Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture

2Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Cloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly valued. However, it is extremely challenging for companies to acquire such security personnel, leading to the proposal and increased attention towards cyber security training programs as an alternative to hiring new personnel. Many of the existing training programs focus on acquiring knowledge of security technologies and practicing incident response but often fail to provide the skills necessary for system architecture, such as system design and scaling. In the era of cloud computing, system architecture is indispensable, and there is a need for training programs that enable participants to acquire these related skills, regardless of their academic background in security technologies. In this study, we propose a novel cybersecurity training program that allows participants to learn as system architects, covering the entire process from design to implementation. We utilize the state-of-the-art system architecture model known as Zero Trust Architecture (ZTA) and expand it from a prototype of reverse proxy access control to encompass ZTA. This approach enables participants to acquire the skills necessary for system architects, including system scalability and security. Furthermore, we measure the educational effectiveness of the training program by collecting decision the ARCS questionnaire dataset from students and workers. The results of statistical tests and factor analysis conducted on the ARCS questionnaire confirm that the training program enhances learning motivation, regardless of the participants' academic background in security technology. Additionally, these tests help identify the differences in factors that influence learning motivation between students and working adults.

Cite

CITATION STYLE

APA

Sasada, T., Kawai, M., Masuda, Y., Taenaka, Y., & Kadobayashi, Y. (2023). Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture. IEEE Access, 11, 141358–141374. https://doi.org/10.1109/ACCESS.2023.3341093

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free