Teaching Objectives of a Simulation Game for Computer Security
Abstract
This paper describes a computer simulation game being developed to teach computer security principles. The player of the game constructs computer networks and makes choices affecting the ability of these networks and the game's virtual users to protect valuable assets from attack by both vandals and well-motivated professionals. The game introduces the player to the need for well formed information security policies, allowing the player to deploy a variety of means to enforce security policies, including authentication, audit and access controls. The game will depict a number of vulnerabilities ranging from trivial passwords to trap doors planted by highly skilled, well-funded adversaries.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Related items
Showing items related by title, author, creator and subject.
-
A Security Simulation Game Scenario Definition Language
Falby, Naomi; Thompson, Michael F.; Irvine, Cynthia E. (IEEE, 2004-06-00);The Center for the Information Systems Studies and Research (CISR) at the Naval Postgraduate School has established a broad program in computer and network security education. The program, founded on a core in traditional ... -
A CyberCIEGE scenario illustrating secrecy issues in an Internal Corporate Network connected to the internet
Lamorie, Justin D. (Monterey, California. Naval Postgraduate School, 2004-09);The CyberCIEGE project seeks to create an alternative to traditional Information Assurance (IA) training and education approaches by developing an interactive, entertaining commercial-grade PC-based computer game that ... -
A variation in the Brown method of solving games.
Jauregui, Stephen Jr. (1960);The brown method of solving zero sum two person games by a method of successive approximations was programmed for the NCR-102A Digital Computer. Game matricies up to order 8x8 were investigated, although the program ...