<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Conducting Cyber Exercises Based on the Information Security Threat Model</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Aleksandr V. Dorofeev</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexey S. Markov</string-name>
          <email>a.markov@bmstu.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Yalta, Crimea</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bauman Moscow State Technical University</institution>
          ,
          <addr-line>5/1 2nd Baymanskay ul., Moscow, 105005</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>NPO Echelon</institution>
          ,
          <addr-line>24 2nd Electrozavodskaya ul., Moscow, 107023</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The purpose of this study is to demonstrate the use of Russian guidelines for computer threat assessment to organize information security exercises. The study deals with the cyber exercises as a relevant class of online learning in information security. The authors analyzed the definitions and shown specific features as well as classifications of cyber exercises. They reviewed the codes, regulations, and guidelines applicable to cyber exercises, described systematics underlying the cyber exercise scenarios.</p>
      </abstract>
      <kwd-group>
        <kwd>1</kwd>
        <kwd>Education</kwd>
        <kwd>game‐based learning</kwd>
        <kwd>information security exercises</kwd>
        <kwd>training</kwd>
        <kwd>awareness</kwd>
        <kwd>table-</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>MITRE</title>
      <p>ATT&amp;CK
and FSTEC
guidelines on information security threat assessment are compared in brief. It is concluded
that Russian guidelines can be used to develop cyber exercises scenarios. We provided an
example of a Russian CTF competition and presented a CTF competition scenario compliant
with the Russian guideline.</p>
      <sec id="sec-1-1">
        <title>1. Introduction</title>
        <p>
          It is commonly believed that the basics of learning by simulation of real crises (which can include
targeted cyber-attacks) were determined by John Dewey in 1938. [
          <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
          ]. In the military field this
approach, called exercises, was used much earlier: Few people do not know the saying of the great
military leader Aleksandr Suvorov "What is difficult in training will become easy in a battle", as
stated in the regulation on military training of troops in 1794.
        </p>
        <p>
          Currently, the applied capabilities for simulation of real-life situations for training purposes have
changed fundamentally with the general computerization, testing of online work, and introduction of
computer simulation packages for thematic media (e.g. critical information infrastructure facilities),
etc. The transfer of crisis simulation into the field of information security has given the rise of a new
discipline, that is, cyber competitions and exercises. In creating and implementing cyber exercises,
methodologists usually rely on information security systematics of American origin, in particular
those developed by NIST and MITRE. In this publication, the authors give an example of cyber
exercises based on the Russian FSTEC threat assessment procedure [
          <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
          ].
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>2. Introduction to Definitions</title>
        <p>
          At present, the definitions of cyber exercises are still in their infancy and originate, of course, from
the military field. For example, MITRE [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] refers to exercises to simulated military cyber operations
(involving planning, preparation, and execution) aimed to train and evaluate the organization with a
        </p>
        <p>
          2021 Copyright for this paper by its authors.
focus on an information security program. NIST [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] notes that exercises should be a simulation of an
emergency designed to test the IT plan, primarily the roles and responsibilities of personnel. The ITU
interprets the goals of cyber exercises as improving the coordinated response to cyber incidents in
dealing with cyber threats [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. According to ISO 22398, exercises can be used to verify documents,
train, clarify and educate personnel on roles and responsibilities, improve coordination and
communication, improve individual performance, etc. [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. The term is elaborated in ECSO [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], which
defines cyber exercises as a planned activity in which an organization simulates cyber-attacks,
information security incidents, or other types of breaches to test the cyber capabilities of the
organization, starting from the ability to detect a security incident to the ability to respond adequately
and minimize any associated consequences (Fig. 1).
        </p>
        <p>
          Based on the descriptions of cyber security exercises [
          <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref2">2, 10-13</xref>
          ], cyber exercises should include the
following specific activities:
 Simulate an information security emergency;
 Evaluate actual and real (rather than hypothetical) threats, vulnerabilities, and computer
security attacks,
 Use a comprehensive training program, including a game scenario that can be developed
during the game,
 Improve both staff awareness, roles and responsibilities, coordination, and ability to make
decisions in abnormal situations.
