Gamification as a winning cyber security strategy

被引:5
|
作者
Wolfenden B. [1 ]
机构
[1] Circadence, United States
来源
Computer Fraud and Security | 2019年 / 2019卷 / 05期
关键词
Crime - Computer crime;
D O I
10.1016/S1361-3723(19)30052-1
中图分类号
学科分类号
摘要
We are more connected than ever before. Our smart TVs and refrigerators, phones and drones, online bank accounts and electronic health records, and so much more, are on the web and in the cloud – connected and ‘talking’ to each other. While creating convenience for the end user, this growing interconnected digital footprint creates a ripe surface for a cyber criminal to attack. Just like in some video games, consumers and business leaders find themselves battling the consequences of interconnectivity and are trying to keep opponents from exploiting their information and damaging their reputation. In this “game of protection’ to balance defensive and offensive security techniques, now is the time for CISOs and business leaders to reach for a new cyber security manual – one that leverages gamification. This is the process of exploiting game-like elements to improve information retention and the application of skills, explains Brad Wolfenden of Circadence. © 2019 Elsevier Ltd
引用
下载
收藏
页码:9 / 12
页数:3
相关论文
共 50 条
  • [41] Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia
    Hadji-Janev, Metodi
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 57 - 64
  • [42] Development of a Cyber Security Awareness Strategy Using Focus Group Discussion
    Yunos, Zahri
    Ab Hamid, Ramona Susanty
    Ahmad, Mustaffa
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1063 - 1067
  • [43] Defense-in-Depth Strategy for Smart Service Sever Cyber Security
    Son, Hanseong
    Kim, Soongohn
    COMPUTER APPLICATIONS FOR COMMUNICATION, NETWORKING, AND DIGITAL CONTENTS, 2012, 350 : 181 - +
  • [44] Formalizing Agents' Beliefs for Cyber-Security Defense Strategy Planning
    Martiny, Karsten
    Motzek, Alexander
    Moeller, Ralf
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 15 - 25
  • [45] The gamification as an instructional strategy
    Barboza, Eduardo Fernando Uliana
    REVISTA EDAPECI-EDUCACAO A DISTANCIA E PRATICAS EDUCATIVAS COMUNICACIONAIS E INTERCULTURAIS, 2024, 24 (02): : 4 - 13
  • [46] Cyber security
    Boughton, Nick
    CHEMISTRY & INDUSTRY, 2019, 83 (04) : 38 - 38
  • [47] Cyber(in)security
    Szczypiorski, Krzysztof
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (01) : 243 - 248
  • [48] Cyber security
    Sandström, E
    Weiss, J
    2005 CIGRE/IEEE PES International Symposium, 2005, : 282 - 289
  • [49] CYBER SECURITY
    Sonntag, Michael
    IDIMT-2016- INFORMATION TECHNOLOGY, SOCIETY AND ECONOMY STRATEGIC CROSS-INFLUENCES, 2016, 45 : 313 - 323
  • [50] Cyber security
    Colias, M
    HOSPITALS & HEALTH NETWORKS, 2004, 78 (05): : 60 - +