Simulation of PKI-Enabled Communication for Identity Management Using CyberCIEGE
Irvine, Cynthia E.
Thompson, Michael F.
MetadataShow full item record
CyberCIEGE is a sophisticated network security simulation packaged as a video game and used by educators around the world to enhance information assurance education and training at universities, community colleges, within the DoD, and in other government agencies. The CyberCIEGE game engine was recently expanded to include Public Key Infrastructure (PKI) features including certification authorities, selection of installed roots and cross certification. CyberCIEGE Virtual Private Network (VPN) gateways, VPN clients and email clients were then extended to incorporate the new PKI features. CyberCIEGE PKI abstractions are described in terms of player configuration choices and the consequences of these choices on network management and vulnerabilities. The CyberCIEGE game engine modifications include modeling of chains of trust and risks of cross certification schemes. The benefits of these enhancements include coherent integration of identity management technologies, ranging from the human interface through to the supporting distributed infrastructure, into scenarios. Benefits also include support for recent new scenarios focused on the PKI infrastructure, identity management, or both; and the ability to tie both identity management and PKI to concepts of identification, authentication, provenance, and access control.
Showing items related by title, author, creator and subject.
Ruppar, Carrie Aliene (Monterey, California. Naval Postgraduate School, 2005-12);The increase in online activities which involve peopleâ s identification information means that identity theft has become a widespread computer security issue. Identity theft is defined as the misuse of personal information ...
Irvine, Cynthia E.; Thompson, Michael F. (Monterey, California. Naval Postgraduate School, 2009-05); NPS-CS-09-006CyberCIEGE is a resource-management simulation in which the player assumes the role of a decision maker for an IT-dependent organization. Through the use of scenarios, it is intended to support education, training and ...
What’s in a name: a comparative analysis of the United States’ REAL ID Act and the United Kingdom’s national identity scheme Jefferson, Karrie Ann (Monterey, California: Naval Postgraduate School, 2015-12);Since September 11, 2001, many governments have considered developing national identity management systems. Beyond identification, politicians and proponents of these systems have touted such system benefits as combating ...