        </p>
        <p>
          As for the last item, it should be noted that exercises require practicing decision-making based on
the knowledge obtained [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], for example in any situation that is not described in the incident
management and computer attack response manuals [
          <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18 ref19">15-19</xref>
          ].
        </p>
        <p>It is well known that cyber exercises personnel is represented by some teams, usually the
following: Red team - attackers, Blue team - defenders, Green team - administrators, White team
organizers, Yellow team - researchers, etc. (Fig. 2).</p>
        <p>The objectives and expectations of cyber exercises are determined by specific goals and
capabilities, and may, for example, include the following:
 Train technical personnel in the use of information security tools,
 Increase cyber security awareness,
 Practice the management of decision-making while responding to incidents,
 Practice communication processes within the team of defenders,
 Check the adequacy of the organization's incident response regulations, etc.</p>
        <p>
          A cyber range normally includes the following segments [
          <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref20 ref9">9-20</xref>
          ]:
 Base segment: high-performance servers that can run dozens or hundreds of virtual servers
simultaneously, as well as a virtualization system;
 Virtual infrastructure for protection and attack: network equipment, servers, and workstations,
information security tools;
 Supporting infrastructure;
 Scoring system (refereeing system).
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>3. Regulations and Guidelines</title>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Regulations provide answers to the following questions:</title>
      <p> When are cyber exercises necessary?
 How should they be conducted?</p>
      <p>As far as the first question is concerned, it should be pointed out that the staff of organizations
shall be trained and information security audits recommended (primarily a penetration test by
simulating real attacks). As we know, in most countries of the world these matters are regulated by
the state. In Russia, information security audit requirements (including penetration tests) are explicitly
defined by the security regulators in the banking sector (Bank of Russia standard) and critical
information infrastructure (Orders of FSTEC of Russia). Necessity and frequency of personnel
retraining and advanced training are determined by Resolutions of the Russian Government
(Resolution of the Government of the RF No. 79, Resolution of the Government of the RF No. 171,
Resolution of the Government of the RF No. 313) and specified in recommendations and regulations
of information security regulators.</p>
      <p>
        Cyber exercises matters are most specifically described in the MITRE document [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In addition,
ISO 22390 regarding general IT exercises [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and French publications dealing with business
continuity exercises [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>It should be noted that these documents imply the classification of cyber exercises to form tasks,
expectations, teams, etc.</p>
      <sec id="sec-2-1">
        <title>4. Classifications</title>
        <p>
          Based on the literature (e.g. [
          <xref ref-type="bibr" rid="ref2 ref20 ref22">2, 20, 22</xref>
          ]), the authors propose the following classification (Fig. 3):
 Types of exercises and degree of abstraction (theoretical, real),
 Level of publicity (closed, opened),
 Target (business continuity, CIA),
 Target audience (management, administrators, users),
 Types of scenarios (CTF competition, multi-tasking, role-based)
 Classes of attacks (techniques and tactics),
 Scale (organization, industry, etc.).
        </p>
        <p>
          The above classification covers fundamental exercises which may include the following [
          <xref ref-type="bibr" rid="ref23 ref6">6, 23</xref>
          ]:
1. Discussion based:
 Table Top (TTX),
 Games,
 Workshop,
Seminars;
2. Operations based:
 Checking management, control, and coordination,
 Drill,
 Full-field exercises,
3. Mixed.
        </p>
        <p>
          In terms of scope and themes, most open exercises focus on critical information infrastructure
(CII) or cyber warfare [
          <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
          ].
        </p>
        <p>
          Figure 4 shows statistics of European cyber exercises in the field of CII [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>Based on the publications of National Cyber Range (created by Rostelecom as part of the Digital
Economy of Russia program), large-scale CII security exercises have already been performed in
energy and banking industries, and studies of the oil and gas, telecommunications, transport, and
metallurgy industries have been announced (Fig. 5).</p>
        <p>
          Below is an example of a typical scenario for cyber exercises in an organization [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]:
 Connecting the organization's employees to the community,
 Phishing with remote administration software,
 Planting USB with remote administration software,
 Network attacks on externally accessed IT infrastructure,
 Hidden transmission of data from the network using standard protocols, such as DNS,
 Attempts to physically obtain confidential information from employees using social
engineering techniques.
