Skip to content

Human-Centric Aspects of Cyber-Security

It has been well recognised that the effectiveness of cyber-security is highly dependent on the Human-Centric Aspects of Cyber-Security, both in terms of professionals and end-users of technologies. A cross-cutting issue identified in all roadmaps and multiple EU documents is the need to ensure that cyber-security professionals receive regular training so that they are skilled in working with emerging technologies and responding to new threats. Cyber-security education is now taught in universities throughout Europe and multiple firms provide lifelong learning opportunities for professionals. When designing effective learning the organisers need to understand the dynamics of how the teams learn and what are indicators of successful team learning. However, assessing team learning success when the absence of objective performance measures and in the avoidance of highly invasive assessment methods in the cyber-security exercises’ context remains an unsolved question.

Regarding end-users of technology, the concept of Usable Security is highly relevant, which is focused on making sure that security products and processes are usable by those who need them, which can be an important catalyst to more efficient adoption of security and privacy technologies. Usable security needs to guarantee a level of usability high enough so that user behaviour will not jeopardise their benefits in terms of security and privacy. However, many technologies are not straightforward. For example, multiple problems regarding the usability of the PGP encryption system have been pointed out. These usability issues can make it harder to reach intended security and privacy goals. In the case of encryption, there have been many improvements that make end-to-end encrypted communications now available to large groups of people. However, user authentication still has many issues and a perfect solution does not yet exist. Sometimes there are trade-offs between usability and security or privacy meaning that a design solution favouring one aspect might degrade another.

Strategic Priority

  • Improve automated feedback systems for cyber-security training.
  • Improve usability of cyber-security solutions for ICT professionals.

Pilot Research

  • Evaluate Automated Feedback upgrade to KYPO Cyber Range Platform (an open-source interactive learning environment for hands-on cyber-security training).
  • Identify and address gaps in the usability of penetration testing reports among ICT professionals.
Publications (View all)

Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments

Švábenský, V., Tkáčik, K., Birdwell, A., Weiss, R., Baker, R.S., Čeleda, P.…

Cybersecurity Study Programs: What’s in a Name?

Vykopal, J., Švábenský, V., Lopez II, M. T., Čeleda, P. (2025). Published i…

CHESS: Cyber-security Excellence Hub in Estonia and South Moravia

Bakhtina, M., Vémolová, Z., and Matyáš, V., (2024). Published in: RPE@CAiSE…

Post-quantum trails: an educational board game about post-quantum cryptography

Vakarjuk, J., and Snetkov, N., (2024). Published in: Proceedings of the 7th…

Automated feedback for participants of hands-on cybersecurity training

Švábenský, V., Vykopal, J., Čeleda, P., Dovjak, J. (2023). Published in: Jo…

Presentations (View all)

Usability of Penetration Testing Reports

Presenter: Katarina Galanska; Venue: CHESS Brno Brokerage Event 2025

Cybersecurity Exercises

Presenter: Jan Vykopal; Venue: CHESS Brno Brokerage Event 2025

Theses (View all)

Strategic decision-making exercises at the INJECT Exercise Platform

Author: Tomas Klostermann; Supervisor: Jan Vykopal

Application of the INJECT platform in hands-on cybersecurity exercises

Author: Patrik Mikus; Supervisor: Jan Vykopal

Generator of Vulnerable Web Applications

Author: Marek Geleta; Supervisor: Jan Vykopal

Penetration Testing of the INJECT Exercise Platform

Author: Laris Terneny; Supervisor: Jan Vykopal

Container-Based Testbed for Embedded Systems Security Training

Author: Patrik Paszek; Supervisor: Pavel Čeleda

Implementation and Performance Evaluation of the INJECT Backend in Go

Author: Ondrej Pokorný; Supervisor: Pavel Čeleda