Operation Raven Design of a Cyber Security Incident Response Game

被引:0
|
作者
Seiler, Andreas [1 ,2 ]
Lechner, Ulrike [2 ]
Strussenberg, Judith [2 ]
Hofbauer, Stefan [2 ]
机构
[1] Lechwerke AG, Augsburg, Germany
[2] Univ Bundeswehr Munich, Neubiberg, Germany
关键词
Incident response; Serious game; Tabletop exercise; Adversary emulation; Cyber threat intelligence; Ransomware;
D O I
10.1007/978-3-031-60433-1_19
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Envisioning a major ransomware incident with its potential consequences might be unpleasant, and preparing for such an incident takes quite an effort. Operation Raven is a serious game designed to facilitate discussion about processes and decisions to detect, contain, and eradicate ransomware. This paper presents the game idea and game material of Operation Raven and the results after two game events. The article reflects on the next steps.
引用
收藏
页码:337 / 347
页数:11
相关论文
共 50 条
  • [41] Modelling language for cyber security incident handling for critical infrastructures
    Mouratidis, Haralambos
    Islam, Shareeful
    Santos-Olmo, Antonio
    Sanchez, Luis E.
    Ismail, Umar Mukhtar
    COMPUTERS & SECURITY, 2023, 128
  • [42] A Readiness Model for Measuring the Maturity of Cyber Security Incident Management
    Rieger, David
    Tjoa, Simon
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 283 - 293
  • [43] Analysis and Parsing of Unstructured Cyber-Security Incident Data
    Ochoa, Armando J.
    Finlayson, Mark A.
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 345 - 346
  • [44] Developing a Cyber Incident Exercises Model to Educate Security Teams
    Alothman, Basil
    Alhajraf, Aldanah
    Alajmi, Reem
    Al Farraj, Rawan
    Alshareef, Nourah
    Khan, Murad
    ELECTRONICS, 2022, 11 (10)
  • [45] Envisioning a Cyber-Security Incident Managed Campus Environment
    Thorpe, Sean
    Jarrett, Julian
    Grandison, Tyrone
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 307 - 309
  • [46] Check Your Blind Spot: A New Cyber-Security Metric for Measuring Incident Response Readiness
    Aziz, Benjamin
    Malik, Ali
    Jung, Jeyong
    RISK ASSESSMENT AND RISK-DRIVEN QUALITY ASSURANCE, RISK 2016, 2017, 10224 : 19 - 33
  • [47] Designing Simulation Logic of UAV Cyber Operation Using Cyber Security Framework
    Lee, Sangjun
    Kang, Dongsu
    IEEE ACCESS, 2024, 12 : 3488 - 3498
  • [48] Designing Simulation Logic of UAV Cyber Operation Using Cyber Security Framework
    Lee, Sangjun
    Kang, Dongsu
    IEEE Access, 2024, 12 : 3488 - 3498
  • [49] Response to Cyber Security Demands for Agility
    Nejib, Perri
    Beyer, Dawn
    Insight, 2014, 17 (02) : 35 - 39
  • [50] Cyber Security Assistant:Design Overview
    Sayan, Carla
    Hariri, Salim
    Ball, George
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 313 - 317