SlideShare a Scribd company logo
1 of 38
Download to read offline
Permission Impossible:
Teaching Firewall Configuration in a
Game Environment
Sibylle Sehl @s_ibylle
Kami Vaniea @kaniea
Games as an educational medium to teach
● Growing research in field of
educational security games to teach
hard to grasp topics in an engaging
way
● These games have potential to attract
wide audience ranging from children
to adults (Druin, 2004; Cone et al.,
2007; Olano et al., 2014)
Existing security games
Existing solutions are
great but do not solve
our problem!
Games for absolute beginners Games for Professionals
How do we target interested
parties at an early age?
Why firewalls?
● To teach security to the next generation
effectively, we need to start somewhere
● Firewalls as a term that young people have
heard before and associate with security
● Certain curiosity about how firewalls
protect your computer
● VMs are a nightmare to configure and
alienate people starting out
What is a firewall?
“ A firewall is a device, software, arrangement, or equipment that limits
network access, be it a software layer or a physical box.” (Cheswick et al.,
2003)
“While there are many types of firewalls, all of them work by examining the
traffic passing across them and applying a set of rules to the traffic to
determine if each packet will be allowed through (accept) or discarded
(drop).” (Gouda & Liu, 2007)
Common professional-level firewall errors
● Rule ordering, hard to follow rules, and
keeping rules to a minimum
● Allowing “any service” inbound and outbound,
unencrypted access and using implicit rules
with regard to TCP, UDP and ICMP
● Conceptual errors
● Rise in automation starts to eliminate typos
and simple ordering errors
Even experienced system administrators still make
mistakes and struggle to grasp certain concepts.
Image: http://arstechnica.co.uk/gadgets/2016/01/numbers-dont-lie-its-time-to-build-your-own-router/
Requirements & Design Goals
Existing solutions don’t solve our problem for the identified gap, which led us to
formulate the following design goals:
● Accessible to a general audience
● Anyone should be able to play and gain an improved understanding of what a
firewall is and how it works
● Avoid “attack and defense” terminology - security should be welcoming
● Concepts: chains, rule evaluation order, and default policies
● Extend terminology development to build accurate mental models
Game Design
Permission Impossible consists of two main screens:
Instruction Screens Interactive Game Screens
Level 2 Walkthrough - Instructions
Allow user to
switch
between
screens and
progress
Main
character
Roboto
Level 2 Walkthrough - Interactive Game Screens
Error message to
help user diagnose
his mistake
Pressing the play button
will play an animation if
user input is correct
Draggable
building
blocks
Ability to reset current
selection
Level 1:
● Intro rule building interface
● Different rules for packets coming
in and going out
Level 2:
● Two rules per chain
● Goal: allow traffic for port 80 and
default policy of drop
Levels 3 - 7:
● Introduce protocols: SSH, FTP,
DNS, SMPT and SIP
Level 8:
● Combines knowledge of services
and ports
● Multiple complex rules for a chain
Level 9:
● Default of ACCEPT
● Block a specific IP
Level 10:
● Asks user to construct a sensible
ruleset freely.
● Hints removed
Level Structure
Lab Study
● In-person lab study (1 person remote)
● Screen capture software and notes taken by
researcher
● Pre/post questionnaires
○ Demographics
○ System Usability Scale rating (Post test only),
○ Prior firewall knowledge
○ Firewall terminology
○ Read an iptables command
○ Understanding of the rule building interface
Demographics
● 5 participants
● 2 female players and 3 male players
● Average game play was 27 min (ranging
from 13 min to 38 min)
● Mix of computer science and/or security
knowledge
10 people filled out the User Feedback Sheet (SUS)
Usability
● Average SUS score for 10 participants: 88.25
○ Considered a high degree of usability
● Good understanding of the rule building
interface, especially after playing the game
● One participant didn’t understand that
objects could be dragged and dropped
without instruction
● Easy recovery from errors and every
participant could complete the game
Understanding of the rule building interface before
playing the game (P4)
Results
Prior firewall knowledge
Pre Test Post Test
● Term “firewall” sounded familiar to
all participants
● One participant mentioned that
“firewall protects computers from
hackers”
● 2 participants thought they knew
how a firewall operates
● 3 participants had no idea how a
firewall operates
● Every participant provided an answer
as to how a firewall works
● “A firewall has rules and checks
whether packets match these” -
Participant 2 (no CS or Security
knowledge)
Results
Knowledge of firewall terminology
IP Address, Hyper Text Transfer Protocol, DNS, Ports, Chains …
Pre Test Post Test
● Even participants that had computer
security knowledge had trouble
identifying correct terminology
● Inexperienced participant did not
know the term “packet”
● No participant was familiar with
“chains”
● In general, more terminology
questions answered correctly after
playing the game
● 3 participants (all with CS
knowledge) accurately described a
“chain” as a set of rules
● One participant indicated that
“chains” didn’t sound familiar
Results
Ability to read an iptables command
iptables -A INPUT -i eth0 -p tcp --port 443 -m state --state NEW,ESTABLISHED -j ACCEPT
Pre Test Post Test
● Only one participant (CS and
Security knowledge) could describe
the different parts of the iptables
command
Example answer P2:
P2: “1. IP address tables, 2. Data Input 3.
/ “
● All participants could explain
somewhat what the iptables
command meant, including the
participant who had no previous
knowledge in the field
Example answer P2:
P2: “Input for port 443 is accepted for
new and established connections”
Results
Differentiating Input vs Output rules
Pre Test Post Test
● Only two participants understood the two
terms
● The other three participants did not
relate the terms to firewalls or left
question blank
● Participants could all explain the
difference
● Participant who left field blank in pre
test:
“Input rule specifies which packets are
allowed to enter the system. Output
rule specifies what is allowed to leave
the system.”
Conclusion
● First results from evaluation promising
● Participants found the game to be fun, engaging
and educational
● Permission Impossible creates an accessible
introduction for beginners to learn about firewalls
● Addresses gap between interest improving games
and competitive level games
● Participants responded well to positive language:
“helping Roboto”
Thank you
Q & A Session
Sibylle Katharina Sehl
MSc Computer Science Graduate from University of Edinburgh
E-mail: sibylle.sehl@googlemail.com
LinkedIn: https://www.linkedin.com/in/sibyllekatharinasehl/
Limitations & Future Research
Limitations
● Small sample of users in study
● Research can only serve as first investigation into the field
Future Work
● More complex levels should be developed and build on users’ knowledge
● Design improvements in terms of different screen sizes
● Motivational screens for congratulating the user to keep up engagement
More Screenshots
Level 10: Colour hints removed
Extra building blocks that
aren’t needed for
completion of level
Teaching about
implications of default
policy of accept

