the in the JavaScript or the exploit category, are com-
pareble to those of the proposed framework. Still
Happy-Security is difficult to use for educational pur-
poses as it does not allow customization for courses
of different difficulties or feedback on the learning
progress for the tutor.
A possible drawback of the HackIt!-Framework in
comparision to these websites is the community. In
their forums, users are able to ask questions regard-
ing the challenges, and others try to point them in the
right direction without spoiling too much information.
This kind of community feedback is replaced with the
upcoming hint system in our framework.
The benefit of the HackIt!-Framework is its mod-
ularized core, allowing easily exchangeable challenge
sets, user management as well as an easy inclusion of
own and new challenges. This allows a quick growth
without much effort, as most functionality is provided
by the framework. Besides, the related systems do not
offer the possibility to view or export the results of the
(un-)solved challenges of the students.
5 CONCLUSIONS
This paper presents the development and features of
the HackIt!-Framework, a Web-based framework for
modular challenge set creation. It provides a solid
base for further computer security learning content
and enables to teach the security aspects of current
website security as well as today’s Internet risks.
The focus on modularity should ensure a flexible
and persistence use, whereas the strong self-security
measures allow a save deployment in educational set-
tings. The possibility to adopt its challenges to the
target audience’s knowledge level make it a suitable
choice for weekly exercises or smaller competitions.
5.1 Future Work
There are many ways to extend the HackIt!-
Framework and enrich its features. The implemented
challenges for this system do not cover the complete
set of the main security issues. The next steps are to
implement several ideas for challenges to have a good
basis that covers most of nowadays security problems
and to keep the framework and its content always in-
teresting and feature rich.
The HackIt!-Framework is work in progress.
Some described features are not deployed or fully
tested at the current time. These are namely the score-
board, the hint system, the story, the unique pass-
words, the flagging challenges as optional or required,
and the order enforcement of challenges. The deploy-
ment and the testing of these features will be done in
the near future to have the system fully functioning
for the upcoming evaluation.
The authors plan to use the HackIt!-Framework as a
method to teach students of a Web Technologies lec-
ture how easy it can be to exploit self-implemented
Web applications if the source code is not sanitized
well. In this evaluation, not only the interface design
and the ease of use will be evaluated but also if the stu-
dents will be aware of the risks of implementing Web
application when it comes to security issues. Last,
but not least, it should be determined if the students
like to play with those challenges and if it is easier for
them to learn about possible counter measurements by
solving quests instead of learning about those threads
in a theoretical way.
REFERENCES
Apel, R., Berg, T., Bergner, N., Chatti, M. A., Holz, J.,
Leicht-Scholten, C., and Schroeder, U. (2012). Ein
vierstufiges frderkonzept fr die studieneingangsphase
in der informatik. In Proceedings of HDI 2012, Ham-
burg. Universittsverlag Hamburg.
Bergner, N., Holz, J., and Schroeder, U. (2012). Info-
sphere: An extracurricular learning environment for
computer science. In Proceedings of 7th Workshop in
Primary and Secondary Computing Education (WiP-
SCE 2012), Hamburg. ACM.
Border, C. and Holden, E. (2003). Security education within
the IT curriculum. In Proceedings of the 4th confer-
ence on Information technology curriculum, CITC4
’03, pages 256–264, New York, NY, USA. ACM.
Edge, C. and Stamey, J. (2010). Security education on a
budget: getting the most ”bang for the buck” with
limited time and resources. In 2010 Information Secu-
rity Curriculum Development Conference, InfoSecCD
’10, pages 29–35, New York, NY, USA. ACM.
Pothamsetty, V. (2005). Where security education is lack-
ing. In Proceedings of the 2nd annual conference on
Information security curriculum development, InfoS-
ecCD ’05, pages 54–58, New York, NY, USA. ACM.
Shabanah, S. and Chen, J. (2009). Simplifying algorithm
learning using serious games. In Proceedings of the
14th Western Canadian Conference on Computing
Education (WCCCE ’09). ACM.
Yang, T. A. (2001). Computer security and impact on com-
puter science education. In Proceedings of the sixth
annual CCSC northeastern conference on The jour-
nal of computing in small colleges, CCSC ’01, pages
233–246, USA. Consortium for Computing Sciences
in Colleges.
AHackItFrameworkforSecurityEducationinComputerScience-RaisingAwarenessinSecondarySchoolandat
UniversitywithaChallenge-basedLearningEnvironment
245