Gamification as a winning cyber security strategy

被引:5
|
作者
Wolfenden B. [1 ]
机构
[1] Circadence, United States
来源
Computer Fraud and Security | 2019年 / 2019卷 / 05期
关键词
Crime - Computer crime;
D O I
10.1016/S1361-3723(19)30052-1
中图分类号
学科分类号
摘要
We are more connected than ever before. Our smart TVs and refrigerators, phones and drones, online bank accounts and electronic health records, and so much more, are on the web and in the cloud – connected and ‘talking’ to each other. While creating convenience for the end user, this growing interconnected digital footprint creates a ripe surface for a cyber criminal to attack. Just like in some video games, consumers and business leaders find themselves battling the consequences of interconnectivity and are trying to keep opponents from exploiting their information and damaging their reputation. In this “game of protection’ to balance defensive and offensive security techniques, now is the time for CISOs and business leaders to reach for a new cyber security manual – one that leverages gamification. This is the process of exploiting game-like elements to improve information retention and the application of skills, explains Brad Wolfenden of Circadence. © 2019 Elsevier Ltd
引用
下载
收藏
页码:9 / 12
页数:3
相关论文
共 50 条
  • [31] National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis
    Osho, Oluwafemi
    Onoja, Agada D.
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2015, 9 (01): : 120 - 143
  • [32] International cyber security strategy as a tool for comprehensive security assurance of civil aviation security: methodological considerations
    Grygorov, Oleksandr
    Basysta, Albina
    Yedeliev, Roman
    Paziuk, Andrii
    Tropin, Zakhar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (09): : 332 - 338
  • [33] Winning Strategy
    Cohn, Fred
    OPERA NEWS, 2017, 82 (08): : 22 - 23
  • [34] A winning strategy
    Raissa M. D'Souza
    Nature Physics, 2013, 9 : 212 - 213
  • [35] Grid Cyber-Security Strategy in an Attacker-Defender Model
    Chen, Yu-Cheng
    Mooney, Vincent
    Grijalva, Santiago
    2020 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2020,
  • [36] Grid Cyber-Security Strategy in an Attacker-Defender Model
    Chen, Yu-Cheng
    Mooney, Vincent John, III
    Grijalva, Santiago
    CRYPTOGRAPHY, 2021, 5 (02)
  • [37] The Constitution of the Internet The EU needs to develop a common Strategy for Cyber Security
    Bendiek, Annegret
    Wagner, Ben
    INTERNATIONALE POLITIK, 2012, 67 (06): : 85 - 92
  • [38] Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace
    Deibert, Ron
    JOURNAL OF MILITARY AND STRATEGIC STUDIES, 2012, 14 (02):
  • [39] The Enlightenment of Nine Classical Cyber Warfare to the National Cyberspace Security Strategy
    Pan Xiang
    Xu Tianye
    Xiao Zhiting
    Guo Xuan
    ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 695 - 703
  • [40] A Study of Effective Defense-In-Depth Strategy of Cyber Security on ICS
    Choi, Seong-Muk
    Kim, Rae-Hyung
    Kim, Ga-Ye
    Lee, Hyeon-Kyung
    Gim, GwangYong
    Kim, Jong-Bae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 235 - 242