Skip to main content

Cyber Security Table-Top Exercise Gamification with Dynamic Scenario for Qualification Assessment

  • Conference paper
  • First Online:
HCI International 2022 – Late Breaking Posters (HCII 2022)

Abstract

Today, information technology is used to fight the virus and perform various daily activities like teleworking and learning from home. It is essential to ask within the cyber community how to acquire and build competencies during the pandemic that would span beyond technological skills. Digitally made online tabletop environments are especially relevant in this crucial time. Tabletop exercises help professionals learn and analyse different scenarios of human behaviour and prepare for real-life situations. In particular, it is essential to use tabletop exercises with gamification capabilities for agile adaptation to learners’ competencies. Gamification elements in education are used when simulating static or dynamic incidents and scenarios. Depending on the scenario at hand, different competencies are evaluated. This poster describes a prototype developed by the cyber security roles and competencies assessment. It is a comprehensive analysis and implementation process. The prototype introduces some specialised roles that can be chosen. Based on the role, the difficulty of a scenario is set, and the game begins. The poster demonstrates how implemented prototype puts a varying effort on the cyber domain, general communication and organisational skills.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
€34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 96.29
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 128.39
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

') var buybox = document.querySelector("[data-id=id_"+ timestamp +"]").parentNode var buyingOptions = buybox.querySelectorAll(".buying-option") ;[].slice.call(buyingOptions).forEach(initCollapsibles) var buyboxMaxSingleColumnWidth = 480 function initCollapsibles(subscription, index) { var toggle = subscription.querySelector(".buying-option-price") subscription.classList.remove("expanded") var form = subscription.querySelector(".buying-option-form") var priceInfo = subscription.querySelector(".price-info") var buyingOption = toggle.parentElement if (toggle && form && priceInfo) { toggle.setAttribute("role", "button") toggle.setAttribute("tabindex", "0") toggle.addEventListener("click", function (event) { var expandedBuyingOptions = buybox.querySelectorAll(".buying-option.expanded") var buyboxWidth = buybox.offsetWidth ;[].slice.call(expandedBuyingOptions).forEach(function(option) { if (buyboxWidth buyboxMaxSingleColumnWidth) { toggle.click() } else { if (index === 0) { toggle.click() } else { toggle.setAttribute("aria-expanded", "false") form.hidden = "hidden" priceInfo.hidden = "hidden" } } }) } initialStateOpen() if (window.buyboxInitialised) return window.buyboxInitialised = true initKeyControls() })()

Institutional subscriptions

Similar content being viewed by others

References

  1. Boopathi, K., Sreejith, S., Bithin, A.: Learning cyber security through gamification. Indian J. Sci. Technol. 8(7), 642–649 (2015)

    Article  Google Scholar 

  2. Brilingaitė, A., Bukauskas, L., Krinickij, V., Kutka, E.: Environment for cybersecurity tabletop exercises. In: ECGBL 2017 11th European Conference on Game-Based Learning, pp. 47–55. Academic Conferences and publishing limited (2017)

    Google Scholar 

  3. Catota, F.E., Morgan, M.G., Sicker, D.C.: Cybersecurity education in a developing nation: the Ecuadorian environment. J. Cybersecurity 5(1), tyz001 (2019)

    Google Scholar 

  4. Fink, G., Best, D., Manz, D., Popovsky, V., Endicott-Popovsky, B.: Gamification for measuring cyber security situational awareness. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) AC 2013. LNCS (LNAI), vol. 8027, pp. 656–665. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39454-6_70

    Chapter  Google Scholar 

  5. Gasiba, T., Lechner, U., Pinto-Albuquerque, M., Zouitni, A.: Design of secure coding challenges for cybersecurity education in the industry. In: Shepperd, M., Brito e Abreu, F., Rodrigues da Silva, A., Pérez-Castillo, R. (eds.) QUATIC 2020. CCIS, vol. 1266, pp. 223–237. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58793-2_18

    Chapter  Google Scholar 

  6. László, K., András, N., Ákos, O., András, S.: Structuration theory and strategic alignment in information security management: Introduction of a comprehensive research approach and program. AARMS-Acad. Appl. Res. Mil. Publ. Manage. Sci. 16(1), 5–16 (2017)

    Google Scholar 

  7. Le, N.T., Pinkwart, N.: Bayesian networks for competences-base student modeling. In: Proceedings of the 11th International Conference on Knowledge Management, Osaka, Japan, pp. 4–6 (2015)

    Google Scholar 

  8. Newhouse, W., Keith, S., Scribner, B., Witte, G.: National initiative for cybersecurity education (NICE) cybersecurity workforce framework. NIST Spec. Publ. 800(2017), 181 (2017)

    Google Scholar 

  9. Pfleeger, S.L., Caputo, D.D.: Leveraging behavioral science to mitigate cyber security risk. Comput. Secur. 31(4), 597–611 (2012)

    Article  Google Scholar 

  10. Squires, A., Wade, J., Dominick, P., Gelosh, D.: Building a competency taxonomy to guide experience acceleration of lead program systems engineers. Technical report, Stevens Institute of Technology Hoboken NJ School of Systems and Enterprises (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Linas Bukauskas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kvietinskaitė, G., Bukauskas, L., Krinickij, V. (2022). Cyber Security Table-Top Exercise Gamification with Dynamic Scenario for Qualification Assessment. In: Stephanidis, C., Antona, M., Ntoa, S., Salvendy, G. (eds) HCI International 2022 – Late Breaking Posters. HCII 2022. Communications in Computer and Information Science, vol 1654. Springer, Cham. https://doi.org/10.1007/978-3-031-19679-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-19679-9_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-19678-2

  • Online ISBN: 978-3-031-19679-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics