Abstract : As the number of computer users continues to grow, attacks on assets stored on computer devices have increased. Despite an increase in computer security awareness, many users and policy makers still do not implement security principles in their daily lives. Ineffective education and the lack of personal experience and tacit understanding might be a main cause. The CyberCIEGE game can be used to convey requisite facts and to generate tacit understanding of general computer security concepts to a broad audience. This thesis asked if a Scenario Definition File (SDF) for the CyberCIEGE game could be developed to educate and train players in Information Assurance on matters related to information integrity in a networking environment. The primary educational concern is the protection of stored data. Another goal was to test whether the game engine properly simulates real world behavior. The research concluded that it is possible to create SDFs for the CyberCIEGE game engine to teach specifically about integrity issues. Three specific SDFs were developed for teaching purposes. Several SDFs were developed to demonstrate the game engine's ability to simulate real world behavior for specific, isolated educational goals. These tests led to recommendations to improve the game engine.
[1]
Cynthia E. Irvine,et al.
A cautionary note regarding the data integrity capacity of certain secure systems
,
2001,
IICIS.
[2]
P. A. Karger,et al.
Multics security evaluation: vulnerability analysis
,
2002,
18th Annual Computer Security Applications Conference, 2002. Proceedings..
[3]
David D. Clark,et al.
A Comparison of Commercial and Military Computer Security Policies
,
1987,
1987 IEEE Symposium on Security and Privacy.
[4]
Joachim Richter,et al.
An Analysis of Synergies of IT-Applications and Knowledge Management Strategies with Regard to Organizational Change
,
2003
.
[5]
Roger R. Schell,et al.
Concepts and Terminology for Computer Security
,
2006
.
[6]
Cynthia E. Irvine,et al.
Teaching Objectives of a Simulation Game for Computer Security
,
2003
.
[7]
E. Anderson,et al.
A Demonstration of the subversion threat : facing a critical responsibility in the defense of cyberspace
,
2002
.