Gamification as a winning cyber security strategy

被引:5
|
作者
Wolfenden B. [1 ]
机构
[1] Circadence, United States
来源
Computer Fraud and Security | 2019年 / 2019卷 / 05期
关键词
Crime - Computer crime;
D O I
10.1016/S1361-3723(19)30052-1
中图分类号
学科分类号
摘要
We are more connected than ever before. Our smart TVs and refrigerators, phones and drones, online bank accounts and electronic health records, and so much more, are on the web and in the cloud – connected and ‘talking’ to each other. While creating convenience for the end user, this growing interconnected digital footprint creates a ripe surface for a cyber criminal to attack. Just like in some video games, consumers and business leaders find themselves battling the consequences of interconnectivity and are trying to keep opponents from exploiting their information and damaging their reputation. In this “game of protection’ to balance defensive and offensive security techniques, now is the time for CISOs and business leaders to reach for a new cyber security manual – one that leverages gamification. This is the process of exploiting game-like elements to improve information retention and the application of skills, explains Brad Wolfenden of Circadence. © 2019 Elsevier Ltd
引用
下载
收藏
页码:9 / 12
页数:3
相关论文
共 50 条