scholarly journals A Gamification Approach to Improving Interpersonal Situational Awareness in Cyber Defense

2021 ◽  
Author(s):  
Torvald F. Ask ◽  
Benjamin J. Knox ◽  
Ricardo Lugo ◽  
Lukas Hoffmann ◽  
Stefan Sütterlin

In cyber threat situations, the establishment of a shared situational awareness as a basis for cyber defense decision-making results from adequate communication of a Recognized Cyber Picture (RCP). RCPs consist of actively selected information and have the goal of accurately presenting the severity and potential consequences of the situation. RCPs must be communicated between individuals, but also between organizations, and often from technical to non-/less technical personnel. The communication of RCPs is subject to many challenges that may affect the transfer of critical information between individuals. There are currently no common best practices for training communication for shared situational awareness among cyber defense personnel. The Orient, Locate, Bridge (OLB) model is a pedagogic tool to improve communication between individuals during a cyber threat situation. According to the model, an individual must apply meta-cognitive awareness (O), perspective taking (L), and communication skills (B) to successfully communicate the RCP. Gamification (applying game elements to non-game contexts) has shown promise as an approach to learning. We propose a novel OLB-based Gamification design to improve dyadic communication for shared situational awareness among (technical and non-technical) individuals during a cyber threat situation. The design includes the Gamification elements of narrative, scoring, feedback, and judgment of self. The proposed concept contributes to the educational development of cyber operators from both military and civilian organizations responsible for defending and securing digital infrastructure. This is achieved by combining the elements of a novel communication model with gamification in a context in urgent need for educational input.

Author(s):  
Gabriel Klein ◽  
Simon Hunke ◽  
Heiko Günther ◽  
Marko Jahnke

Author(s):  
Sandhya Sukhabogi Et.al

Cyber Threat Intelligence (CTI) is the emerging strategy of cyber defense which helps organizations to combat the latest and more sophisticated cyber threats. Gathering this threat information, analyzing and communicating it between the security teams is very difficult and challenging because of the heterogeneous aspects involved.  The necessity of sharing the intelligence related data collected by organizations is increasing day by day to counter the ever changing and highly dynamic threat landscape. In this paper an attempt is made to understand CTI concept and how it is collected and analyzed to form useful actionable intelligence are observed. The importance of Threat intelligence sharing, and various standards working in the area of TIS are also mentioned. Finally the primary challenges in TIS are given a light in a broad view


Author(s):  
Paul Barford ◽  
Marc Dacier ◽  
Thomas G. Dietterich ◽  
Matt Fredrikson ◽  
Jon Giffin ◽  
...  

Author(s):  
Mattew Kuofie ◽  
Sonika Suman

Gamification as a potent pedagogic tool existed even in the ancient periods and in different geographical regions. It was observed that using gamification to teach the learners was more powerful and useful so much so that it helped the optimum utilization of resources. However, with the advent of virtual reality and augmented reality making inroads into education in general and management education in particular, it is now feasible to use gamification for management education. It is often found that the management learners are comparatively brainier and selected after strict competitive examinations. They get easily blasé of the traditional methods of pedagogy. They have always demanded challenging curricula, deep contents, and exciting pedagogy to learn. It is in this context that the gamification of learning has been introduced to motivate and challenge the learners by using video game design and game elements in learning environments. These games are meant to maximise enjoyment and engagement through influencing the interests of learners and inspiring them to continue with their learning process. Gamification in its practical use in the management educational spaces and corporate training spaces made a substantial impact all across the globe. The future opportunities for gamification both in content space and structural space are going to be far more than can be imagined with the explosion taking place in technology.


2020 ◽  
Vol 2020 (3) ◽  
pp. 254-1-254-10
Author(s):  
Michael Pilgermann ◽  
Sören Werth ◽  
Reiner Creutzburg

Many organisations, especially Critical Infrastructures, are facing an increasingly severe cyber threat situation and are continuously improving their IT-security. We present the state of the art of sector specific security operation of CI operators with the German health sector as an example. To improve the situation we propose several spheres of activity with practical exemplary measures, e.g. for relevant protocols. In this way we help to prepare a CI sector governance with sourcing options for security operation for all relevant actors: from the responsible authorities in the country via a single point of contact in the health sector to hospital centres and the medical practice.


2021 ◽  
Vol 2 (4) ◽  
pp. 1-10
Author(s):  
Sagar Samtani ◽  
Weifeng Li ◽  
Victor Benjamin ◽  
Hsinchun Chen

To increase situational awareness, major cybersecurity platforms offer Cyber Threat Intelligence (CTI) about emerging cyber threats, key threat actors, and their modus operandi. However, this intelligence is often reactive, as it analyzes event log files after attacks have already occurred, lacking more active scrutiny of potential threats brewing in cyberspace before an attack has occurred. One intelligence source receiving significant attention is the Dark Web, where significant quantities of malicious hacking tools and other cyber assets are hosted. We present the AZSecure Hacker Assets Portal (HAP). The Dark Web-based HAP collects, analyzes, and reports on the major Dark Web data sources to offer unique perspective of hackers, their cybercriminal assets, and their intentions and motivations, ultimately contributing CTI insights to improve situational awareness. HAP currently supports 200+ users internationally from academic institutions such as UT San Antonio and National Taiwan University, law enforcement entities such as Calgary and Ontario Provincial Police, and industry organizations including General Electric and PayPal.


Sign in / Sign up

Export Citation Format

Share Document