Control - Alt - Hack TM : A Card Game for Computer Security Outreach
نویسندگان
چکیده
A general lack of awareness about computer security contributes to the insecurity of new consumer technologies. We seek to increase people’s prioritization of computer security and their understanding of the variety of attacks and technologies that can be vulnerable to compromise. We work towards this goal via fun: more specifically, via a recreational tabletop card game where people play as white hat hackers. In this paper, we describe our goals and experiences in creating this card game. We licensed a game mechanic from a hobbyist game company, worked with graphic designers and illustrators, and rewrote card text to make the game about working as a computer security professional. We discuss the possibilities for expanding the educational benefits of this game, both in and out of the classroom. We conclude by inviting others to engage in this outreach space by creating games or other enticing and novel artifacts to increase awareness and appreciation of the complexities and impact of computer security on people’s daily lives.
منابع مشابه
Control - Alt - Hack TM : A Card Game for Computer Security Outreach , Education
A general lack of awareness about computer security contributes to the insecurity of new consumer technologies. We seek to increase people’s prioritization of computer security and their understanding of the variety of attacks and technologies that can be vulnerable to compromise. We work towards this goal via fun: more specifically, via a recreational tabletop card game where people play as wh...
متن کاملPractical Lessons from Creating the Control-Alt-Hack Card Game and Research Challenges for Games In Education and Research
We designed, produced, distributed, and evaluated Control-Alt-HackTM: a recreational tabletop card game intended to promote a casual awareness of high-level computer security concepts. Our experiences throughout this process gave us insights and opinions regarding the creation of games, their role in educational or outreach contexts, and opportunities and challenges for the research community. ...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملMapping CRC Card into Stochastic Petri Net for Analyzing and Evaluating Quality Parameter of Security (TECHNICAL NOTE)
CRC cards are unconventional method for identifying and describing classes, behavior and its responsibilities and collaborators of class. Representation of three categories of class, responsibilities and collaborators can give proper image of scenario. These cards are effective method for analyzing scenarios. With all positive features of CRC cards, of weaknesses of these cards are failure to s...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012