A framework to improve threat vector analysis through the use of gamification

Jason Flood, Anthony Keane

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

It is proposed that a Capture the Flag readily adaptable framework can be used to educate the individuals responsible for ensuring the security of the cloud infrastructure. Skills transfer of security principles through gamification facilitates the calculation of a metric concerning the skill level of the players. Gap analysis of essential skills can then be carried out and subsequently addressed by the employer. This CTF gaming framework has been refined through cyber challenge events such as IRISS 2012, Source Dublin 2013, Owasp Latam/EU tours 2013 and Also the OWASP Global CTF 2013. The framework describes a risk assessment process operating at both the network and application layers. It also looks to address security policy aspects and make recommendations based on attack/defence behaviours. Although this is still a work in progress, implementation challenges of the proposed framework when operated in house and when accessible remotely are discussed in this study.

Original languageEnglish
Title of host publication9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014
EditorsSam Liles
PublisherAcademic Conferences Limited
Pages245-253
Number of pages9
ISBN (Electronic)9781632660626
Publication statusPublished - 2014
Event9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014 - West Lafayette, United States
Duration: 24 Mar 201425 Mar 2014

Publication series

Name9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014

Conference

Conference9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014
Country/TerritoryUnited States
CityWest Lafayette
Period24/03/1425/03/14

Keywords

  • Capture-the-flag
  • Cyber crime
  • Cyberwar
  • Security

Fingerprint

Dive into the research topics of 'A framework to improve threat vector analysis through the use of gamification'. Together they form a unique fingerprint.

Cite this