Setup the game environment: Print the map of the game. (The original dimension of the map size is set to adjust on the table). [Map Hospital.png] Print asset cards [Assets Cards – Hospital.pdf] and weakness cards for human assets [Weakness people.pdf]. Attach / pin the human asset cards with the weakness card on the back. Print Vulnerability card [Vulnerability IT Devices.pdf]. Attach / pin the IT asset cards with the respective vulnerability card on the back. Print and cut the psychology card [Psychology compliance principle.pdf]. Print and cut the puzzle card [Riddle or puzzle.pdf]. Print the Network Attack techniques card [Network Attack Cards.pdf]. Print the Physical Attack techniques card [Physical Attacker cards.pdf] Print the Social...
Social engineering is now a major threat to users and systems in the online context, and it is there...
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage ...
Abstract: The Security Protocol Game is a highly interactive game for teaching secure data communic...
Setup the game environment: Print the map of the game. (The original dimension of the map size is s...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
Ransomware attacks based on social engineering have been increasing since COVID-19. Attackers have c...
This paper describes the design process for the cybersecurity serious game “PeriHack” and, in doing ...
In this day and age, the field of information security is becoming more and more important. Develope...
This paper describes a computer simulation game being developed to teach computer security principle...
Several research findings indicate that basic cyber hygiene can potentially deter the majority of cy...
The purpose of this study is to determine the possibility of addressing the shortcoming of Security ...
Serious games are becoming more popular because they provide an opportunity for learning in a natura...
[[abstract]]In recent years, with the rapid growth of the Internet applications and services, how to...
This paper presents the rationale for the design of a card deck game sustaining information security...
Abstract-Computer security has become vital for protecting users, applications and data, yet the fie...
Social engineering is now a major threat to users and systems in the online context, and it is there...
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage ...
Abstract: The Security Protocol Game is a highly interactive game for teaching secure data communic...
Setup the game environment: Print the map of the game. (The original dimension of the map size is s...
© 2017 Elsevier B.V. Context: Security, in digitally connected organizational environments of today,...
Ransomware attacks based on social engineering have been increasing since COVID-19. Attackers have c...
This paper describes the design process for the cybersecurity serious game “PeriHack” and, in doing ...
In this day and age, the field of information security is becoming more and more important. Develope...
This paper describes a computer simulation game being developed to teach computer security principle...
Several research findings indicate that basic cyber hygiene can potentially deter the majority of cy...
The purpose of this study is to determine the possibility of addressing the shortcoming of Security ...
Serious games are becoming more popular because they provide an opportunity for learning in a natura...
[[abstract]]In recent years, with the rapid growth of the Internet applications and services, how to...
This paper presents the rationale for the design of a card deck game sustaining information security...
Abstract-Computer security has become vital for protecting users, applications and data, yet the fie...
Social engineering is now a major threat to users and systems in the online context, and it is there...
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage ...
Abstract: The Security Protocol Game is a highly interactive game for teaching secure data communic...