SlideShare a Scribd company logo
1 of 54
Project
KidHack
Teaching the Next Next Generation
Security through Gaming
@grecs & @pupstrr
NovaInfosec.com
Disclaimer
• Opinions expressed do not express the views
or opinions of
– my employers, his schools
– my customers,
– my wife, his mom
– my daughter, his sister
– my parents, his grandparents
– my in-laws, his other grandparents
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
20 Yrs Industry
16 Yrs Infosec
5 Yrs SOC
NovaInfosec Consulting
• General Security Engineering/Architecture
• Everything SOC
– Engineering
– Operations
– Training
– SOC 2.0
datamation.com/cnews/article.php/3851071/Tech-Comics-Cloud-Computing-Consultants.htm
Agenda
• Background
• Existing Games
• KidHack Project
• What’s Next?
• Conclusion
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
BACKGROUND
Why
Inspiration
Background
Why
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Feds Need 10,000 Cyber Security Experts (6/7/2009)
Cybersecurity business, jobs expected to grow through 2016 (10/21/12)
Fewer Cyber Pros, More Cyber Problems (9/1/14)
Background
Why
• NSA Tapping Schools of Excellence
• University “Cyber” Degrees
• Technical Training Organizations
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Preparing Next Next
Gen of Infosec Pros
by Getting Interested
Early
Recent Trainer Role -
Contemplating Best
Ways to Teach
Focus on Simulation with Gaming
Versus Setting Up Real Environment
SIMULATION WITH GAMING
…
NEXT-
NEXT
GEN
TRAINING
ROLE
Background
Inspiration
• CTFs (for years)
• Bruce Potter – DerbyCon 2013
– It’s Only a Game: Learning Security through Gaming
• History of CTF Contests & Other Games Hardcore Security Pros Play
• Games that Can Be Used to Engage Non-Security Pros  More Focused on
Theory vs Collecting List of Games
• http://bit.ly/pottergaming
• MrsYIsY – Network Computing
– Want To Develop Information Security Skills?
Capture The Flag
• Simulation of Real-World Security Operations
• http://bit.ly/mrsyctf
• Ender’s Game
– Military Tactics
– Simulations/Drills
EXISTING GAMES
Hacker
[d0x3d!]
Control-Alt-Hack
Hackers & Agents
Pwn
Uplink
CryptoClub
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Type: Card
• History/About
– 1990: Secret Service Raided Steve Jackson Games
• Confiscated Equipment, including Illuminati BBS.
– 1992: Made Game of It
• Satirizing Secret Service, Hackers, Phone Companies, etc.
– 1993: Hacker II – The Dark Side - more players & new rules
– 2001: Hacker – Deluxe Edition – Combined All Above into
Box Set
• Objective
– Players Act as Hackers
– Compete Against Each Other to Control Most Systems
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Hacker uses a variation of the Illuminati system; players lay
out cards (representing systems) to create the Net, which is
never the same twice. But instead of separate “power
structures” for each player, there is only one Net, and
players place tokens to indicate what systems they have
invaded and how completely they control them.
• For 3 to 6 players; takes from 90 minutes to 2 1/2 hours.
The supplement, Hacker II, lets you add two more players.
• Components include rulebook, 110 cards, 172 marker
chips, 6 console units, lots of “system upgrades,” and other
markers.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Hacker II
– Supplement to Hacker (not playable alone)
– New Rules: Viruses, the Internet Worm, outdials, multiple accounts,
Black Ice, and Military Hardware.
– Consoles & Tokens for 2 More Players
• Hacker – Deluxe Edition
– Can you break into the world’s toughest computer systems? In Hacker,
players sail through the Net, competing to invade the most systems.
The more systems you crack, the more you learn, and the easier your
next target is. You can find back doors and secret phone lines, and
even crash the systems your rivals are using. But be careful. There’s a
Secret Service Raid waiting for you!
– Designed by Steve Jackson, Hacker requires guile and diplomacy. To
win, you must trade favors with your fellow hackers – and get more
than you give away. But jealous rivals will try to bust you. Three busts
and you’re out of the game!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Availability
– Out of Print
– Dealers In Out-Of-Print Games
• http://www.sjgames.com/general/outofprint.html
• Write-Up
– http://bit.ly/hackercardgame
• Kid Review
Existing Games
[d0x3d!]
• Type: Card/Board
• History/About
– Inspired by 2010 Game
Forbidden Island
– Introduces Attack & Defend Mechanics and Other
Basic Computer Security Constructs
• Objective
– Teaching Non-Techies Computer Security
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
[d0x3d!]
• In [d0x3d!], you and up to three other players take on the role of an 1337 hacker
syndicate, infiltrating a network to reclaim valuable digital assets that have been
stolen from them. What are these assets? There are four types—financial data,
personally identifiable information, authentication credentials, and intellectual
property—but what exactly these represents is your little secret. Embarrassing
photos? The recipe for the best BBQ in the world? You decide.
• As you seek out these valuable digital assets, the network admins respond:
patching compromised machines, raising alarms, sometimes changing its very
topology to impede your movement. You and your team work together,
compromising and looting machines on the network, trying to not alert the
network admins of your presence. If the admins feel too threatened by the activity
they see on their network, they will take your stolen personal data and release it
onto the internet! In other words, you’ll get d0x3d!
• You all win together, or you all lose together. Brave the network and protect your
data!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
[d0x3d!]
http://youtu.be/oMi-GB9tc6s
Existing Games
[d0x3d!]
• Availability
– Open-Source & Freely Available
• https://github.com/TableTopSecurity/d0x3d-the-game
• Download & Print
– $25 Boxed Set from TheGameCrafter.com
• https://www.thegamecrafter.com/games/-d0x3d-
• Write-Up
– http://bit.ly/d0x3dgame
• Kid Review
Existing Games
Control-Alt-Hack
• Type: Card
• History/About
– 3-6 Players, 14+, ~ 1 hour
– Announced DefCon 2012
– Available Nov 2012 (Amazon)
– Designed by Tamara Denning, Tadayoshi Kohno,
Adam Shostack
• Objective
– Teaching Non-Techies Computer Security
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Control-Alt-Hack
• Based on a game mechanic by gaming powerhouse Steve Jackson Games
(Munchkin and GURPS), Control-Alt-Hack™ is a tabletop card game about
white hat hacking.
• You and your fellow players work for Hackers, Inc.: a small, elite
computer security company of ethical (a.k.a. white hat) hackers who
perform security audits and provide consultation services. Their motto?
“You Pay Us to Hack You.”
• Your job is centered around Missions-tasks that require you to apply your
hacker skills (and a bit of luck) in order to succeed. Use your Social
Engineering and Network Ninja skills to break the Pacific Northwest’s
power grid, or apply a bit of Hardware Hacking and Software Wizardry to
convert your robotic vacuum cleaner into an interactive pet toy…no two
jobs are the same. So pick up the dice, and get hacking!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Control-Alt-Hack
http://youtu.be/Kpnvsgiiz8s
Existing Games
Control-Alt-Hack
• Availability
– Amazon.com
• Write-Up
– http://bit.ly/ctrl-alt-hack
• Kid Review
http://www.amazon.com/gp/product/B008HIX5KO/
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hackers & Agents
• Type: Card
• History/About
– Created by Jason Bevis
– 2 – 8 Players, 12+, < 30 mins
– Similar to Uno
• Skip  Encrypted (w/ text you can analyze & decrypt)
• Draw Two  Logs
• Reverse  Lead
• Wild  SQL Injection (with example injection code)
• Wild Draw Four  Rootkit
• Number Cards (with its binary representation to learn from)
• Objective
– Teaching Non-Techies Computer Security
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hackers & Agents
• The world has been infiltrated with hackers who are out
to steal your personal data if they can get their hands on
it. The agents are well armed with forensic techniques and
sworn to catch these cyberpunks.
• Be the first to rid yourself of all the cards in your hand
before every other player and obtain as few points as
possible.
• Each player scores penalty points for cards left in their
hand. As soon as one player has reached 300 points the
game is over and the person with the lowest score is the
winner.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hackers & Agents
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hackers & Agents
• Availability
– $15 from TheGameCrafter.com
• https://www.thegamecrafter.com/games/hackers-agents
– $9 Threat Booster from TheGameCrafter.com
• https://www.thegamecrafter.com/games/hackers-agents-threat-
deckcon-booster
• Write-Up
– http://bit.ly/hackersandagents
• Kid Review
Existing Games
Pwn: Combat Hacking
• Type: Video
• History/About
– Released March 2013
– Designed by 82 Apps, Inc.
• Objective
– Various Node Layouts (e.g., grid)
– Take Over All Competitor Nodes
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Pwn: Combat Hacking
• Engage in fast-paced computer hacking wars against
your cyberpunk rivals like you were in a retro-
futuristic hacking movie.
• PWN is a fast-paced, real-time strategy game where
you face off against other hackers within 3D virtual
networks and take each other out using wits, skill, and
computer viruses. Place devious hidden trojans and
backdoors, while strategically defending yourself with
encrypted nodes and firewalls. PWN lets you feel like
the hero (or villain) of your favorite computer hacking
action movies.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Pwn: Combat Hacking
http://youtu.be/9D23qABd9gg
Existing Games
Pwn: Combat Hacking
• Availability
– IOS
• $2.99
• http://bit.ly/pwnios1
– Mac
• $4.99
• http://bit.ly/pwnmac1
• Write-Up
– http://bit.ly/pwngame
• Kid Review
Existing Games
Uplink
• Type: Video
• History/About
– 2001: Released for Windows &
Linux by Introversion Software
– 2006: Valve's Steam
– 2011: Ubuntu Software Center
– 2012: iPad & Android
• Objective
– Standard One-Off Missions
– Storyline with Player Receiving an E-Mail from
Deceased Uplink Agent
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Uplink
• You play an Uplink Agent who makes a living by performing jobs for
major corporations. Your tasks involve hacking into rival computer
systems, stealing research data, sabotaging other companies,
laundering money, erasing evidence, or framing innocent people.
• You use the money you earn to upgrade your computer systems,
and to buy new software and tools. As your experience level
increases you find more dangerous and profitable missions become
available. You can speculate on a fully working stock market (and
even influence its outcome). You can modify peoples academic or
criminal records. You can divert money from bank transfers into
your own accounts. You can even take part in the construction of
the most deadly computer virus ever designed.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Uplink
http://youtu.be/xmqvoFfVbAo
Existing Games
Uplink
• Availability
– Windows/Linux
• $15 download; $20 Delivery
– iPad
• $4.99
• http://bit.ly/uplinkipad
– Mac
• $10
• http://bit.ly/uplinkmac
– Android (coming)
• Kid Review
Existing Games
CryptoClub
• Type: Website
• History
– Created by University of Illinois & Partners
– cryptoclub.math.uic.edu
– CryptoClub.org
• Objective
– Teach Basic Crypto Concepts
– Test Skills with Games & Challenges
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
CryptoClub
http://www.cryptoclub.org/
Existing Games
CryptoClub
• More Detail
– “The CryptoClub Project develops
classroom and web-based material
to teach cryptography and related
mathematics, as well as material to
support teachers of these topics. The
project is a collaboration between
UIC's Learning Sciences Research
Institute, Department of
Mathematics, Statistics, and
Computer Science, and School of Art
and Design.”
• Kid Review
Other
• Games
– NSA CryptoChallenge (http://bit.ly/nsacryptochallenge)
– VIM Adventures (http://bit.ly/vim-adventures)
• Computers/Programming
– Qimo and Edubuntu (http://bit.ly/learningthecomputer)
– Scratch, Logo (http://bit.ly/learningtoprogram)
• Conferences/Presentations
– HacKid
– Hak4Kidz (http://bit.ly/hak4kidz)
– r00tz (http://bit.ly/defconkids)
– “Teaching Kids Cyber Security” – Reuben Paul
(http://bit.ly/teachingkidscyber)
– “Minecraft Security” by Riese Goerlich
(http://bit.ly/minecraftsecurity)
Other
• Books/Podcasts/Blogs
– InventWithPython.com
• Hacking Secret Ciphers with Python
• Invent Your Own Computer Games with Python
• Making Games with Python and Pygame
– Super Scratch Programming Adventure
– Python for Kids
– “HackerTikes Podcast” - mubix (http://bit.ly/hackertikes)
• Curriculums/Competitions
– CyberPatriot (teams from elementary through high school)
– CyberAces
– Hacker High School (http://bit.ly/hackerhighschool)
– CyberQuest Challenges
– CCDC-like Teams
KidHack Project
• Platform
– Blog Page:
http://bit.ly/kidhac
k
• Categories
– Games
– Computers/Progra
mming
– Conferences/Presen
tations
– Books/Podcasts/Blo
gs
– Curriculums/Compe
titions
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
WHAT’S NEXT
Age-Based Curriculum
Effectiveness Survey
Reviewing New Games
Accepting Comm. Contributions
Have Fun
What’s Next
Age-Based Curriculum
Games Computers/Pr
ogramming
Cons/Presenta
tions
Books/Podcasts/
Blogs
Curriculums/Competi
tions
3-5 • Hackers & Agents
(12+)
• Qimo (3+)
6-8 • Pwn • Edubuntu • HacKid (5+) • Super Scratch
Programming
Adventure (9+)
9-11 • [d0x3d!]
• Uplink
• CryptoClub
• Scratch (8+) • Hak4Kidz (8+) • Python for Kids
(10+)
• CyberPatriot (ES
coming)
12-14 • Control-Alt-Hack
(14+)
• r00tz • Hacking Secret
Ciphers w/ Python
• CyberPatriot Teams
(MS)
15-17 • Hacker High School
• CyberPatriot Teams (HS)
• CyberAces
18-20 • CyberQuest Challenges
• CCDC Teams
What’s Next
Effectiveness Survey
• Demographics (e.g., age, sex, …)
• Prior “Cyber” Experience (e.g., games, school
programs)
• Game Being Surveyed On
– Time Spent Playing
– Ranking 1 – 10 on Various Characteristics
• General: “Funness, ” Play Again?
• Security: Firewalls, Encryption, Malware, …
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
What’s Next
• Finding New Games & Reviewing Them
• …
• Accepting Contributions from Community ;)
– Comments on KidHack Page: http://bit.ly/kidhack
– Contact Us Form: http://bit.ly/nispcontact
• …
• Have Fun!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Conclusion
• Introduction
• Background
• Existing Games
• KidHack Project
• What’s Next
• Conclusion
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Questions?
• Twitter @grecs
• Website NovaInfosec.com, @novainfosec
• Contact http://bit.ly/nispcontact
o Questions/Consulting

More Related Content

Viewers also liked

Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016grecsl
 
Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]J2smartceo
 
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015grecsl
 
Green rich shower
Green rich showerGreen rich shower
Green rich showerJ2smartceo
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...grecsl
 

Viewers also liked (9)

презентация компании Via
презентация компании Viaпрезентация компании Via
презентация компании Via
 
UVa Protocol
UVa ProtocolUVa Protocol
UVa Protocol
 
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
 
Rain water harvesting
Rain water harvestingRain water harvesting
Rain water harvesting
 
Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]Undersink water purifier [호환 모드]
Undersink water purifier [호환 모드]
 
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
 
Green rich shower
Green rich showerGreen rich shower
Green rich shower
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
 
Bridges
BridgesBridges
Bridges
 

Similar to Teaching Cybersecurity through Gaming

Cross Game Dev with Corona
Cross Game Dev with CoronaCross Game Dev with Corona
Cross Game Dev with CoronaShawn Grimes
 
Landscape Of Virtual World Systems
Landscape Of Virtual World SystemsLandscape Of Virtual World Systems
Landscape Of Virtual World SystemsTim Holt
 
Career in Ethical Hacking
Career in Ethical Hacking Career in Ethical Hacking
Career in Ethical Hacking neosphere
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptricagip499
 
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Kirill Ermakov
 
Eight Rules for Making Your First Great Game
Eight Rules for Making Your First Great GameEight Rules for Making Your First Great Game
Eight Rules for Making Your First Great GameNick Pruehs
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentationdelmount
 
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnDEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnFelipe Prado
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud XiaoShakacon
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!Justin Black
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseFidelis Cybersecurity
 
Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Vishwan Aranha
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DANeil Lines
 

Similar to Teaching Cybersecurity through Gaming (20)

Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
V3 gamingcasestudy
V3 gamingcasestudyV3 gamingcasestudy
V3 gamingcasestudy
 
Cross Game Dev with Corona
Cross Game Dev with CoronaCross Game Dev with Corona
Cross Game Dev with Corona
 
Landscape Of Virtual World Systems
Landscape Of Virtual World SystemsLandscape Of Virtual World Systems
Landscape Of Virtual World Systems
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Career in Ethical Hacking
Career in Ethical Hacking Career in Ethical Hacking
Career in Ethical Hacking
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...Let’s play the game. Yet another way to perform penetration test. Russian “re...
Let’s play the game. Yet another way to perform penetration test. Russian “re...
 
Eight Rules for Making Your First Great Game
Eight Rules for Making Your First Great GameEight Rules for Making Your First Great Game
Eight Rules for Making Your First Great Game
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
 
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnDEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 
Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508Ncsam 2019-cybersecurity-awareness-trivia final-508
Ncsam 2019-cybersecurity-awareness-trivia final-508
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Teaching Cybersecurity through Gaming

  • 1. Project KidHack Teaching the Next Next Generation Security through Gaming @grecs & @pupstrr NovaInfosec.com
  • 2. Disclaimer • Opinions expressed do not express the views or opinions of – my employers, his schools – my customers, – my wife, his mom – my daughter, his sister – my parents, his grandparents – my in-laws, his other grandparents Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 3. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 4. 20 Yrs Industry 16 Yrs Infosec 5 Yrs SOC
  • 5.
  • 6. NovaInfosec Consulting • General Security Engineering/Architecture • Everything SOC – Engineering – Operations – Training – SOC 2.0 datamation.com/cnews/article.php/3851071/Tech-Comics-Cloud-Computing-Consultants.htm
  • 7.
  • 8. Agenda • Background • Existing Games • KidHack Project • What’s Next? • Conclusion Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 9. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs, BACKGROUND Why Inspiration
  • 11. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 12. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 13. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 14. Background Why Feds Need 10,000 Cyber Security Experts (6/7/2009) Cybersecurity business, jobs expected to grow through 2016 (10/21/12) Fewer Cyber Pros, More Cyber Problems (9/1/14)
  • 15. Background Why • NSA Tapping Schools of Excellence • University “Cyber” Degrees • Technical Training Organizations Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 16. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs, Preparing Next Next Gen of Infosec Pros by Getting Interested Early Recent Trainer Role - Contemplating Best Ways to Teach Focus on Simulation with Gaming Versus Setting Up Real Environment SIMULATION WITH GAMING … NEXT- NEXT GEN TRAINING ROLE
  • 17. Background Inspiration • CTFs (for years) • Bruce Potter – DerbyCon 2013 – It’s Only a Game: Learning Security through Gaming • History of CTF Contests & Other Games Hardcore Security Pros Play • Games that Can Be Used to Engage Non-Security Pros  More Focused on Theory vs Collecting List of Games • http://bit.ly/pottergaming • MrsYIsY – Network Computing – Want To Develop Information Security Skills? Capture The Flag • Simulation of Real-World Security Operations • http://bit.ly/mrsyctf • Ender’s Game – Military Tactics – Simulations/Drills
  • 18. EXISTING GAMES Hacker [d0x3d!] Control-Alt-Hack Hackers & Agents Pwn Uplink CryptoClub Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 19. Existing Games Hacker • Type: Card • History/About – 1990: Secret Service Raided Steve Jackson Games • Confiscated Equipment, including Illuminati BBS. – 1992: Made Game of It • Satirizing Secret Service, Hackers, Phone Companies, etc. – 1993: Hacker II – The Dark Side - more players & new rules – 2001: Hacker – Deluxe Edition – Combined All Above into Box Set • Objective – Players Act as Hackers – Compete Against Each Other to Control Most Systems Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 20. Existing Games Hacker • Hacker uses a variation of the Illuminati system; players lay out cards (representing systems) to create the Net, which is never the same twice. But instead of separate “power structures” for each player, there is only one Net, and players place tokens to indicate what systems they have invaded and how completely they control them. • For 3 to 6 players; takes from 90 minutes to 2 1/2 hours. The supplement, Hacker II, lets you add two more players. • Components include rulebook, 110 cards, 172 marker chips, 6 console units, lots of “system upgrades,” and other markers. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 21. Existing Games Hacker • Hacker II – Supplement to Hacker (not playable alone) – New Rules: Viruses, the Internet Worm, outdials, multiple accounts, Black Ice, and Military Hardware. – Consoles & Tokens for 2 More Players • Hacker – Deluxe Edition – Can you break into the world’s toughest computer systems? In Hacker, players sail through the Net, competing to invade the most systems. The more systems you crack, the more you learn, and the easier your next target is. You can find back doors and secret phone lines, and even crash the systems your rivals are using. But be careful. There’s a Secret Service Raid waiting for you! – Designed by Steve Jackson, Hacker requires guile and diplomacy. To win, you must trade favors with your fellow hackers – and get more than you give away. But jealous rivals will try to bust you. Three busts and you’re out of the game! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 22. Existing Games Hacker • Availability – Out of Print – Dealers In Out-Of-Print Games • http://www.sjgames.com/general/outofprint.html • Write-Up – http://bit.ly/hackercardgame • Kid Review
  • 23. Existing Games [d0x3d!] • Type: Card/Board • History/About – Inspired by 2010 Game Forbidden Island – Introduces Attack & Defend Mechanics and Other Basic Computer Security Constructs • Objective – Teaching Non-Techies Computer Security Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 24. Existing Games [d0x3d!] • In [d0x3d!], you and up to three other players take on the role of an 1337 hacker syndicate, infiltrating a network to reclaim valuable digital assets that have been stolen from them. What are these assets? There are four types—financial data, personally identifiable information, authentication credentials, and intellectual property—but what exactly these represents is your little secret. Embarrassing photos? The recipe for the best BBQ in the world? You decide. • As you seek out these valuable digital assets, the network admins respond: patching compromised machines, raising alarms, sometimes changing its very topology to impede your movement. You and your team work together, compromising and looting machines on the network, trying to not alert the network admins of your presence. If the admins feel too threatened by the activity they see on their network, they will take your stolen personal data and release it onto the internet! In other words, you’ll get d0x3d! • You all win together, or you all lose together. Brave the network and protect your data! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 26. Existing Games [d0x3d!] • Availability – Open-Source & Freely Available • https://github.com/TableTopSecurity/d0x3d-the-game • Download & Print – $25 Boxed Set from TheGameCrafter.com • https://www.thegamecrafter.com/games/-d0x3d- • Write-Up – http://bit.ly/d0x3dgame • Kid Review
  • 27. Existing Games Control-Alt-Hack • Type: Card • History/About – 3-6 Players, 14+, ~ 1 hour – Announced DefCon 2012 – Available Nov 2012 (Amazon) – Designed by Tamara Denning, Tadayoshi Kohno, Adam Shostack • Objective – Teaching Non-Techies Computer Security Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 28. Existing Games Control-Alt-Hack • Based on a game mechanic by gaming powerhouse Steve Jackson Games (Munchkin and GURPS), Control-Alt-Hack™ is a tabletop card game about white hat hacking. • You and your fellow players work for Hackers, Inc.: a small, elite computer security company of ethical (a.k.a. white hat) hackers who perform security audits and provide consultation services. Their motto? “You Pay Us to Hack You.” • Your job is centered around Missions-tasks that require you to apply your hacker skills (and a bit of luck) in order to succeed. Use your Social Engineering and Network Ninja skills to break the Pacific Northwest’s power grid, or apply a bit of Hardware Hacking and Software Wizardry to convert your robotic vacuum cleaner into an interactive pet toy…no two jobs are the same. So pick up the dice, and get hacking! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 30. Existing Games Control-Alt-Hack • Availability – Amazon.com • Write-Up – http://bit.ly/ctrl-alt-hack • Kid Review http://www.amazon.com/gp/product/B008HIX5KO/ Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 31. Existing Games Hackers & Agents • Type: Card • History/About – Created by Jason Bevis – 2 – 8 Players, 12+, < 30 mins – Similar to Uno • Skip  Encrypted (w/ text you can analyze & decrypt) • Draw Two  Logs • Reverse  Lead • Wild  SQL Injection (with example injection code) • Wild Draw Four  Rootkit • Number Cards (with its binary representation to learn from) • Objective – Teaching Non-Techies Computer Security Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 32. Existing Games Hackers & Agents • The world has been infiltrated with hackers who are out to steal your personal data if they can get their hands on it. The agents are well armed with forensic techniques and sworn to catch these cyberpunks. • Be the first to rid yourself of all the cards in your hand before every other player and obtain as few points as possible. • Each player scores penalty points for cards left in their hand. As soon as one player has reached 300 points the game is over and the person with the lowest score is the winner. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 33. Existing Games Hackers & Agents Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 34. Existing Games Hackers & Agents • Availability – $15 from TheGameCrafter.com • https://www.thegamecrafter.com/games/hackers-agents – $9 Threat Booster from TheGameCrafter.com • https://www.thegamecrafter.com/games/hackers-agents-threat- deckcon-booster • Write-Up – http://bit.ly/hackersandagents • Kid Review
  • 35. Existing Games Pwn: Combat Hacking • Type: Video • History/About – Released March 2013 – Designed by 82 Apps, Inc. • Objective – Various Node Layouts (e.g., grid) – Take Over All Competitor Nodes Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 36. Existing Games Pwn: Combat Hacking • Engage in fast-paced computer hacking wars against your cyberpunk rivals like you were in a retro- futuristic hacking movie. • PWN is a fast-paced, real-time strategy game where you face off against other hackers within 3D virtual networks and take each other out using wits, skill, and computer viruses. Place devious hidden trojans and backdoors, while strategically defending yourself with encrypted nodes and firewalls. PWN lets you feel like the hero (or villain) of your favorite computer hacking action movies. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 37. Existing Games Pwn: Combat Hacking http://youtu.be/9D23qABd9gg
  • 38. Existing Games Pwn: Combat Hacking • Availability – IOS • $2.99 • http://bit.ly/pwnios1 – Mac • $4.99 • http://bit.ly/pwnmac1 • Write-Up – http://bit.ly/pwngame • Kid Review
  • 39. Existing Games Uplink • Type: Video • History/About – 2001: Released for Windows & Linux by Introversion Software – 2006: Valve's Steam – 2011: Ubuntu Software Center – 2012: iPad & Android • Objective – Standard One-Off Missions – Storyline with Player Receiving an E-Mail from Deceased Uplink Agent Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 40. Existing Games Uplink • You play an Uplink Agent who makes a living by performing jobs for major corporations. Your tasks involve hacking into rival computer systems, stealing research data, sabotaging other companies, laundering money, erasing evidence, or framing innocent people. • You use the money you earn to upgrade your computer systems, and to buy new software and tools. As your experience level increases you find more dangerous and profitable missions become available. You can speculate on a fully working stock market (and even influence its outcome). You can modify peoples academic or criminal records. You can divert money from bank transfers into your own accounts. You can even take part in the construction of the most deadly computer virus ever designed. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 42. Existing Games Uplink • Availability – Windows/Linux • $15 download; $20 Delivery – iPad • $4.99 • http://bit.ly/uplinkipad – Mac • $10 • http://bit.ly/uplinkmac – Android (coming) • Kid Review
  • 43. Existing Games CryptoClub • Type: Website • History – Created by University of Illinois & Partners – cryptoclub.math.uic.edu – CryptoClub.org • Objective – Teach Basic Crypto Concepts – Test Skills with Games & Challenges Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 45. Existing Games CryptoClub • More Detail – “The CryptoClub Project develops classroom and web-based material to teach cryptography and related mathematics, as well as material to support teachers of these topics. The project is a collaboration between UIC's Learning Sciences Research Institute, Department of Mathematics, Statistics, and Computer Science, and School of Art and Design.” • Kid Review
  • 46. Other • Games – NSA CryptoChallenge (http://bit.ly/nsacryptochallenge) – VIM Adventures (http://bit.ly/vim-adventures) • Computers/Programming – Qimo and Edubuntu (http://bit.ly/learningthecomputer) – Scratch, Logo (http://bit.ly/learningtoprogram) • Conferences/Presentations – HacKid – Hak4Kidz (http://bit.ly/hak4kidz) – r00tz (http://bit.ly/defconkids) – “Teaching Kids Cyber Security” – Reuben Paul (http://bit.ly/teachingkidscyber) – “Minecraft Security” by Riese Goerlich (http://bit.ly/minecraftsecurity)
  • 47. Other • Books/Podcasts/Blogs – InventWithPython.com • Hacking Secret Ciphers with Python • Invent Your Own Computer Games with Python • Making Games with Python and Pygame – Super Scratch Programming Adventure – Python for Kids – “HackerTikes Podcast” - mubix (http://bit.ly/hackertikes) • Curriculums/Competitions – CyberPatriot (teams from elementary through high school) – CyberAces – Hacker High School (http://bit.ly/hackerhighschool) – CyberQuest Challenges – CCDC-like Teams
  • 48. KidHack Project • Platform – Blog Page: http://bit.ly/kidhac k • Categories – Games – Computers/Progra mming – Conferences/Presen tations – Books/Podcasts/Blo gs – Curriculums/Compe titions Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 49. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs, WHAT’S NEXT Age-Based Curriculum Effectiveness Survey Reviewing New Games Accepting Comm. Contributions Have Fun
  • 50. What’s Next Age-Based Curriculum Games Computers/Pr ogramming Cons/Presenta tions Books/Podcasts/ Blogs Curriculums/Competi tions 3-5 • Hackers & Agents (12+) • Qimo (3+) 6-8 • Pwn • Edubuntu • HacKid (5+) • Super Scratch Programming Adventure (9+) 9-11 • [d0x3d!] • Uplink • CryptoClub • Scratch (8+) • Hak4Kidz (8+) • Python for Kids (10+) • CyberPatriot (ES coming) 12-14 • Control-Alt-Hack (14+) • r00tz • Hacking Secret Ciphers w/ Python • CyberPatriot Teams (MS) 15-17 • Hacker High School • CyberPatriot Teams (HS) • CyberAces 18-20 • CyberQuest Challenges • CCDC Teams
  • 51. What’s Next Effectiveness Survey • Demographics (e.g., age, sex, …) • Prior “Cyber” Experience (e.g., games, school programs) • Game Being Surveyed On – Time Spent Playing – Ranking 1 – 10 on Various Characteristics • General: “Funness, ” Play Again? • Security: Firewalls, Encryption, Malware, … Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 52. What’s Next • Finding New Games & Reviewing Them • … • Accepting Contributions from Community ;) – Comments on KidHack Page: http://bit.ly/kidhack – Contact Us Form: http://bit.ly/nispcontact • … • Have Fun! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 53. Conclusion • Introduction • Background • Existing Games • KidHack Project • What’s Next • Conclusion Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 54. Questions? • Twitter @grecs • Website NovaInfosec.com, @novainfosec • Contact http://bit.ly/nispcontact o Questions/Consulting