SlideShare una empresa de Scribd logo
1 de 54
Project
KidHack
Teaching Kids (and even some
adults) Security through Gaming
@grecs
NovaInfosec.com
Disclaimer
• Opinions expressed do not express the views
or opinions of my
– my employers
– my customers,
– my wife,
– my kids,
– my parents
– my in-laws
– my high school girlfriend from Canada
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
20 Years
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
CFP Call for Sponsors
http://bit.ly/firetalks2015
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Agenda
• Background
• Existing Games
• KidHack Project
• What’s Next?
• Conclusion
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
Feds Need 10,000 Cyber Security Experts (6/7/2009)
Cybersecurity business, jobs expected to grow through 2016 (10/21/12)
Fewer Cyber Pros, More Cyber Problems (9/1/14)
Background
Why
• NSA Tapping Schools of Excellence
• Wait … Wait … Don’t Need Degrees
• More Technical Skills
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Why
• Preparing Next Generation of
Infosec Pros by Getting Interested Early
– Seeing if My Kids into Infosec
• Recent Trainer Role
– Contemplating Best Ways to Teach
– Lecture, Socratic, Active, Rote, …
• Focus on Simulation with Gaming
– Versus Setting Up Real Environment
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Background
Inspiration
• CTFs (for years)
• Bruce Potter – DerbyCon 2013
– It’s Only a Game: Learning Security through Gaming
• History of CTF Contests & Other Games Hardcore Security Pros Play
• Games that Can Be Used to Engage Non-Security Pros  More Focused on
Theory vs Collecting List of Games
• http://bit.ly/pottergaming
• MrsYIsY – Network Computing
– Want To Develop Information Security Skills?
Capture The Flag
• Simulation of Real-World Security Operations
• http://bit.ly/mrsyctf
• Ender’s Game
– Military Tactics
– Simulations/Drills
EXISTING GAMES
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Type: Card
• History
– 1990: Secret Service Raided Steve Jackson Games
• Confiscated Equipment, including Illuminati BBS.
– 1992: Made Game of It
• Satirizing Secret Service, Hackers, Phone Companies, etc.
– 1993: Hacker II – The Dark Side - more players & new rules
– 2001: Hacker – Deluxe Edition – Combined All Above into
Box Set
• Objective
– Players Act as Hackers
– Compete Against Each Other to Control Most Systems
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Hacker uses a variation of the Illuminati system; players lay
out cards (representing systems) to create the Net, which is
never the same twice. But instead of separate “power
structures” for each player, there is only one Net, and
players place tokens to indicate what systems they have
invaded and how completely they control them.
• For 3 to 6 players; takes from 90 minutes to 2 1/2 hours.
The supplement, Hacker II, lets you add two more players.
• Components include rulebook, 110 cards, 172 marker
chips, 6 console units, lots of “system upgrades,” and other
markers.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Hacker II
– Supplement to Hacker (not playable alone)
– New Rules: Viruses, the Internet Worm, outdials, multiple accounts,
Black Ice, and Military Hardware.
– Consoles & Tokens for 2 More Players
• Hacker – Deluxe Edition
– Can you break into the world’s toughest computer systems? In Hacker,
players sail through the Net, competing to invade the most systems.
The more systems you crack, the more you learn, and the easier your
next target is. You can find back doors and secret phone lines, and
even crash the systems your rivals are using. But be careful. There’s a
Secret Service Raid waiting for you!
– Designed by Steve Jackson, Hacker requires guile and diplomacy. To
win, you must trade favors with your fellow hackers – and get more
than you give away. But jealous rivals will try to bust you. Three busts
and you’re out of the game!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Hacker
• Availability
– Out of Print
– Dealers In Out-Of-Print Games
• http://www.sjgames.com/general/outofprint.html
• Kid Review
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
[d0x3d!]
• Type: Board
• History
– Inspired by 2010 Game
Forbidden Island
– Introduces Attack & Defend Mechanics and Other
Basic Computer Security Constructs
• Objective
– Teaching Non-Techies Computer Security
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
[d0x3d!]
• In [d0x3d!], you and up to three other players take on the role of an 1337 hacker
syndicate, infiltrating a network to reclaim valuable digital assets that have been
stolen from them. What are these assets? There are four types—financial data,
personally identifiable information, authentication credentials, and intellectual
property—but what exactly these represents is your little secret. Embarrassing
photos? The recipe for the best BBQ in the world? You decide.
• As you seek out these valuable digital assets, the network admins respond:
patching compromised machines, raising alarms, sometimes changing its very
topology to impede your movement. You and your team work together,
compromising and looting machines on the network, trying to not alert the
network admins of your presence. If the admins feel too threatened by the activity
they see on their network, they will take your stolen personal data and release it
onto the internet! In other words, you’ll get d0x3d!
• You all win together, or you all lose together. Brave the network and protect your
data!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
[d0x3d!]
http://youtu.be/oMi-GB9tc6s
Existing Games
[d0x3d!]
• Availability
– Open-Source & Freely Available
• https://github.com/TableTopSecurity/d0x3d-the-game
• Download & Print
– $25 Boxed Set from TheGameCrafter.com
• https://www.thegamecrafter.com/games/-d0x3d-
• Kid Review
Existing Games
Control-Alt-Hack
• Type: Card
• History
– Announced DefCon 2012
– Available Nov 2012 (Amazon)
– Designed by Tamara Denning, Tadayoshi Kohno,
Adam Shostack
• Objective
– Teaching Non-Techies Computer Security
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Control-Alt-Hack
• Based on a game mechanic by gaming powerhouse Steve Jackson Games
(Munchkin and GURPS), Control-Alt-Hack™ is a tabletop card game about
white hat hacking.
• You and your fellow players work for Hackers, Inc.: a small, elite computer
security company of ethical (a.k.a. white hat) hackers who perform
security audits and provide consultation services. Their motto? “You Pay
Us to Hack You.”
• Your job is centered around Missions-tasks that require you to apply your
hacker skills (and a bit of luck) in order to succeed. Use your Social
Engineering and Network Ninja skills to break the Pacific Northwest’s
power grid, or apply a bit of Hardware Hacking and Software Wizardry to
convert your robotic vacuum cleaner into an interactive pet toy…no two
jobs are the same. So pick up the dice, and get hacking!
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Control-Alt-Hack
http://youtu.be/Kpnvsgiiz8s
Existing Games
Control-Alt-Hack
• Availability
http://www.amazon.com/gp/product/B008HIX5KO/
Existing Games
Pwn: Combat Hacking
• Type: Video
• History
– Released March 2013
– Designed by 82 Apps, Inc.
• Objective
– Take Over All Competitor Nodes
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Pwn: Combat Hacking
• Engage in fast-paced computer hacking wars against
your cyberpunk rivals like you were in a retro-futuristic
hacking movie.
• PWN is a fast-paced, real-time strategy game where
you face off against other hackers within 3D virtual
networks and take each other out using wits, skill, and
computer viruses. Place devious hidden trojans and
backdoors, while strategically defending yourself with
encrypted nodes and firewalls. PWN lets you feel like
the hero (or villain) of your favorite computer hacking
action movies.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Pwn: Combat Hacking
http://youtu.be/9D23qABd9gg
Existing Games
Pwn: Combat Hacking
• Availability
– IOS
• $2.99
• http://bit.ly/pwnios1
– Mac
• $4.99
• http://bit.ly/pwnmac1
• Kid Review
Existing Games
Uplink
• Type: Video
• History
– 2001: Released for Windows &
Linux by Introversion Software
– 2006: Valve's Steam
– 2011: Ubuntu Software Center
– 2012: iPad & Android
• Objective
– Standard One-Off Missions
– Storyline with Player Receiving an E-Mail from
Deceased Uplink Agent
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Uplink
• You play an Uplink Agent who makes a living by performing jobs for
major corporations. Your tasks involve hacking into rival computer
systems, stealing research data, sabotaging other companies,
laundering money, erasing evidence, or framing innocent people.
• You use the money you earn to upgrade your computer systems,
and to buy new software and tools. As your experience level
increases you find more dangerous and profitable missions become
available. You can speculate on a fully working stock market (and
even influence its outcome). You can modify peoples academic or
criminal records. You can divert money from bank transfers into
your own accounts. You can even take part in the construction of
the most deadly computer virus ever designed.
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Uplink
http://youtu.be/xmqvoFfVbAo
Existing Games
Uplink
• Availability
– Windows/Linux
• $15 download; $20 Delivery
– iPad
• $4.99
• http://bit.ly/uplinkipad
– Mac
• $10
• http://bit.ly/uplinkmac
– Android (coming)
• Kid Review
Existing Games
CryptoClub
• Type: Website
• History
– Created by University of Illinois & Partners
– cryptoclub.math.uic.edu
– CryptoClub.org
• Objective
– Teach Basic Crypto Concepts
– Test Skills with Games & Challenges
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
Crypto Club
http://www.cryptoclub.org/
Existing Games
NSA CryptoChallenge
• Type: Most Mobile Devices
• History
– No such story exists
– So I can not tell you much
– But here you go
• Objective
– Teach Basic Crypto Concepts
– Test Skills with Games & Challenges
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
NSA CryptoChallenge
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
VIM Adventures
• Type: Website
• History
– Few Years Ago – 3 Levels
– Recently Finalized – 13 Levels
• Objective
– Learn VIM through Gaming
– “It’s the ‘Zelda meets text editing’ game.”
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Existing Games
VIM Adventures
http://vim-adventures.com/
Other
• HackTikes Podcast
• Hacker High School
• Online (Regex Golf, …)
• https://sites.google.com/site/cybersafetygam
es/
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
KidHack Project
• Platform
– Blog: bit.ly/kidhack
– Fancy .io Domains
• Game Categories
– Computers
– Programming
– Games
– Conferences
– Books/Podcasts
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
What’s Next
OpenSecurityTraining.info
What’s Next
• Contribute (comments, emails, etc.)
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Conclusion
• Introduction
• Background
• Existing Games
• KidHack Project
• What’s Next
• Conclusion
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
Questions?
• Presentation http://bit.ly/grecsbsidesde
• Twitter @grecs
• Website NovaInfosec.com
• Contact http://bit.ly/nispcontact
Backup

Más contenido relacionado

Destacado

презентация+портфолио для фармацевтических и медицинских компаний
презентация+портфолио для фармацевтических и медицинских компаний презентация+портфолио для фармацевтических и медицинских компаний
презентация+портфолио для фармацевтических и медицинских компаний Андрей Лекарев
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014grecsl
 
Level gauges for industrial measurement
Level gauges for industrial measurementLevel gauges for industrial measurement
Level gauges for industrial measurementЛимако
 
Addressing Indonesia's Economy in Transisitional Era
Addressing Indonesia's Economy in Transisitional EraAddressing Indonesia's Economy in Transisitional Era
Addressing Indonesia's Economy in Transisitional EraDahlia Dahlia
 
с днем рождения, любимый
с днем рождения, любимыйс днем рождения, любимый
с днем рождения, любимыйsolesita-n
 
презентация аштон
презентация аштонпрезентация аштон
презентация аштонAlexander Murygin
 
презентация по Автоивенту
презентация по Автоивентупрезентация по Автоивенту
презентация по АвтоивентуАндрей Лекарев
 
Event столица предложение для автосалонов лето-осень 2013
Event столица предложение для автосалонов лето-осень 2013Event столица предложение для автосалонов лето-осень 2013
Event столица предложение для автосалонов лето-осень 2013Андрей Лекарев
 
Презентацию агентства компании EventСтолица
Презентацию агентства компании EventСтолицаПрезентацию агентства компании EventСтолица
Презентацию агентства компании EventСтолицаАндрей Лекарев
 
презентация по автоивенту
презентация по автоивентупрезентация по автоивенту
презентация по автоивентуАндрей Лекарев
 
новогодняя презентация 2014 2015
новогодняя презентация 2014 2015новогодняя презентация 2014 2015
новогодняя презентация 2014 2015Андрей Лекарев
 

Destacado (20)

презентация+портфолио для фармацевтических и медицинских компаний
презентация+портфолио для фармацевтических и медицинских компаний презентация+портфолио для фармацевтических и медицинских компаний
презентация+портфолио для фармацевтических и медицинских компаний
 
Unimex bienestar social
Unimex   bienestar socialUnimex   bienestar social
Unimex bienestar social
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
 
