A Data-driven Security Game to Facilitate Information Security Education

被引:2
|
作者
Lovgren, Dag Erik Homdrum [1 ]
Li, Jingyue [2 ]
Oyetoyan, Tosin Daniel [3 ]
机构
[1] Acando AS, Digital Core Trondheim, Trondheim, Norway
[2] Norwegian Univ Sci & Technol, Dept Comp Sci, Trondheim, Norway
[3] Western Norway Univ Appl Sci, Dept Comp Math & Phys, Bergen, Norway
关键词
Information security; serious game; game-based education;
D O I
10.1109/ICSE-Companion.2019.00102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many universities have started to educate students on how to develop secure software and systems. One challenge of teaching information security is that the curriculum can easily be outdated, because new attacks and mitigation approaches arise. It is therefore necessary to provide software developers with methods and tools that are attractive (e.g., computer games) for self-study and up-to-date information security knowledge during and after the university education. This paper presents an on-going study to develop an educational game to facilitate information security education. The game is developed as a single player Tower Defense (TD) game. The educational goal of the game is to teach developers, who are not security experts, how to choose proper mitigation strategies and patterns to defend against various security attack scenarios. One key benefit of our game is that it is data driven, meaning, it can continuously fetch data from relevant security-based online sources (e.g., Common Attack Pattern Enumeration Classification CAPEC) to stay up to date with any new information. This is done automatically. We evaluated the game by letting students play it and give comments. Evaluation results show that the game can facilitate students learning of mitigation strategies to defend against attack scenarios.
引用
收藏
页码:256 / 257
页数:2
相关论文
共 50 条
  • [1] A data-driven approach for embedded security
    Saputra, H
    Ozturk, O
    Vijaykrishnan, N
    Kandemir, M
    Brooks, R
    IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, PROCEEDINGS: NEW FRONTIERS IN VLSI DESIGN, 2005, : 104 - 109
  • [2] Data-driven public health security
    Li, Cuiping
    Wu, Linhuan
    Shu, Chang
    Bao, Yiming
    Ma, Juncai
    Song, Shuhui
    CHINESE SCIENCE BULLETIN-CHINESE, 2024, 69 (09): : 1156 - 1163
  • [3] Data-driven multimedia forensics and security
    Rocha, Anderson
    Li, Shujun
    Kuo, C. -C. Jay
    Piva, Alessandro
    Huang, Jiwu
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 55 : 447 - 448
  • [4] A Data-Driven Approach to Security Science
    Iyer, Ravishankar K.
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [5] Towards a Data-Driven Enterprise: Effects on Information, Governance, Infrastructures and Security
    Polzonetti, A.
    Sagratella, M.
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 1480 - 1484
  • [6] A Data-driven Assessment Model for Information Systems Security Risk Management
    Feng, Nan
    Yu, Xue
    JOURNAL OF COMPUTERS, 2012, 7 (12) : 3103 - 3109
  • [7] Value of data meets IT security - assessing IT security risks in data-driven value chains
    Bitomsky, Laura
    Buerger, Olga
    Haeckel, Bjoern
    Toeppel, Jannick
    ELECTRONIC MARKETS, 2020, 30 (03) : 589 - 605
  • [8] Data-driven Software Security: Models and Methods
    Erlingsson, Ulfar
    2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 9 - 15
  • [9] Value of data meets IT security – assessing IT security risks in data-driven value chains
    Laura Bitomsky
    Olga Bürger
    Björn Häckel
    Jannick Töppel
    Electronic Markets, 2020, 30 : 589 - 605
  • [10] Data-Driven Analysis of Airport Security Checkpoint Operations
    Janssen, Stef
    van der Sommen, Regis
    Dilweg, Alexander
    Sharpanskykh, Alexei
    AEROSPACE, 2020, 7 (06)