        </p>
        <p>Industry exercises could be organized to repulse some kind of cyber-attack, such as APT Tonto
and TA428 if the objective is to protect intellectual property, or Cobalt and Carbanak hacker groups
in case of banking exercises. In this regard, it is convenient to use the attribute characteristics of APT
attacks presented by MITRE to create a cyber exercises scenario.</p>
        <p>In this paper, the authors present a full-scale exercise integrated with qualification tests, Capture
the Flag (CTF). It should be noted that the origins of such exercises were formed back in 1996 at the
Defcon conference.</p>
        <p>We will note the characteristic features of CTF exercises:
 Teams are offered a set of tasks on information system security testing, forensics, information
search and analysis, password selection and exploitation of combinations of vulnerabilities,
cryptography, steganography, etc;
 Successful completion of a task is a set of symbols (flag). For example, a flag can be an
administrator's password, contents of a file accessible only by a certain user, decrypted value, etc;
 Flags are recorded in a special refereeing system, which automatically calculates points for
each team.</p>
        <p>These tasks - the scenario - are either expertly generated (based on the organizers' experience) or
are linked to computer attack systematics, which, according to the authors, include the following:
 NIST Framework (company maturity and/or milestones),
 Lockheed Martin Cyber Kill Chain (cyber-attack phases),
 MITRE ATT&amp;CK (attackers' post-behavior),
 FSTEC of Russia: procedure for assessing threats to information security (list of threats).</p>
        <p>
          For example, [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] discusses in detail the formation of various kinds of cyber exercises in relation
to the NIST Cyber Framework. The highlight of the project is the consideration of the maturity of
companies involved in exercises. The table developed in the said study is presented in Fig. 6.
Source: Aoyama, etc. [18, fig. 2]
        </p>
        <p>
          Until recently, the most cited model in the literature was the 7-stage Cyber Kill Chain model. In
this case, cyber exercises are organized about the phases of cyber operations [
          <xref ref-type="bibr" rid="ref27 ref28">27-29</xref>
          ]. For example,
similar systematization is shown in [30].
        </p>
        <p>
          Current studies related to scenario identification and demonstration focus on the use of behavioral
methods of attacks (post-incident is considered). In this case, the scenario is related to the MITRE
ATT&amp;CK taxonomy. This taxonomy currently includes 14 tactics (target stages) and 144 techniques
(attack execution methods) [
          <xref ref-type="bibr" rid="ref27">27, 31, 32</xref>
          ].
        </p>
        <p>
          The authors propose a similar approach to developing a scenario based on the threat model
adopted in Russia. The current threat assessment procedure of the Russian FSTEC includes 10
targeted attack stages used to develop scenarios for information security threats [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]:
 T1. Information collection [33],
 T2. Initial access,
 Т3. Introduction and execution of malware,
 T4. Access securing,
 T5. Malware management,
 T6. Privilege increase,
 T7. Activities hiding,
 T8. Provision of access to related systems,
 T9. Collection and withdrawal of information from the system,
 T10. Unauthorized impact or access (target impact).
