Capture the Flag (CTF) Implementation in The Informatics Engineering Study Program Indonesia Defense University
DOI:
https://doi.org/10.16920/jeet/2024/v38i4/25094Keywords:
capture the flag; cybersecurity; informatics engineering study program; indonesia defense university.Abstract
The evolution of the internet of things and big data has increased cyber threats, making cybersecurity a critical issue. Simultaneously, cybersecurity personnel competencies are required to protect digital assets from cyber threats. Obtaining personnel competency in cybersecurity is possible through the university, particularly through the Informatics Engineering Study Program. Nowadays, there is a cybersecurity competition called Capture the Flag that takes place on the internet (CTF). One of the CTF's goals is to improve personnel cybersecurity competency. The study employs a qualitative descriptive approach to provide an overview of CTF implementation as a strategy in the Informatics Engineering study program at the Indonesia Defense University (IDU). To present a comprehensive illustration of Capture the Flag (CTF), the IDU Informatics Engineering requires a dedicated server for virtualization and scoreboard. This study also entails software like Proxmox VE, VirtualBox, and Kali Linux. Alongside hardware and software requirements, an isolated network is essential to prevent disruptions to the existing computer network due to CTF implementation. In addition, skillful instructors well-versed in cybersecurity skills are crucial, playing a significant role in preparing relevant teaching materials. Furthermore, because cybersecurity is a broad scientific domain, variations of CTF scenarios are required to follow the trend of vulnerabilities. Thus, students will be motivated to study various vulnerabilities in cybersecurity.
Access to login into the old portal (Manuscript Communicator) for Peer Review-