Level gauges for industrial measurement
Level gauges for industrial measurementLevel gauges for industrial measurement
Level gauges for industrial measurement
 
Addressing Indonesia's Economy in Transisitional Era
Addressing Indonesia's Economy in Transisitional EraAddressing Indonesia's Economy in Transisitional Era
Addressing Indonesia's Economy in Transisitional Era
 
с днем рождения, любимый
с днем рождения, любимыйс днем рождения, любимый
с днем рождения, любимый
 
Prezi.para saber más de la demografía
Prezi.para saber más de la demografíaPrezi.para saber más de la demografía
Prezi.para saber más de la demografía
 
презентация аштон
презентация аштонпрезентация аштон
презентация аштон
 
Unimex crisis educativa
Unimex   crisis educativaUnimex   crisis educativa
Unimex crisis educativa
 
презентация по Автоивенту
презентация по Автоивентупрезентация по Автоивенту
презентация по Автоивенту
 
Event столица предложение для автосалонов лето-осень 2013
Event столица предложение для автосалонов лето-осень 2013Event столица предложение для автосалонов лето-осень 2013
Event столица предложение для автосалонов лето-осень 2013
 
Презентацию агентства компании EventСтолица
Презентацию агентства компании EventСтолицаПрезентацию агентства компании EventСтолица
Презентацию агентства компании EventСтолица
 
China5/2 -1,6,10,21
China5/2 -1,6,10,21China5/2 -1,6,10,21
China5/2 -1,6,10,21
 
презентация по автоивенту
презентация по автоивентупрезентация по автоивенту
презентация по автоивенту
 
Carbon block
Carbon blockCarbon block
Carbon block
 
новогодняя презентация 2014 2015
новогодняя презентация 2014 2015новогодняя презентация 2014 2015
новогодняя презентация 2014 2015
 
предложение для тц 2014
предложение для тц 2014предложение для тц 2014
предложение для тц 2014
 
Unimex reforma energetica
Unimex   reforma energeticaUnimex   reforma energetica
Unimex reforma energetica
 
Chocolate dessert
Chocolate dessert Chocolate dessert
Chocolate dessert
 
Chocolate dessert
Chocolate dessert Chocolate dessert
Chocolate dessert
 

Similar a Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on November 15, 2014

Intro to Games Based Learning - Week 1
Intro to Games Based Learning  - Week 1Intro to Games Based Learning  - Week 1
Intro to Games Based Learning - Week 1center4edupunx
 
Cross Game Dev with Corona
Cross Game Dev with CoronaCross Game Dev with Corona
Cross Game Dev with CoronaShawn Grimes
 
A Family That Hacks Together, Interacts Together!
A Family That Hacks Together, Interacts Together!A Family That Hacks Together, Interacts Together!
A Family That Hacks Together, Interacts Together!Daniel Davis
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...EC-Council
 
Landscape Of Virtual World Systems
Landscape Of Virtual World SystemsLandscape Of Virtual World Systems
Landscape Of Virtual World SystemsTim Holt
 
Understanding and improving games through machine learning - Natasha Latysheva
Understanding and improving games through machine learning - Natasha LatyshevaUnderstanding and improving games through machine learning - Natasha Latysheva
Understanding and improving games through machine learning - Natasha LatyshevaLauren Cormack
 
Looking for blue ocean look to the cloud rhys dekle
Looking for blue ocean look to the cloud  rhys dekleLooking for blue ocean look to the cloud  rhys dekle
Looking for blue ocean look to the cloud rhys dekleMary Chan
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud ComputingMitesh Katira
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DANeil Lines
 
Game Modding Lecture 2
Game Modding Lecture 2Game Modding Lecture 2
Game Modding Lecture 2Charles Palmer
 
Hacking as eSports
Hacking as eSportsHacking as eSports
Hacking as eSportsbeched
 
Adver Games, Manuel Campagnoli
Adver Games, Manuel CampagnoliAdver Games, Manuel Campagnoli
Adver Games, Manuel Campagnolistrategie
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentationdelmount
 
