dc.contributor.author | Yamin, Muhammad Mudassar | |
dc.contributor.author | Katt, Basel | |
dc.contributor.author | Nowostawski, Mariusz | |
dc.date.accessioned | 2021-10-28T11:30:11Z | |
dc.date.available | 2021-10-28T11:30:11Z | |
dc.date.created | 2021-08-22T10:42:01Z | |
dc.date.issued | 2021 | |
dc.identifier.issn | 0167-4048 | |
dc.identifier.uri | https://hdl.handle.net/11250/2826296 | |
dc.description.abstract | Technology is evolving rapidly; this poses a problem for security specialists and average citizens as their technological skill sets are quickly made obsolete. This makes the knowledge and understanding of cyber-security in a technologically evolving world difficult. Global IT infrastructure and individuals’ privacy are constantly under threat. One way to tackle this problem is by providing continuous training and self-learning platforms. Cyber-security exercises can provide a necessary platform for training people’s cyber-security skills. However, conducting cyber-security exercises with new and unique scenarios requires comprehensive planning and commitment to the preparation time and resources. In this work, we propose a serious game for the development of cyber-security exercise scenarios. The game provides a platform to model simulated cyber-security exercise scenarios, transforming them into an emulated cyber-security exercise environment using domain-specific language (DSL) and infrastructure orchestration. In this game, players can play as cyber attackers or defenders in a multiplayer environment to make operational cyber-security decisions in real-time. The decisions are evaluated for the development of operational cyber-attack and defense strategies. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Elsevier | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/deed.no | * |
dc.title | Serious Games as a Tool to Model Attack and Defense Scenarios for Cyber-Security Exercises | en_US |
dc.type | Peer reviewed | en_US |
dc.type | Journal article | en_US |
dc.description.version | acceptedVersion | en_US |
dc.rights.holder | This is the authors' accepted manuscript to an article published by Elsevier. Locked until 20.8.2023 due to copyright restrictions. The AAM is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/ | en_US |
dc.source.journal | Computers & security | en_US |
dc.identifier.doi | https://doi.org/10.1016/j.cose.2021.102450 | |
dc.identifier.cristin | 1927832 | |
cristin.ispublished | false | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |