CyberCIEGE Scenario Design and Implementation

In 2005, the initial version of CyberCIEGE, a network security simulation packaged as a video game, was released. Since then, we have developed a suite of game scenarios and have enhanced and extended the underlying game engine to cover a broad set of cybersecurity concepts. CyberCIEGE includes a Scenario Development Kit to customize existing game scenarios and create new ones. A Scenario Development Language lets instructors express security policies of interest and the circumstances in which these policies must be enforced. This language programs and augments the underlying CyberCIEGE simulation, enabling context-rich interaction with students, while relying on the simulation to assess network security and enterprise productivity. Scenario creation requires both story telling and highlevel programming techniques. Scenario designers use a forms-based integrated development environment to express a scenario in terms of its initial conditions, security policies, economic constraints, and student feedback.

[1]  Ken Allen,et al.  CyberCIEGE: Gaming for Information Assurance , 2005, IEEE Secur. Priv..

[2]  Cynthia E. Irvine,et al.  Teaching Objectives of a Simulation Game for Computer Security , 2003 .

[3]  Cynthia E. Irvine,et al.  Active Learning with the CyberCIEGE Video Game , 2011, CSET.

[4]  Gordon Fyodor Lyon,et al.  Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .

[5]  P. A. Karger,et al.  Multics security evaluation: vulnerability analysis , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[6]  C. E. Irvine,et al.  Simulation of PKI-enabled communication for identity management using CyberCIEGE , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[7]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[8]  Chun Che Fung,et al.  Raising information security awareness in digital ecosystem with games - a pilot study in Thailand , 2008, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies.

[9]  Willis H Ware Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security , 1979 .

[10]  Xiaohong Yuan,et al.  A comparative study of CyberCIEGE game and Department of Defense Information Assurance Awareness video , 2010, Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon).

[11]  Cynthia E. Irvine,et al.  A video game for cyber security training and awareness , 2007, Comput. Secur..

[12]  Cynthia E. Irvine,et al.  Expressing an information security policy within a security simulation game , 2004 .

[13]  Daniel A. Sledz,et al.  A Dynamic Three-Dimensional Network Visualization Program for Integration into CyberCIEGE and Other Network Visualization Scenarios , 2007 .

[14]  Xuquan Stanley. Chang,et al.  A CyberCIEGE Traffic Analysis Extension for Teaching Network Security , 2011 .

[15]  Edward Packard,et al.  The Cave of Time , 1979 .

[16]  Ernest Adams,et al.  Fundamentals of Game Design , 2006 .