Vis enkel innførsel

dc.contributor.authorLøvgren, Dag Erik Homdrum
dc.contributor.authorLi, Jingyue
dc.contributor.authorOyetoyan, Tosin Daniel
dc.date.accessioned2020-03-02T09:43:53Z
dc.date.available2020-03-02T09:43:53Z
dc.date.created2019-07-03T13:44:57Z
dc.date.issued2019
dc.identifier.isbn978-1-7281-1764-5
dc.identifier.urihttp://hdl.handle.net/11250/2644564
dc.description.abstractMany universities have started to educate students on how to develop secure software and systems. One challenge of teaching information security is that the curriculum can easily be outdated, because new attacks and mitigation approaches arise. It is therefore necessary to provide software developers with methods and tools that are attractive (e.g., computer games) for self-study and up-to-date information security knowledge during and after the university education. This paper presents an on-going study to develop an educational game to facilitate information security education. The game is developed as a single player Tower Defense (TD) game. The educational goal of the game is to teach developers, who are not security experts, how to choose proper mitigation strategies and patterns to defend against various security attack scenarios. One key benefit of our game is that it is data driven, meaning, it can continuously fetch data from relevant security-based online sources (e.g., Common Attack Pattern Enumeration Classification CAPEC) to stay up to date with any new information. This is done automatically. We evaluated the game by letting students play it and give comments. Evaluation results show that the game can facilitate students learning of mitigation strategies to defend against attack scenarios.nb_NO
dc.language.isoengnb_NO
dc.publisherIEEEnb_NO
dc.relation.ispartofProceedings of the 41st International Conference on Software Engineering: Companion Proceedings
dc.titleA Data-Driven Security Game to Facilitate Information Security Educationnb_NO
dc.typeChapternb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber256-257nb_NO
dc.identifier.doihttp://dx.doi.org/10.1109/ICSE-Companion.2019.00102
dc.identifier.cristin1709808
dc.description.localcode© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.nb_NO
cristin.unitcode194,63,10,0
cristin.unitnameInstitutt for datateknologi og informatikk
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel