Talking about Talking about Cybersecurity Games
Peterson, Zachary N. J.
MetadataShow full item record
The recent explosion of cybersecurity games not only reflects a growing interest in the discipline broadly, but a recognition that these types of games can be entertaining as well as useful tools for outreach and education. However, cybersecurity game terminology—those terms used to describe or communicate a game’s format, goals, and intended audience— can be confusing or, at worst, misleading. The result being a potential to disappoint some players, or worse, misrepresent the discipline and discourage the same populations we intend to attract. The year 2015 marked the second USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE), co-located again with the USENIX Security Symposium. At the event, we invited a community conversation about terminology for cybersecurity games. The conversation was the seed of a draft vocabulary report to be presented to the Cybersecurity Competition Federation for comment and possible adoption. In this article, we summarize some of the issues arising from that discussion.
Showing items related by title, author, creator and subject.
Bardwell, Andrew; Buggy, Sean; Walls, Remuis (Monterey, California: Naval Postgraduate School, 2017-12);Cyber threats are a growing concern for our military, creating a need for cybersecurity education. Current methods used to educate students about cyber, including annual Navy Knowledge Online training, are perceived to be ...
Shaffer, David G. (Monterey, California: Naval Postgraduate School, 2016-06);The roles and responsibilities for cybersecurity within the national government are not clearly delineated. This thesis asks if the current allocations of cybersecurity responsibilities to DHS are optimal for achieving ...
IMPLEMENTATION OF ACTIVE CYBER DEFENSE MEASURES BY PRIVATE ENTITIES: THE NEED FOR AN INTERNATIONAL ACCORD TO ADDRESS DISPUTES Barnes, Isaac A. (Monterey, CA; Naval Postgraduate School, 2018-12);Cybersecurity is a national security issue. Passive cyber defense measures are no longer sufficient. This thesis uses options analysis to consider different courses of action for the employment of active cyber defense ...