Abstract
Cybersecurity is one of the prominent global challenges due to a significant increase in the number of cyber-attacks over the last few decades. To protect enterprises, personal data, and productivity and to ensure a safe working environment, cybersecurity awareness is crucial. For the successful prevention and mitigation of sophisticated cyber-attacks and minimization of cyberthreat risks, engagement in training activities is vital. Cyber ranges are environments offering tools and services to support cybersecurity and forensic simulation and training experience. Therefore, the design and development of cyber ranges have become a necessity for many governmental bodies and organizations such as law enforcement and defence agencies. In other words, a cyber range allows the reproduction of IT and/or OT systems execution in a simulated environment (composed by both virtual and physical components). In this way, this chapter highlights the concept of cyber ranges, mainly giving a well-defined overview of them, focusing on two types of stakeholders, LEAs and defence. First, several cyber ranges have been taken into consideration to identify significant attributes as well as categorization based on several properties. Finally, the ambition of the chapter is to provide a projection of the future capabilities and potentials about cyber range design, implementation, and execution of training, targeting the improvement of the involved end-users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
DoD CR [Online]. Available: https://www.hqmc.marines.mil/docscr/. Accessed 27 Nov 2019.
Arizona Cyber Warfare Range [Online]. Available: https://www.azcwr.org/. Accessed 27 Nov 2019.
HNS platform [Online]. Available: https://www.hns-platform.com/. Accessed 27 Nov 2019.
ManTech [Online]. Available: https://www.mantech.com/capabilities/cyber. Accessed 27 Nov 2019.
École Navale CR [Online]. Available: https://www.chaire-cyber-navale.fr/. Accessed 27 Nov 2019.
AirBus CR [Online]. Available: https://airbus-cyber-security.com/products-and-services/prevent/cyberrange/. Accessed 27 Nov 2019.
Kypo CR [Online]. Available: https://www.kypo.cz/en. Accessed 27 Nov 2019.
Augusta Cyber Range [Online]. Available: https://cyber.augusta.edu/georgia/. Accessed 27 Nov 2019.
US Cyber Range [Online]. Available: https://www.uscyberrange.org/. Accessed 27 Nov 2019.
AIT [Online]. Available: https://www.ait.ac.at/en/research-topics/cyber-security/cyber-range/. Accessed 27 Nov 2019.
Saros [Online]. Available: http://www.saros.co.uk/products/it/cyber-range/. Accessed 27 Nov 2019.
Rhea CR [Online]. Available: https://www.rheagroup.com/services/cyber-and-physical-security. Accessed 27 Nov 2019.
Virginia CR [Online]. Available: https://www.virginiacyberrange.org/. Accessed 27 Nov 2019.
The Michigan CR [Online]. Available: https://www.merit.edu/cyberrange/. Accessed 27 Nov 2019.
Ixia CR [Online]. Available: https://www.ixiacom.com/solutions/cyber-range. Accessed 27 Nov 2019.
Palo Alto [Online]. Available: https://www.paloaltonetworks.com/solutions/initiatives/cyberrange-overview. Accessed 27 Nov 2019.
IBM [Online]. Available: https://www.ibm.com/security/services/managed-security-services/security-operations-centers. Accessed 27 Nov 2019.
Cybexer [Online]. Available: https://cybexer.com/. Accessed 27 Nov 2019.
Raytheon [Online]. Available: https://www.raytheon.com. Accessed 27 Nov 2019.
Cyberbit [Online]. Available: https://www.cyberbit.com/solutions/cyber-range/. Accessed 27 Nov 2019.
Breaking Point [Online]. Available: https://www.ixiacom.com/products/network-security-testing-breakingpoint. Accessed 27 Nov 2019.
RGCE [Online]. Available: https://jyvsectec.fi/cyber-range/. Accessed 27 Nov 2019.
Berkatweb [Online]. Available: https://www.berkatweb.com/cyber-range/. Accessed 27 Nov 2019.
Cyber-Gym [Online]. Available: https://www.cybergym.com/. Accessed 27 Nov 2019.
Cisco Threats Report [Online]. Available: https://www.cisco.com/c/en/us/products/security/security-reports.html. Accessed 03 Dec 2019.
Cyber-security training: A comparative analysis of cyber ranges and emerging trends [Online]. Available: https://pergamos.lib.uoa.gr/uoa/dl/frontend/file/lib/default/data/2864976/theFile. Accessed 02 Dec 2019.
CyberCents [Online]. Available: https://cybercents.com/cyber-ranges/cents/. Accessed 27 Nov 2019.
Silensec Cyber Range [Online]. Available: https://cyberranges.com/#cyber-range-securing-cyber-space. Accessed 27 Nov 2019.
[MISP – Open Source Threat Intelligence Platform & Open Standards for Threat Information Sharing [Online]. Available: http://www.misp-project.org. Accessed 02 Dec 2019.
Lessons learned from complex hands-on defense exercises in a cyber range [Online]. Available: https://ieeexplore.ieee.org/document/8190713. Accessed 02 Dec 2019.
Locked Shields 2018 After Action Report. Accessed 02 Dec 2019.
NIST: Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities [Online]. Available: https://www.nist.gov/publications/guide-test-training-and-exercise-programs-it-plans-and-capabilities. Accessed 04 Dec 2019.
Smith, R. (2010). The long history of gaming in military training. Simulation and Gaming, 41, 6–19. https://doi.org/10.1177/1046878109334330.
CSS Cyber Defense Report, Cybersecurity and Cyber defense Exercises [Online]. Available: https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2018-10-Cyber_Exercises.pdf. Accessed 04 Dec 2019.
Prior, T., & Roth, F. (2016). CSS study: Learning from disaster events and exercises in civil protection organizations (CSS Study), risk and resilience reports. Zurich: Center for Security Studies.
CCDCOE Cyber Defense Exercise [Online]. Available: https://ccdcoe.org/exercises/locked-shields/. Accessed 04 Dec 2019.
Role and impact of digital Forensics in cyber crime investigations [Online]. Available: https://www.researchgate.net/publiction/331991596_ROLE_AND_IMPACT_OF_DIGITAL_FORENSICS_IN_CYBER_CRIME_INVESTIGATIONS/link/5c9a39c445851506d72d8fdc/download. Accessed 04 Dec 2019.
Qiu, P., Cisco Cyber Range [Online]. Available: https://www.cisco.com/c/dam/global/en_hk/assets/event/cisco_connect_2015/pdf/4-3.pdf. Accessed 17 Dec 2019.
Acknowledgements
The FORESIGHT project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 833673. The results reflect only the author’s view, and the agency is not responsible for any use that may be made of the information it contains.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Grigoriadis, A., Darra, E., Kavallieros, D., Chaskos, E., Kolokotronis, N., Bellekens, X. (2021). Cyber Ranges: The New Training Era in the Cybersecurity and Digital Forensics World. In: Akhgar, B., Kavallieros, D., Sdongos, E. (eds) Technology Development for Security Practitioners. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-69460-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-69460-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69459-3
Online ISBN: 978-3-030-69460-9
eBook Packages: EngineeringEngineering (R0)