Cyber Training Polygon for Simulating Cyber Incidents

5

Abstract

The article presents the process of planning and developing a cyber training polygon for simulating cyber incidents. Its goal is to develop knowledge, skills and abilities in children and young people of secondary and higher educational institutions in the field of information security. The development of cyber training polygon is being implemented by the authors within the framework of an individual educational program for additional education of gifted children in the distance learning format in the field of «Information Security ("Cyber Training polygon for Simulating Cyber Incidents")» in Educational institution «National Children's Technopark». The following requirements have been formulated for developed cyber training polygon: autonomy, flexibility, versatility, etc. A network topology with two firewalls was chosen for the architecture of the cyber training polygon, because it is similar to the topologies of corporate networks. The cyber polygon structure has been supplemented with virtual machines with different operating systems (Kali Linux, Ubuntu, Alpine). They simulate server and/or client devices. The developed cyber training polygon is recommended for use in educational institutions to increase students’ motivation for scientific research and professional orientation in the field of information security. The authors continue to work on improving the methodological base for the cyber training polygon.

General Information

Keywords: information security, cyber training, cyber polygon, cyber incident, cyber-attack, firewall

Publication rubric: Digital Transformation and Online Education: Technologies, Tools and Models

Article type: theses

For citation: Belousova E.S., Viarbila M.A., Filipau A.S. Cyber Training Polygon for Simulating Cyber Incidents [Elektronnyi resurs]. Digital Humanities and Technology in Education (DHTE 2025): Collection of Articles of the VI International Scientific and Practical Conference. November 13-14, 2025 / V.V. Rubtsov, M.G. Sorokova, N.P. Radchikova (Eds). Moscow: Publishing house MSUPE, 2025,., pp. 56–66.

Information About the Authors

Elena S. Belousova, Candidate of Science (Engineering), Associate Professor, Associate Professor of the Informational Security Department, Belarusian State University of Informatics and Radioelectronics, Minsk, Belarus, ORCID: https://orcid.org/0000-0001-9834-6074, e-mail: belousova@bsuir.by

Mikalai A. Viarbila, student of the course “Information Security (“Educational cyber polygon for simulating cyber incidents”)”, Educational institution “National Children's Technopark”, Minsk, Belarus, ORCID: https://orcid.org/0009-0005-9149-6666, e-mail: nickolay3132@gmail.com

Andrei S. Filipau, student of the course “Information Security (“Educational cyber polygon for simulating cyber incidents”)”, Educational institution “National Children's Technopark”, Minsk, Belarus, ORCID: https://orcid.org/0009-0007-8654-9692, e-mail: filipov_andrew@mail.ru

Metrics

 Web Views

Whole time: 24
Previous month: 17
Current month: 7

 PDF Downloads

Whole time: 5
Previous month: 4
Current month: 1

 Total

Whole time: 29
Previous month: 21
Current month: 8