        </p>
        <p>There are 145 ways of implementing the specified target stages.</p>
        <p>In principle, it is not difficult to compare the above approach with ATT&amp;CK systematics. Due to
the limited scope of publication, the authors compared only one target stage T4.</p>
      </sec>
      <sec id="sec-2-2">
        <title>5. Example of Using an Information Security Threat Model</title>
        <p>Regarding the Russian cyber exercises market, it is arguable that cyber exercises can already be
presented as a service, e.g.:</p>
        <p>1. Cyber exercises as infrastructure. Here, the national cyber exercises ground could be given as an
example.</p>
        <p>2. Cyber exercises as a platform. An example would be the Ampire boxed product developed by
the Infotex group of companies.</p>
        <p>3. Cyber exercises as a product. Products of dozens of Russian companies, producing a wide range
of data protection tools, involved in the exercises, can be referred to this class. We are talking about
SIEM, IDS/IPS, VA tools, and firewalls.</p>
        <p>
          The latter includes the CTF cyber exercise Echeloned Defence (Defence in Depth exercise),
initiated by the Patriotic Youth Movement of Russia. Thus, the competition included 3 levels of
participants: juniors, students, and undergraduate students. In 2019 there were 147 participants in 25
teams and in 2020 the competition included more than 100 teams. Scenarios were created by the
threat model recommended by the FSTEC of Russia [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. An example of a scenario for the above
exercises is shown in the matrix (Fig. 7).
Т3. T4. T6.
        </p>
        <p>Introduction Access Privilege
and securing increase
execution of
malware
Т2.3
Т2.4
Т3.1
Т4.1
Т4.2
Т6.1
Т6.2
Т6.3
T1. T2.</p>
        <sec id="sec-2-2-1">
          <title>InformationInitial collection access</title>
          <p>T1.1
T1.4
Т1.5</p>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>6. Conclusion</title>
        <p>T7.</p>
        <sec id="sec-2-3-1">
          <title>Activities hiding</title>
          <p>Т7.1
Т7.17
T8. T10.</p>
        </sec>
        <sec id="sec-2-3-2">
          <title>Provision of Target access to impact related systems</title>
          <p>Т8.1
Т8.2</p>
          <p>T1.1
T1.4
Т1.5</p>
          <p>This overview allows for making some brief conclusions.</p>
          <p>1. Cyber exercises are a relevant form of incident-based training. An important feature of cyber
exercises is full alignment with online learning, which became usual during the pandemic. At the
same time, CTF competitions are currently the most popular in universities.</p>
          <p>2. There is global awareness of the formation of cyber exercises scenarios that are currently based
on evolving attack systematics, most notably ATT&amp;CK. However, the paper shows that scenarios can
be created based on threat models, including the Russian procedure.</p>
          <p>3. It may be argued that a market for cyber exercises has developed globally and in Russia,
including cyber exercises as a service (cyber exercises as infrastructure, cyber exercises as platform,
and cyber exercises as product). There are a wide range of proprietary (paid) and open source
products for conducting or organizing exercises. Many companies producing security products
(SIEM, IDS/IPS, VA, FW) have free software for universities.</p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>7. References</title>
        <p>[29] S. Choet al., "Cyber Kill Chain based Threat Taxonomy and its Application on Cyber Common
Operational Picture," 2018 International Conference on Cyber Situational Awareness, Data
Analytics And Assessment (Cyber SA), 2018, pp. 1-8. DOI: 10.1109/CyberSA.2018.8551383.
[30] V. Mokhor, V. Tsurkan, V. Pokrovska. Analysis of Cyber Exercises Approaches. CEUR</p>
        <p>Workshop Proceedings. 2021, Vol. 2859. P. 61-70.
[31] A. P. Golushko and V. G. Zhukov. Application of Advanced Persistent Threat Actors`
Techniques aor Evaluating Defensive Countermeasures, 2020 IEEE Conference of Russian
Young Researchers in Electrical and Electronic Engineering (EIConRus). 2020, pp. 312-317.</p>
        <p>DOI: 10.1109/EIConRus49466.2020.9039315.
[32] R. Al-Shaer, J. M. Spring and E. Christou, "Learning the Associations of MITRE ATT &amp; CK
Adversarial Techniques," 2020 IEEE Conference on Communications and Network Security
(CNS), 2020, pp. 1-9. DOI: 10.1109/CNS48642.2020.9162207.
[33] A. Dorofeev, A. Markov, V. Tsirlov. Social media in identifying threats to ensure safe life in a
modern city. Communications in Computer and Information Science. 2016, N 674, pp. 441-449.
DOI: 10.1007/978-3-319-49700-6_44.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Dewey</surname>
          </string-name>
          .
          <source>Education and Experience. Kappa Delta Pi</source>
          ,
          <year>1938</year>
          . 91 p.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>E.G.</surname>
          </string-name>
          <article-title>Dí ez</article-title>
          ,
          <string-name>
            <given-names>D.F.</given-names>
            <surname>Pereira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A. L.</given-names>
            <surname>Merino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. R.</given-names>
            <surname>Sua</surname>
          </string-name>
          <article-title>́ rez and</article-title>
          <string-name>
            <surname>D.B. Juan</surname>
          </string-name>
          . Cyber Exercises Taxonomy, Spanish National Institute for Cyber-security,
          <year>2015</year>
          ,
          <volume>56</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] Methodology for assessing threats to information security. Methodological document</article-title>
          .
          <source>FSTEC of Russia</source>
          ,
          <year>2021</year>
          .
          <volume>87</volume>
          с. (In Russ.)
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Solovev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. K.</given-names>
            <surname>Yazov</surname>
          </string-name>
          .
          <article-title>Information support of the activity for technical protection of information</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          .
          <source>2021. N</source>
          <volume>1</volume>
          (
          <issue>41</issue>
          ). P.
          <volume>69</volume>
          -
          <fpage>79</fpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2021-1-
          <fpage>69</fpage>
          -
          <lpage>79</lpage>
          . (In Russ.)
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kick</surname>
          </string-name>
          .
          <source>Cyber Exercise Playbook. MP140714</source>
          . Wiesbaden, Germany. MITRE,
          <year>2014</year>
          . 50 p.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>T.</given-names>
            <surname>Grance</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Nolan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Burke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Dudley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>White</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Good</surname>
          </string-name>
          .
          <source>NIST SP 800-84</source>
          Guide to Test, Training, and
          <article-title>Exercise Programs for IT Plans</article-title>
          and Capabilities,
          <year>2006</year>
          . 97 p.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>ITU-D Study</surname>
          </string-name>
          on Potential
          <source>Development Trends in the CIS Region</source>
          <year>2022</year>
          -2025
          <string-name>
            <surname>- Cybersecurity.</surname>
          </string-name>
          RPM-CIS21/INF/5-R. ITU WTDC,
          <year>2021</year>
          . - Version 1.
          <fpage>0</fpage>
          - 52 p.
          <article-title>(In Russ</article-title>
          .)
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>ISO</given-names>
            <surname>22390</surname>
          </string-name>
          <article-title>: 2013 - SS. Guidelines for exercises and testing</article-title>
          , 40 p.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Understanding</given-names>
            <surname>Cyber</surname>
          </string-name>
          <article-title>Ranges: From Hype to Reality</article-title>
          .
          <source>WG5 PAPER. SWG 5</source>
          .1.
          <string-name>
            <given-names>I</given-names>
            <surname>Cyber</surname>
          </string-name>
          <article-title>Range Environments</article-title>
          and
          <string-name>
            <given-names>Technical</given-names>
            <surname>Exercises</surname>
          </string-name>
          .
          <source>European Cyber Security Organisation</source>
          ,
          <year>2020</year>
          . 31 p.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>G.</given-names>
            <surname>Angafor</surname>
          </string-name>
          , I. Yevseyeva,
          <string-name>
            <given-names>Y.</given-names>
            <surname>He</surname>
          </string-name>
          .
          <article-title>Game‐based learning: A review of tabletop exercises for cybersecurity incident response training</article-title>
          .
          <source>Security and Privacy</source>
          vol
          <volume>3</volume>
          <issue>No 6</issue>
          ,
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          (
          <year>2020</year>
          ). DOI:
          <volume>10</volume>
          .1002/spy2.
          <fpage>126</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Petrenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Petrenko</surname>
          </string-name>
          .
          <source>Cyber Exercises: Methodological Recommendations of ENISA. Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          .
          <source>2015. No</source>
          <volume>3</volume>
          (
          <issue>11</issue>
          ). P. 2-
          <fpage>14</fpage>
          . (In Russ.)
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>M. I. Avilov.</surname>
          </string-name>
          <article-title>Role network monitoring system in the technical cyber defense exercise</article-title>
          .
          <source>Proceedings of Saint Petersburg</source>
          Electrotechnical University.
          <year>2019</year>
          . N 2. P.
          <volume>43</volume>
          -
          <fpage>47</fpage>
          . (In Russ.)
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Wahsheh</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Mekonnen</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Practical Cyber Security Training Exercises," 2019 International Conference on Computational Science and Computational Intelligence (CSCI)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>48</fpage>
          -
          <lpage>53</lpage>
          , DOI: 10.1109/CSCI49370.
          <year>2019</year>
          .
          <volume>00015</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J.</given-names>
            <surname>Rasmussen</surname>
          </string-name>
          .
          <article-title>Skills, rules, and knowledge; signals, signs, and symbols, and other distinctions in human performance models</article-title>
          .
          <source>IEEE Transactions on Systems, Man, and Cybernetics</source>
          , vol.
          <volume>SMC13</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>257</fpage>
          -
          <lpage>266</lpage>
          , May-June
          <year>1983</year>
          . DOI:
          <volume>10</volume>
          .1109/TSMC.
          <year>1983</year>
          .
          <volume>6313160</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Olifirov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Makoveichuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. Y.</given-names>
            <surname>Zhytnyy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. N.</given-names>
            <surname>Filimonenkova</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Petrenko</surname>
          </string-name>
          ,
          <article-title>Models of Processes for Governance of Enterprise IT and Personnel Training for Digital Economy, 2018 XVII Russian Scientific and Practical Conference on Planning and Teaching Engineering Staff for the Industrial and Economic Complex of the Region (PTES</article-title>
          ),
          <year>2018</year>
          , pp.
          <fpage>216</fpage>
          -
          <lpage>219</lpage>
          , DOI: 10.1109/PTES.
          <year>2018</year>
          .
          <volume>8604166</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Karjalainen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kokkonen</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Puuska</surname>
          </string-name>
          ,
          <article-title>"Pedagogical Aspects of Cyber Security Exercises,"</article-title>
          <source>2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>103</fpage>
          -
          <lpage>108</lpage>
          . DOI:
          <volume>10</volume>
          .1109/EuroSPW.
          <year>2019</year>
          .
          <volume>00018</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R.</given-names>
            <surname>Petersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Santos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Wetzel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Witte</surname>
          </string-name>
          .
          <article-title>Workforce Framework for Cybersecurity (NICE Framework)</article-title>
          .
          <source>NIST Special Publication 800-181, Rev. 1. NIST</source>
          ,
          <year>2020</year>
          , 27 p. DOI:
          <volume>10</volume>
          .6028/NIST.SP.
          <fpage>800</fpage>
          -
          <lpage>181r1</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>T.</given-names>
            <surname>Aoyama</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Nakano</surname>
          </string-name>
          , I. Koshijima,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hashimoto</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Watanabe</surname>
          </string-name>
          .
          <article-title>On the Complexity of Cybersecurity Exercises Proportional to Preparedness</article-title>
          .
          <source>Journal of Disaster Research</source>
          ,
          <year>2017</year>
          , Vol.
          <volume>12</volume>
          No.
          <issue>5</issue>
          , pp.
          <fpage>1081</fpage>
          -
          <lpage>1090</lpage>
          . DOI:
          <volume>10</volume>
          .20965/jdr.
          <year>2017</year>
          .p1081
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>V.N.</given-names>
            <surname>Taran</surname>
          </string-name>
          .
          <article-title>Quality Criteria for Professional Training of Personnel in IT Industry Proceedings of 2018 17th Russian Scientific and Practical Conference on Planning and Teaching Engineering Staff for the Industrial and Economic Complex of the Region</article-title>
          ,
          <source>PTES</source>
          <year>2018</year>
          ,
          <year>2019</year>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>50</lpage>
          ,
          <fpage>8604267</fpage>
          . DOI:
          <volume>10</volume>
          .1109/PTES.
