Control - Alt - Hack TM : A Card Game for Computer Security Outreach , Education

نویسندگان

  • Tamara Denning
  • Tadayoshi Kohno
  • Adam Shostack
چکیده

A general lack of awareness about computer security contributes to the insecurity of new consumer technologies. We seek to increase people’s prioritization of computer security and their understanding of the variety of attacks and technologies that can be vulnerable to compromise. We work towards this goal via fun: more specifically, via a recreational tabletop card game where people play as white hat hackers. In this paper, we describe our goals and experiences in creating this card game. We licensed a game mechanic from a hobbyist game company, worked with graphic designers and illustrators, and rewrote card text to make the game about working as a computer security professional. We discuss the possibilities for expanding the educational benefits of this game, both in and out of the classroom. We conclude by inviting others to engage in this outreach space by creating games or other enticing and novel artifacts to increase awareness and appreciation of the complexities and impact of computer security on people’s daily lives.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research

We designed, produced, distributed, and evaluated Control-Alt-HackTM: a recreational tabletop card game intended to promote a casual awareness of high-level computer security concepts. Our experiences throughout this process gave us insights and opinions regarding the creation of games, their role in educational or outreach contexts, and opportunities and challenges for the research community. ...

متن کامل

Control - Alt - Hack TM : A Card Game for Computer Security Outreach

A general lack of awareness about computer security contributes to the insecurity of new consumer technologies. We seek to increase people’s prioritization of computer security and their understanding of the variety of attacks and technologies that can be vulnerable to compromise. We work towards this goal via fun: more specifically, via a recreational tabletop card game where people play as wh...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

Mapping CRC Card into Stochastic Petri Net for Analyzing and Evaluating Quality Parameter of Security (TECHNICAL NOTE)

CRC cards are unconventional method for identifying and describing classes, behavior and its responsibilities and collaborators of class. Representation of three categories of class, responsibilities and collaborators can give proper image of scenario. These cards are effective method for analyzing scenarios. With all positive features of CRC cards, of weaknesses of these cards are failure to s...

متن کامل

Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report

Cyber security education and outreach is a national priority. It is critical to encourage high school students to pursue studies in cyber security and related fields. High school outreach is a fundamental component of a cohesive cyber security education program. Most high school outreach programs in cyber security focus on short-term events such as a capture the flag contest or the CyberPatriot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012