BlackBerry Jam Asia 2013 - Gaming on BlackBerry
BlackBerry Jam Asia 2013 - Gaming on BlackBerryBlackBerry Jam Asia 2013 - Gaming on BlackBerry
BlackBerry Jam Asia 2013 - Gaming on BlackBerrySegitiga.Net
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud XiaoShakacon
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseFidelis Cybersecurity
 

Similar a Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on November 15, 2014 (20)

Intro to Games Based Learning - Week 1
Intro to Games Based Learning  - Week 1Intro to Games Based Learning  - Week 1
Intro to Games Based Learning - Week 1
 
Cross Game Dev with Corona
Cross Game Dev with CoronaCross Game Dev with Corona
Cross Game Dev with Corona
 
Igt ppt for sx sw
Igt ppt for sx swIgt ppt for sx sw
Igt ppt for sx sw
 
A Family That Hacks Together, Interacts Together!
A Family That Hacks Together, Interacts Together!A Family That Hacks Together, Interacts Together!
A Family That Hacks Together, Interacts Together!
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
Landscape Of Virtual World Systems
Landscape Of Virtual World SystemsLandscape Of Virtual World Systems
Landscape Of Virtual World Systems
 
Understanding and improving games through machine learning - Natasha Latysheva
Understanding and improving games through machine learning - Natasha LatyshevaUnderstanding and improving games through machine learning - Natasha Latysheva
Understanding and improving games through machine learning - Natasha Latysheva
 
Looking for blue ocean look to the cloud rhys dekle
Looking for blue ocean look to the cloud  rhys dekleLooking for blue ocean look to the cloud  rhys dekle
Looking for blue ocean look to the cloud rhys dekle
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 
Game Modding Lecture 2
Game Modding Lecture 2Game Modding Lecture 2
Game Modding Lecture 2
 
Hacking as eSports
Hacking as eSportsHacking as eSports
Hacking as eSports
 
Adver Games, Manuel Campagnoli
Adver Games, Manuel CampagnoliAdver Games, Manuel Campagnoli
Adver Games, Manuel Campagnoli
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Technology in a global society presentation
Technology in a global society presentationTechnology in a global society presentation
Technology in a global society presentation
 
BlackBerry Jam Asia 2013 - Gaming on BlackBerry
BlackBerry Jam Asia 2013 - Gaming on BlackBerryBlackBerry Jam Asia 2013 - Gaming on BlackBerry
BlackBerry Jam Asia 2013 - Gaming on BlackBerry
 
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
 
Capture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception DefenseCapture the Flag Exercise Using Active Deception Defense
Capture the Flag Exercise Using Active Deception Defense
 

Más de grecsl

Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016grecsl
 
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016grecsl
 
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016grecsl
 
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015grecsl
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...grecsl
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014grecsl
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...grecsl
 

Más de grecsl (7)

Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
 
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
Monitoring & Analysis 101 - N00b to Ninja in 60 Minutes at ISSW on April 9, 2016
 
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
Deploying a Shadow Threat Intel Capability at CaralinaCon on March 6, 2016
 
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
Defending the Enterprise with Evernote at SourceBoston on May 27, 2015
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
 
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
Malware Analysis 101: N00b to Ninja in 60 Minutes at BSidesDC on October 19, ...
 

Último

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Último (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Project Kid Hack - Teaching Kids Security through Gaming at BSidesDE on November 15, 2014

