Journal of E-Learning and Educational Technologies (JEET)

ASSESSING THE LEARNING OUTCOMES OF CAPTURE THE FLAG CHALLENGES FOR SECURE MOBILE APPLICATION DEVELOPMENT

Authors

  • Stylianos Karagiannis Department of Informatics, Ionian University, Greece
  • Emmanouil Magkos Department of Informatics, Ionian University, Greece
  • George Chalavazis Department of Informatics, Ionian University, Greece
  • Maria Nefeli Nikiforos Department of Informatics, Ionian University, Greece

Abstract

Capture the Flag (CTF) challenges are becoming increasingly popular as a learning environment for cybersecurity education. However, the learning outcomes and results of CTF challenges are not always clear. In this paper, a systematic evaluation methodology is developed using popular open taxonomies to determine the learning outcomes of CTF challenges for secure mobile application development. Two CTF challenges, Damn Insecure and Vulnerable App (DIVA) and Extremely Vulnerable Android Labs (EVABS), were evaluated using Open Web Application Security Project (OWASP), MITRE Common Weakness Enumeration (CWE), and National Initiative for Cybersecurity Education (NICE) frameworks. The results show that DIVA and EVABS effectively cover the technical aspects related to mobile cybersecurity and specifically the development of secure mobile applications. The evaluation methodology proposed in this paper can be used by educators to extract learning outcomes from existing or upcoming CTF challenges. Additionally, this paper stresses the importance of educational frameworks in cybersecurity, and how they can be used to optimize learning from CTF challenges.

Keywords:

Capture the Flag (CTF) challenges, secure mobile application development, learning outcomes, evaluation methodology, educational frameworks, OWASP, MITRE CWE, NICE

Downloads

Published

2023-04-01

Issue

Section

Articles

How to Cite

Stylianos Karagiannis, Emmanouil Magkos, George Chalavazis, & Maria Nefeli Nikiforos. (2023). ASSESSING THE LEARNING OUTCOMES OF CAPTURE THE FLAG CHALLENGES FOR SECURE MOBILE APPLICATION DEVELOPMENT. Journal of E-Learning and Educational Technologies (JEET), 1(1), 66–85. Retrieved from https://zapjournals.com/Journals/index.php/jeet/article/view/234

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.