A Video Game for Cyber Security Training and Awareness
Cone, Benjamin D.
Irvine, Cynthia E.
Thompson, Michael F.
Nguyen, Thuy D.
MetadataShow full item record
Although many of the concepts included in cyber security awareness training are universal, such training often must be tailored to address the policies and requirements of a particular organization. In addition, many forms of training fail because they are rote and do not require users to think about and apply security concepts. A flexible, highly interactive video game, CyberCIEGE, is described as a security awareness tool that can support organizational security training objectives while engaging typical users in an engaging security adventure. The game is now being successfully utilized for information assurance education and training by a variety of organizations. Preliminary results indicate the game can also be an effective addition to basic information awareness training programs for general computer users (e.g., annual awareness training.)
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Verification and Validation of the Malicious Activity Simulation Tool (MAST) for Network Administrator Training and Evaluation Neff, Justin M. (Monterey, California. Naval Postgraduate School, 2012);The DoD currently employs red teams to conduct network infiltration and security training for network administrators and operators. Red Teams provide the most realistic and thorough training to defend against real-world ...
Irvine, Cynthia E.; Thompson, Michael F.; Allen, Ken (Naval Postgraduate School (U.S)., 2005-03-00);Good security is not intrusive and can be almost invisible to typical users, who are often unaware of or take it for granted. However, good security practice by user populations is a critical element of an organization's ...
Irvine, Cynthia E.; Thompson, Michael F.; Allen, Ken (Rivermind, Inc., 2005);Good security is not intrusive and can be almost invisible to typical users, who are often unaware of or take it for granted. However, good security practice by user populations is a critical element of an organization's ...