Abstract
Security of network assets is a high priority with little traditional return on investment. Increasingly, cyber attacks are being used by both terrorist and unfriendly government organizations. The HACKING Game, a Cross Impact Analysis planning tool, can be used to plan security resource allocation in computer networks. Cross Impact Analysis provides a mathematical basis to determine the interrelationships of one event with a set of other events. Output from the HACKING Game's Cross Impact Analysis model can be used to help justify security expenditures, with an added benefit of being a training tool for employees learning to protect networks. This paper presents details of the Hacking Game's design and its capabilities. Cross impact modeling can be used to develop games for any situation characterized by a set of offense and defense events to produce an individual or collaborative model for such things as natural and man-made disasters.
Original language | English (US) |
---|---|
State | Published - 2010 |
Event | 7th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2010 - Seattle, WA, United States Duration: May 2 2010 → May 5 2010 |
Other
Other | 7th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2010 |
---|---|
Country/Territory | United States |
City | Seattle, WA |
Period | 5/2/10 → 5/5/10 |
All Science Journal Classification (ASJC) codes
- Information Systems
Keywords
- Cross Impact Analysis
- Gaming
- Modeling
- Planning tools