{"title":"利用计算机实验室环境,使网络安全人员能够更好地发现和应对网络攻击","authors":"Adam Stojałowski","doi":"10.5604/01.3001.0053.8001","DOIUrl":null,"url":null,"abstract":"The aim of this article is to present the conclusions from the conducted research on thepreparation of personnel responsible for cybersecurity in counteracting cyber threats. Inaddition, the aim is to analyze the use of tools offered by the cyber polygon in terms ofacquiring practical skills related to detection of vulnerabilities in ICT systems.","PeriodicalId":269616,"journal":{"name":"Cybersecurity & Cybercrime","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"USAGE OF A COMPUTER LAB ENVIRONMENT TO PREPERECYBERSECURITY PERSONNEL IN DETETECTING ANDCOUNTERACTING CYBER ATTACKS\",\"authors\":\"Adam Stojałowski\",\"doi\":\"10.5604/01.3001.0053.8001\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The aim of this article is to present the conclusions from the conducted research on thepreparation of personnel responsible for cybersecurity in counteracting cyber threats. Inaddition, the aim is to analyze the use of tools offered by the cyber polygon in terms ofacquiring practical skills related to detection of vulnerabilities in ICT systems.\",\"PeriodicalId\":269616,\"journal\":{\"name\":\"Cybersecurity & Cybercrime\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-03-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybersecurity & Cybercrime\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5604/01.3001.0053.8001\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity & Cybercrime","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5604/01.3001.0053.8001","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
USAGE OF A COMPUTER LAB ENVIRONMENT TO PREPERECYBERSECURITY PERSONNEL IN DETETECTING ANDCOUNTERACTING CYBER ATTACKS
The aim of this article is to present the conclusions from the conducted research on thepreparation of personnel responsible for cybersecurity in counteracting cyber threats. Inaddition, the aim is to analyze the use of tools offered by the cyber polygon in terms ofacquiring practical skills related to detection of vulnerabilities in ICT systems.