Practical Experiment

Practical Experiment

Welcome to this research experiment evaluating the approach and infrastructure surrounding two distinct approaches towards progress grading and feedback in practical cyber security exercises.

Each player will be presented with two sets of similar practical computer security exercises to work through, each using a distinct grading approach. After each challenge you will answer questions about your experience during the practical exercise, with a focus on the grading and feedback approach. The intent is for you to solve all 4 challenges on both scenarios. Hints and supporting materials will be available to aid you in solving the challenges if you require them. Collect a hints and tips printout in class (or if you are participating remotely view the hints and tips here: https://docs.google.com/document/d/1iFQE_v6lsG0ojYtEr-fRgOcIYN5olcTEl4EiGBsty2Q/edit#heading=h.sl7nogjb29ee).

Here is a link to the survey: https://forms.gle/stFqfSYoqZ6vx8ZJA

The order of activities is:

All participants that complete the challenges and both post-challenge surveys are automatically entered into a prize draw to win one of three amazon gift vouchers (up to £40 in value). The draw will take place once the event concludes and winners will be announced via email.

This is an optional extra curricular event which will give you the opportunity to complete some practical CTF challenges and provide your perspective on the different grading and feedback approaches taken.

This research is intended to benefit others: results will be published in academic venues, such as peer-reviewed conferences and journals. Results will also be summarised and disseminated in presentations.

Data from this event will be gathered and analysed in research aimed at understanding and improving the technologies surrounding practical cyber security exercises. Data will be gathered based on system usage and participant feedback. Data collected includes usage data collected from the systems used during the exercises and questionnaire responses. All data gathered will be anonymised prior to analysis and publication.

By taking part in this study you confirm that you: have read and understand the above; understand that all personal information will remain confidential and that all efforts will be made to ensure you cannot be identified (except as might be required by law); agree that data gathered in this study may be stored anonymously and securely, and may be used for future research; understand that participation is voluntary and that you are free to withdraw at any time without giving a reason; and you agree to take part in this study. If you do choose to withdraw please contact Thomas Shaw via email (address below).

This project has received ethical approval from Leeds Beckett University.

For more information about the CTF event and this research, please contact Thomas Shaw (Thomas.Shaw@leedsbeckett.ac.uk), Lecturer in Cyber Security and Ph.D. Candidate, Leeds Beckett University.

Ended   (11 months ago)


Login first to sign up


Sign up to view the challenges!

Add challenge

Release Schedule