Control - Alt - Hack TM : A Card Game for Computer Security Outreach , Education
نویسندگان
چکیده
A general lack of awareness about computer security contributes to the insecurity of new consumer technologies. We seek to increase people’s prioritization of computer security and their understanding of the variety of attacks and technologies that can be vulnerable to compromise. We work towards this goal via fun: more specifically, via a recreational tabletop card game where people play as white hat hackers. In this paper, we describe our goals and experiences in creating this card game. We licensed a game mechanic from a hobbyist game company, worked with graphic designers and illustrators, and rewrote card text to make the game about working as a computer security professional. We discuss the possibilities for expanding the educational benefits of this game, both in and out of the classroom. We conclude by inviting others to engage in this outreach space by creating games or other enticing and novel artifacts to increase awareness and appreciation of the complexities and impact of computer security on people’s daily lives.
منابع مشابه
Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research
We designed, produced, distributed, and evaluated Control-Alt-HackTM: a recreational tabletop card game intended to promote a casual awareness of high-level computer security concepts. Our experiences throughout this process gave us insights and opinions regarding the creation of games, their role in educational or outreach contexts, and opportunities and challenges for the research community. ...
متن کاملControl - Alt - Hack TM : A Card Game for Computer Security Outreach
A general lack of awareness about computer security contributes to the insecurity of new consumer technologies. We seek to increase people’s prioritization of computer security and their understanding of the variety of attacks and technologies that can be vulnerable to compromise. We work towards this goal via fun: more specifically, via a recreational tabletop card game where people play as wh...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملMapping CRC Card into Stochastic Petri Net for Analyzing and Evaluating Quality Parameter of Security (TECHNICAL NOTE)
CRC cards are unconventional method for identifying and describing classes, behavior and its responsibilities and collaborators of class. Representation of three categories of class, responsibilities and collaborators can give proper image of scenario. These cards are effective method for analyzing scenarios. With all positive features of CRC cards, of weaknesses of these cards are failure to s...
متن کاملFour-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report
Cyber security education and outreach is a national priority. It is critical to encourage high school students to pursue studies in cyber security and related fields. High school outreach is a fundamental component of a cohesive cyber security education program. Most high school outreach programs in cyber security focus on short-term events such as a capture the flag contest or the CyberPatriot...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012