D 2015

KYPO – A Platform for Cyber Defence Exercises

ČELEDA, Pavel, Jakub ČEGAN, Jan VYKOPAL and Daniel TOVARŇÁK

Basic information

Original name

KYPO – A Platform for Cyber Defence Exercises

Authors

ČELEDA, Pavel (203 Czech Republic, guarantor, belonging to the institution), Jakub ČEGAN (203 Czech Republic, belonging to the institution), Jan VYKOPAL (203 Czech Republic, belonging to the institution) and Daniel TOVARŇÁK (203 Czech Republic, belonging to the institution)

Edition

Munich (Germany), S Support to Operational Tasks Including War Gaming, Logistics, Cyber Defence, p. nestránkováno, 12 pp. 2015

Publisher

NATO Science and Technology Organization

Other information

Language

English

Type of outcome

Proceedings paper

Field of Study

Informatics

Country of publisher

Germany

Confidentiality degree

is not subject to a state or trade secret

Publication form

electronic version available online

References:

RIV identification code

RIV/00216224:14610/15:00080539

Organization

Ústav výpočetní techniky – Repository – Repository

ISBN

978-92-837-2020-1

Keywords (in Czech)

kyber; obrana; trénink; cvičení; cvičiště; KYPO

Keywords in English

cyber; defence; training; exercises; range; KYPO

Links

VG20132015103, research and development project.
Changed: 2/9/2020 10:49, RNDr. Daniel Jakubík

Abstract

V originále

amp; Research Platform is focused on modelling and simulating complex computer systems and networks in a virtualized and separated environment. The platform enables realistic simulations of critical information infrastructures in a fully controlled and monitored environment. Time-efficient and cost-effective simulation is feasible using cloud resources instead of a dedicated infrastructure. In this paper, we present the KYPO platform and its use cases. We aim to execute current and sophisticated cyber attacks against simulated infrastructure since this is one of the key premises for running successful cyber security training exercises. To make the desirable improvement in the skills of the participants, a powerful storyline for the exercise is essential. Last but not least, we understand that technical skills must be complemented by communication, strategy and other skills for effective cyber defence.

Files attached