five

Improving Software Security Awareness Using A Serious Game

收藏
Mendeley Data2024-01-31 更新2024-06-26 收录
下载链接:
https://data.mendeley.com/datasets/sxm5cvrcx8
下载链接
链接失效反馈
官方服务:
资源简介:
Setup the game environment: Print the map of the game. (The original dimension of the map size is set to adjust on the table). [Map Hospital.png] Print asset cards [Assets Cards – Hospital.pdf] and weakness cards for human assets [Weakness people.pdf]. Attach / pin the human asset cards with the weakness card on the back. Print Vulnerability card [Vulnerability IT Devices.pdf]. Attach / pin the IT asset cards with the respective vulnerability card on the back. Print and cut the psychology card [Psychology compliance principle.pdf]. Print and cut the puzzle card [Riddle or puzzle.pdf]. Print the Network Attack techniques card [Network Attack Cards.pdf]. Print the Physical Attack techniques card [Physical Attacker cards.pdf] Print the Social Engineering Attack techniques card [Social Engineer cards.pdf]. Print and cut the role card [Player role card.pdf]. Print the attackers positions cards [Attacker position.jpg]. Print Goal Sheets for social engineering attackers [gs2.png]. Print Goal sheets for physical and network attacker [gs1.png]. Take simple paper sheet for players to write hypothetical scenarios. Print discussion sheet [score sheet discussion.pdf]. Take any sheet for getting feedback. For discussion session or observation use any sheet to record. Post survey.pdf can be used to get feedback regarding the game. Learning scenarios can be taken from the paper published. Game data, Animated Videos for evaluation, and post survey template is attached.
创建时间:
2024-01-31
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作