Talking about Talking about Cybersecurity Games
Abstract
The recent explosion of cybersecurity games not only reflects a growing
interest in the discipline broadly, but a recognition that these
types of games can be entertaining as well as useful tools for outreach
and education. However, cybersecurity game terminology—those terms
used to describe or communicate a game’s format, goals, and intended audience—
can be confusing or, at worst, misleading. The result being a potential
to disappoint some players, or worse, misrepresent the discipline and discourage
the same populations we intend to attract. The year 2015 marked the
second USENIX Summit on Gaming, Games, and Gamification in Security
Education (3GSE), co-located again with the USENIX Security Symposium.
At the event, we invited a community conversation about terminology for
cybersecurity games. The conversation was the seed of a draft vocabulary
report to be presented to the Cybersecurity Competition Federation for comment
and possible adoption. In this article, we summarize some of the issues
arising from that discussion.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Cybersecurity education for military officers
Bardwell, Andrew; Buggy, Sean; Walls, Remuis (Monterey, California: Naval Postgraduate School, 2017-12);Cyber threats are a growing concern for our military, creating a need for cybersecurity education. Current methods used to educate students about cyber, including annual Navy Knowledge Online training, are perceived to be ... -
Lessons Learned in Building and Implementing an Effective Cybersecurity Strategy
Woody, Carol; Creel, Rita (Monterey, California. Naval Postgraduate School, 2021-05-10); SYM-AM-21-057Today's missions rely on highly integrated and complex technology that must be protected from a wide range of adversaries in a very dynamic and contested cyber environment. The predominant response to the growing, shifting ... -
Lessons Learned in Building and Implementing an Effective Cybersecurity Strategy [video]
Woody, Carol; Creel, Rita (Monterey, California. Naval Postgraduate School, 2021-05-20); SYM-AM-21-220; SYM-AM-21-145Today's missions rely on highly integrated and complex technology that must be protected from a wide range of adversaries in a very dynamic and contested cyber environment. The predominant response to the growing, shifting ...