A Data-driven Security Game to Facilitate Information Security Education

被引:2
作者
Lovgren, Dag Erik Homdrum [1 ]
Li, Jingyue [2 ]
Oyetoyan, Tosin Daniel [3 ]
机构
[1] Acando AS, Digital Core Trondheim, Trondheim, Norway
[2] Norwegian Univ Sci & Technol, Dept Comp Sci, Trondheim, Norway
[3] Western Norway Univ Appl Sci, Dept Comp Math & Phys, Bergen, Norway
来源
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2019) | 2019年
关键词
Information security; serious game; game-based education;
D O I
10.1109/ICSE-Companion.2019.00102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Many universities have started to educate students on how to develop secure software and systems. One challenge of teaching information security is that the curriculum can easily be outdated, because new attacks and mitigation approaches arise. It is therefore necessary to provide software developers with methods and tools that are attractive (e.g., computer games) for self-study and up-to-date information security knowledge during and after the university education. This paper presents an on-going study to develop an educational game to facilitate information security education. The game is developed as a single player Tower Defense (TD) game. The educational goal of the game is to teach developers, who are not security experts, how to choose proper mitigation strategies and patterns to defend against various security attack scenarios. One key benefit of our game is that it is data driven, meaning, it can continuously fetch data from relevant security-based online sources (e.g., Common Attack Pattern Enumeration Classification CAPEC) to stay up to date with any new information. This is done automatically. We evaluated the game by letting students play it and give comments. Evaluation results show that the game can facilitate students learning of mitigation strategies to defend against attack scenarios.
引用
收藏
页码:256 / 257
页数:2
相关论文
共 8 条
[1]  
Bangor A, 2009, J USABILITY STUD, V4, P114
[2]  
Barnum S., 2014, Structured threat information expression (STIXTM), P1
[3]  
Denning T., 2013, P ACM C COMP COMM SE, DOI [10.1145/2508859.2516753, DOI 10.1145/2508859.2516753]
[4]  
Nah Fiona Fui-Hoon, 2014, HCI in Business. First International Conference, HCIB 2014. Held as Part of HCI International 2014. Proceedings: LNCS 8527, P401, DOI 10.1007/978-3-319-07293-7_39
[5]  
Shostack Adam., 2014, USENIX Summit on Gaming, Games, and Gamification in Security Education, P1
[6]  
Watson Colin, 2012, OWASP CORNUCOPIA ECO
[7]  
White G.B., 2016, TECH REP
[8]   Protection Poker: The New Software Security "Game" [J].
Williams, Laurie ;
Meneely, Andrew ;
Shipley, Grant .
IEEE SECURITY & PRIVACY, 2010, 8 (03) :14-20