          <year>2018</year>
          .
          <volume>8604267</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>M.M. Yamin</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Katt</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Gkioulos</surname>
          </string-name>
          ,
          <article-title>Cyber ranges, and security testbeds: Scenarios, functions, tools and architecture</article-title>
          ,
          <source>Computers &amp; Security</source>
          , Volume
          <volume>88</volume>
          ,
          <year>2020</year>
          , 101636, DOI: 10.1016/j.cose.
          <year>2019</year>
          .
          <volume>101636</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <article-title>Organizing a cyber crisis management exercise</article-title>
          , by ed. G. Poupard and
          <string-name>
            <given-names>V.</given-names>
            <surname>Valle</surname>
          </string-name>
          ́ e. CCA,
          <year>2021</year>
          , 128 p.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>E.</given-names>
            <surname>Seker</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. H.</given-names>
            <surname>Ozbenli</surname>
          </string-name>
          ,
          <article-title>"The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation,"</article-title>
          <source>2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          , DOI: 10.1109/CyberSecPODS.
          <year>2018</year>
          .
          <volume>8560673</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <article-title>Homeland Security Exercise and Evaluation Program</article-title>
          ,
          <string-name>
            <surname>FEMA</surname>
          </string-name>
          ,
          <year>2020</year>
          , 6 p.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>E.</given-names>
            <surname>Sitnikova</surname>
          </string-name>
          , E. Foo,
          <string-name>
            <given-names>R.B.</given-names>
            <surname>Vaughn</surname>
          </string-name>
          .
          <article-title>The power of hands-on exercises in SCADA cybersecurity education</article-title>
          .
          <source>Inform. Assurance Secure. Educ. Train</source>
          .
          <year>2013</year>
          .
          <volume>406</volume>
          , pp.
          <fpage>83</fpage>
          -
          <lpage>94</lpage>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -39377-
          <issue>8</issue>
          _
          <fpage>9</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Granåsen</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Andersson</surname>
          </string-name>
          .
          <article-title>Measuring team effectiveness in cyber-defense exercises: a cross-disciplinary case study</article-title>
          ,
          <source>Cognition Technology, and Work</source>
          ,
          <year>2016</year>
          , vol.
          <volume>18n</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>121</fpage>
          -
          <lpage>143</lpage>
          . DOI:
          <volume>10</volume>
          .1007/s10111-015-0350-2.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Dorofeev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.S.</given-names>
            <surname>Markov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.V.</given-names>
            <surname>Rautkin</surname>
          </string-name>
          .
          <source>Ethical Hacking Training. CEUR Workshop Proceedings</source>
          ,
          <year>2019</year>
          , Vol-
          <volume>2522</volume>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kwon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ashley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Castleberry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Mckenzie</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. N. Gupta</given-names>
            <surname>Gourisetti</surname>
          </string-name>
          ,
          <article-title>"Cyber Threat Dictionary Using MITRE ATT&amp;CK Matrix and NIST Cybersecurity Framework Mapping," 2020 Resilience Week</article-title>
          (RWS),
          <year>2020</year>
          , pp.
          <fpage>106</fpage>
          -
          <lpage>112</lpage>
          . DOI:
          <volume>10</volume>
          .1109/RWS50334.
          <year>2020</year>
          .
          <volume>9241271</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>J.</given-names>
            <surname>Straub</surname>
          </string-name>
          . Modeling Attack,
          <article-title>Defense and Threat Trees and the Cyber Kill Chain, ATT&amp;CK and STRIDE Frameworks as Blackboard Architecture Networks</article-title>
          ,
          <source>2020 IEEE International Conference on Smart Cloud (SmartCloud)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>148</fpage>
          -
          <lpage>153</lpage>
          . DOI:
          <volume>10</volume>
          .1109/SmartCloud49737.
          <year>2020</year>
          .
          <volume>00035</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>