, in the aforementioned sector it is important to consider the cybersecurity of these environments themselves as they often may handle company-specific confidential information. This study presents several cybersecurity related threats and challenges that cyber ranges may face during different phases of use. Cyber threats may be exposed to the actual systems that the ranges are meant to protect if these issues are not taken into consideration and mitigated. Malicious attackers may use the information in
the cyber range to learn the weaknesses in the actual system.
We approach the subject by reviewing the relevant literature, which is currently very limited especially when looking at the cybersecurity issues of cyber ranges. We divide the subject into the different phases of cyber range development and use, and also discuss relevant cloud security issues. Finally, we present actions to mitigate the identified cybersecurity threats and issues in cyber ranges when using them for training and awareness activities.
Original languageEnglish
Title of host publicationProceedings of the 17th International Conference for Internet Technology and Secured Transactions
Number of pages6
Publication statusAccepted/In press - 2021
MoE publication typeA4 Article in a conference publication
Event17th International Conference for Internet Technology and Secured Transactions, ICITST-2022 - Virtual, London, United Kingdom
Duration: 6 Dec 20228 Dec 2022

Conference

Conference17th International Conference for Internet Technology and Secured Transactions, ICITST-2022
Country/TerritoryUnited Kingdom
CityLondon
Period6/12/228/12/22

Keywords

  • Cyber Range
  • Cybersecurity
  • Cyber Training
  • Testbed
  • Digital Twin
  • Cloud security

Fingerprint

Dive into the research topics of 'Review on Cybersecurity Threats Related to Cyber Ranges'. Together they form a unique fingerprint.

Cite this