IEEE Access (Jan 2023)

Factor Analysis of Learning Motivation Difference on Cybersecurity Training With Zero Trust Architecture

  • Taisho Sasada,
  • Masataka Kawai,
  • Yuto Masuda,
  • Yuzo Taenaka,
  • Youki Kadobayashi

DOI
https://doi.org/10.1109/ACCESS.2023.3341093
Journal volume & issue
Vol. 11
pp. 141358 – 141374

Abstract

Read online

Cloud computing technologies have increased the diversity and complexity of security expertise needed to prevent cyber attacks. decisionIn software and system architect area, The expertise of security personnel in these security technologies is highly valued. However, it is extremely challenging for companies to acquire such security personnel, leading to the proposal and increased attention towards cyber security training programs as an alternative to hiring new personnel. Many of the existing training programs focus on acquiring knowledge of security technologies and practicing incident response but often fail to provide the skills necessary for system architecture, such as system design and scaling. In the era of cloud computing, system architecture is indispensable, and there is a need for training programs that enable participants to acquire these related skills, regardless of their academic background in security technologies. In this study, we propose a novel cybersecurity training program that allows participants to learn as system architects, covering the entire process from design to implementation. We utilize the state-of-the-art system architecture model known as Zero Trust Architecture (ZTA) and expand it from a prototype of reverse proxy access control to encompass ZTA. This approach enables participants to acquire the skills necessary for system architects, including system scalability and security. Furthermore, we measure the educational effectiveness of the training program by collecting decision the ARCS questionnaire dataset from students and workers. The results of statistical tests and factor analysis conducted on the ARCS questionnaire confirm that the training program enhances learning motivation, regardless of the participants’ academic background in security technology. Additionally, these tests help identify the differences in factors that influence learning motivation between students and working adults.

Keywords