More Related Content

What's hot

Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
sumitjain2013
 
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
Ann Joseph
 
IPv6 이론과 소켓 프로그래밍
IPv6 이론과 소켓 프로그래밍IPv6 이론과 소켓 프로그래밍
IPv6 이론과 소켓 프로그래밍
OnGameServer
 
Chapter 8 overview
Chapter 8 overviewChapter 8 overview
Chapter 8 overview
ali raza
 

What's hot (20)

Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
 
Who's singing? Automatic bird sound recognition with machine learning - Dan S...
Who's singing? Automatic bird sound recognition with machine learning - Dan S...Who's singing? Automatic bird sound recognition with machine learning - Dan S...
Who's singing? Automatic bird sound recognition with machine learning - Dan S...
 
IPv6 이론과 소켓 프로그래밍
IPv6 이론과 소켓 프로그래밍IPv6 이론과 소켓 프로그래밍
IPv6 이론과 소켓 프로그래밍
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition Technology
 
EMEA Airheads- Aruba Instant AP- VPN Troubleshooting
EMEA Airheads- Aruba Instant AP-  VPN TroubleshootingEMEA Airheads- Aruba Instant AP-  VPN Troubleshooting
EMEA Airheads- Aruba Instant AP- VPN Troubleshooting
 
IPv6 Addressing Architecture
IPv6 Addressing ArchitectureIPv6 Addressing Architecture
IPv6 Addressing Architecture
 
Voip security
Voip securityVoip security
Voip security
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Chapter#10
Chapter#10Chapter#10
Chapter#10
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
IPv4 and IPv6
IPv4 and IPv6IPv4 and IPv6
IPv4 and IPv6
 
FreeSBC How To - Advanced SIP Routing
FreeSBC How To - Advanced SIP RoutingFreeSBC How To - Advanced SIP Routing
FreeSBC How To - Advanced SIP Routing
 
Chapter 8 overview
Chapter 8 overviewChapter 8 overview
Chapter 8 overview
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance
 
Socket programming
Socket programmingSocket programming
Socket programming
 
Fundamental of cellular system
Fundamental of cellular systemFundamental of cellular system
Fundamental of cellular system
 
IPV6 INTRODUCTION
IPV6 INTRODUCTIONIPV6 INTRODUCTION
IPV6 INTRODUCTION
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
SPEAKER VERIFICATION
SPEAKER VERIFICATIONSPEAKER VERIFICATION
SPEAKER VERIFICATION
 

Similar to Teaching Firewall Configuration in a Game Environment

An Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security EducationAn Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security Education
Xiao Qin
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
Cu Nguyen
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
phanleson
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14
jemtallon
 

Similar to Teaching Firewall Configuration in a Game Environment (20)

Agile Secure Development
Agile Secure DevelopmentAgile Secure Development
Agile Secure Development
 
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
 
Enter The back|track Linux Dragon
Enter The back|track Linux DragonEnter The back|track Linux Dragon
Enter The back|track Linux Dragon
 
An Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security EducationAn Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security Education
 
12 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 201712 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 2017
 
Data Driven Game Design
Data Driven Game DesignData Driven Game Design
Data Driven Game Design
 
Game Development Challenges
Game Development ChallengesGame Development Challenges
Game Development Challenges
 
Game Design as an Intro to Computer Science (Meaningful Play 2014)
Game Design as an Intro to Computer Science (Meaningful Play 2014)Game Design as an Intro to Computer Science (Meaningful Play 2014)
Game Design as an Intro to Computer Science (Meaningful Play 2014)
 
Kumar cscl final
Kumar cscl finalKumar cscl final
Kumar cscl final
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
 
From SLO to GOTY
From SLO to GOTYFrom SLO to GOTY
From SLO to GOTY
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
Kingston University AR Drone game-final report.pdf
Kingston University AR Drone game-final report.pdfKingston University AR Drone game-final report.pdf
Kingston University AR Drone game-final report.pdf
 
Talking TUF: Securing Software Distribution
Talking TUF: Securing Software DistributionTalking TUF: Securing Software Distribution
Talking TUF: Securing Software Distribution
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14
 
VDP2016 - Lecture 13 Data driven game design
VDP2016 - Lecture 13 Data driven game designVDP2016 - Lecture 13 Data driven game design
VDP2016 - Lecture 13 Data driven game design
 
Peripherals and Ports
Peripherals and PortsPeripherals and Ports
Peripherals and Ports
 
Scenario-based Serious Game to Teach about Healthcare
Scenario-based Serious Game to Teach about HealthcareScenario-based Serious Game to Teach about Healthcare
Scenario-based Serious Game to Teach about Healthcare
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

Teaching Firewall Configuration in a Game Environment

  • 1. Permission Impossible: Teaching Firewall Configuration in a Game Environment Sibylle Sehl @s_ibylle Kami Vaniea @kaniea
  • 2. Games as an educational medium to teach ● Growing research in field of educational security games to teach hard to grasp topics in an engaging way ● These games have potential to attract wide audience ranging from children to adults (Druin, 2004; Cone et al., 2007; Olano et al., 2014)
  • 3. Existing security games Existing solutions are great but do not solve our problem! Games for absolute beginners Games for Professionals How do we target interested parties at an early age?
  • 4. Why firewalls? ● To teach security to the next generation effectively, we need to start somewhere ● Firewalls as a term that young people have heard before and associate with security ● Certain curiosity about how firewalls protect your computer ● VMs are a nightmare to configure and alienate people starting out
  • 5. What is a firewall? “ A firewall is a device, software, arrangement, or equipment that limits network access, be it a software layer or a physical box.” (Cheswick et al., 2003) “While there are many types of firewalls, all of them work by examining the traffic passing across them and applying a set of rules to the traffic to determine if each packet will be allowed through (accept) or discarded (drop).” (Gouda & Liu, 2007)
  • 6. Common professional-level firewall errors ● Rule ordering, hard to follow rules, and keeping rules to a minimum ● Allowing “any service” inbound and outbound, unencrypted access and using implicit rules with regard to TCP, UDP and ICMP ● Conceptual errors ● Rise in automation starts to eliminate typos and simple ordering errors Even experienced system administrators still make mistakes and struggle to grasp certain concepts. Image: http://arstechnica.co.uk/gadgets/2016/01/numbers-dont-lie-its-time-to-build-your-own-router/
  • 7. Requirements & Design Goals Existing solutions don’t solve our problem for the identified gap, which led us to formulate the following design goals: ● Accessible to a general audience ● Anyone should be able to play and gain an improved understanding of what a firewall is and how it works ● Avoid “attack and defense” terminology - security should be welcoming ● Concepts: chains, rule evaluation order, and default policies ● Extend terminology development to build accurate mental models
  • 8. Game Design Permission Impossible consists of two main screens: Instruction Screens Interactive Game Screens
  • 9. Level 2 Walkthrough - Instructions Allow user to switch between screens and progress Main character Roboto
  • 10.
  • 11. Level 2 Walkthrough - Interactive Game Screens Error message to help user diagnose his mistake Pressing the play button will play an animation if user input is correct Draggable building blocks Ability to reset current selection
  • 12.
  • 13.
  • 14. Level 1: ● Intro rule building interface ● Different rules for packets coming in and going out Level 2: ● Two rules per chain ● Goal: allow traffic for port 80 and default policy of drop Levels 3 - 7: ● Introduce protocols: SSH, FTP, DNS, SMPT and SIP Level 8: ● Combines knowledge of services and ports ● Multiple complex rules for a chain Level 9: ● Default of ACCEPT ● Block a specific IP Level 10: ● Asks user to construct a sensible ruleset freely. ● Hints removed Level Structure
  • 15. Lab Study ● In-person lab study (1 person remote) ● Screen capture software and notes taken by researcher ● Pre/post questionnaires ○ Demographics ○ System Usability Scale rating (Post test only), ○ Prior firewall knowledge ○ Firewall terminology ○ Read an iptables command ○ Understanding of the rule building interface
  • 16. Demographics ● 5 participants ● 2 female players and 3 male players ● Average game play was 27 min (ranging from 13 min to 38 min) ● Mix of computer science and/or security knowledge 10 people filled out the User Feedback Sheet (SUS)
  • 17. Usability ● Average SUS score for 10 participants: 88.25 ○ Considered a high degree of usability ● Good understanding of the rule building interface, especially after playing the game ● One participant didn’t understand that objects could be dragged and dropped without instruction ● Easy recovery from errors and every participant could complete the game Understanding of the rule building interface before playing the game (P4)
  • 18. Results Prior firewall knowledge Pre Test Post Test ● Term “firewall” sounded familiar to all participants ● One participant mentioned that “firewall protects computers from hackers” ● 2 participants thought they knew how a firewall operates ● 3 participants had no idea how a firewall operates ● Every participant provided an answer as to how a firewall works ● “A firewall has rules and checks whether packets match these” - Participant 2 (no CS or Security knowledge)
  • 19. Results Knowledge of firewall terminology IP Address, Hyper Text Transfer Protocol, DNS, Ports, Chains … Pre Test Post Test ● Even participants that had computer security knowledge had trouble identifying correct terminology ● Inexperienced participant did not know the term “packet” ● No participant was familiar with “chains” ● In general, more terminology questions answered correctly after playing the game ● 3 participants (all with CS knowledge) accurately described a “chain” as a set of rules ● One participant indicated that “chains” didn’t sound familiar
  • 20. Results Ability to read an iptables command iptables -A INPUT -i eth0 -p tcp --port 443 -m state --state NEW,ESTABLISHED -j ACCEPT Pre Test Post Test ● Only one participant (CS and Security knowledge) could describe the different parts of the iptables command Example answer P2: P2: “1. IP address tables, 2. Data Input 3. / “ ● All participants could explain somewhat what the iptables command meant, including the participant who had no previous knowledge in the field Example answer P2: P2: “Input for port 443 is accepted for new and established connections”
  • 21. Results Differentiating Input vs Output rules Pre Test Post Test ● Only two participants understood the two terms ● The other three participants did not relate the terms to firewalls or left question blank ● Participants could all explain the difference ● Participant who left field blank in pre test: “Input rule specifies which packets are allowed to enter the system. Output rule specifies what is allowed to leave the system.”
  • 22. Conclusion ● First results from evaluation promising ● Participants found the game to be fun, engaging and educational ● Permission Impossible creates an accessible introduction for beginners to learn about firewalls ● Addresses gap between interest improving games and competitive level games ● Participants responded well to positive language: “helping Roboto”
  • 23. Thank you Q & A Session Sibylle Katharina Sehl MSc Computer Science Graduate from University of Edinburgh E-mail: sibylle.sehl@googlemail.com LinkedIn: https://www.linkedin.com/in/sibyllekatharinasehl/
  • 24. Limitations & Future Research Limitations ● Small sample of users in study ● Research can only serve as first investigation into the field Future Work ● More complex levels should be developed and build on users’ knowledge ● Design improvements in terms of different screen sizes ● Motivational screens for congratulating the user to keep up engagement
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. More Screenshots Level 10: Colour hints removed Extra building blocks that aren’t needed for completion of level Teaching about implications of default policy of accept