  • 1. Project KidHack Teaching Kids (and even some adults) Security through Gaming @grecs NovaInfosec.com
  • 2. Disclaimer • Opinions expressed do not express the views or opinions of my – my employers – my customers, – my wife, – my kids, – my parents – my in-laws – my high school girlfriend from Canada Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 3. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 4. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 5. 20 Years Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 6. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 7. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 8. CFP Call for Sponsors http://bit.ly/firetalks2015 Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 9. Agenda • Background • Existing Games • KidHack Project • What’s Next? • Conclusion Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 10. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 12. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 13. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 14. Background Why Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 15. Background Why Feds Need 10,000 Cyber Security Experts (6/7/2009) Cybersecurity business, jobs expected to grow through 2016 (10/21/12) Fewer Cyber Pros, More Cyber Problems (9/1/14)
  • 16. Background Why • NSA Tapping Schools of Excellence • Wait … Wait … Don’t Need Degrees • More Technical Skills Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 17. Background Why • Preparing Next Generation of Infosec Pros by Getting Interested Early – Seeing if My Kids into Infosec • Recent Trainer Role – Contemplating Best Ways to Teach – Lecture, Socratic, Active, Rote, … • Focus on Simulation with Gaming – Versus Setting Up Real Environment Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 18. Background Inspiration • CTFs (for years) • Bruce Potter – DerbyCon 2013 – It’s Only a Game: Learning Security through Gaming • History of CTF Contests & Other Games Hardcore Security Pros Play • Games that Can Be Used to Engage Non-Security Pros  More Focused on Theory vs Collecting List of Games • http://bit.ly/pottergaming • MrsYIsY – Network Computing – Want To Develop Information Security Skills? Capture The Flag • Simulation of Real-World Security Operations • http://bit.ly/mrsyctf • Ender’s Game – Military Tactics – Simulations/Drills
  • 20. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 21. Existing Games Hacker • Type: Card • History – 1990: Secret Service Raided Steve Jackson Games • Confiscated Equipment, including Illuminati BBS. – 1992: Made Game of It • Satirizing Secret Service, Hackers, Phone Companies, etc. – 1993: Hacker II – The Dark Side - more players & new rules – 2001: Hacker – Deluxe Edition – Combined All Above into Box Set • Objective – Players Act as Hackers – Compete Against Each Other to Control Most Systems Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 22. Existing Games Hacker • Hacker uses a variation of the Illuminati system; players lay out cards (representing systems) to create the Net, which is never the same twice. But instead of separate “power structures” for each player, there is only one Net, and players place tokens to indicate what systems they have invaded and how completely they control them. • For 3 to 6 players; takes from 90 minutes to 2 1/2 hours. The supplement, Hacker II, lets you add two more players. • Components include rulebook, 110 cards, 172 marker chips, 6 console units, lots of “system upgrades,” and other markers. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 23. Existing Games Hacker • Hacker II – Supplement to Hacker (not playable alone) – New Rules: Viruses, the Internet Worm, outdials, multiple accounts, Black Ice, and Military Hardware. – Consoles & Tokens for 2 More Players • Hacker – Deluxe Edition – Can you break into the world’s toughest computer systems? In Hacker, players sail through the Net, competing to invade the most systems. The more systems you crack, the more you learn, and the easier your next target is. You can find back doors and secret phone lines, and even crash the systems your rivals are using. But be careful. There’s a Secret Service Raid waiting for you! – Designed by Steve Jackson, Hacker requires guile and diplomacy. To win, you must trade favors with your fellow hackers – and get more than you give away. But jealous rivals will try to bust you. Three busts and you’re out of the game! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 24. Existing Games Hacker • Availability – Out of Print – Dealers In Out-Of-Print Games • http://www.sjgames.com/general/outofprint.html • Kid Review Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 25. Existing Games [d0x3d!] • Type: Board • History – Inspired by 2010 Game Forbidden Island – Introduces Attack & Defend Mechanics and Other Basic Computer Security Constructs • Objective – Teaching Non-Techies Computer Security Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 26. Existing Games [d0x3d!] • In [d0x3d!], you and up to three other players take on the role of an 1337 hacker syndicate, infiltrating a network to reclaim valuable digital assets that have been stolen from them. What are these assets? There are four types—financial data, personally identifiable information, authentication credentials, and intellectual property—but what exactly these represents is your little secret. Embarrassing photos? The recipe for the best BBQ in the world? You decide. • As you seek out these valuable digital assets, the network admins respond: patching compromised machines, raising alarms, sometimes changing its very topology to impede your movement. You and your team work together, compromising and looting machines on the network, trying to not alert the network admins of your presence. If the admins feel too threatened by the activity they see on their network, they will take your stolen personal data and release it onto the internet! In other words, you’ll get d0x3d! • You all win together, or you all lose together. Brave the network and protect your data! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 28. Existing Games [d0x3d!] • Availability – Open-Source & Freely Available • https://github.com/TableTopSecurity/d0x3d-the-game • Download & Print – $25 Boxed Set from TheGameCrafter.com • https://www.thegamecrafter.com/games/-d0x3d- • Kid Review
  • 29. Existing Games Control-Alt-Hack • Type: Card • History – Announced DefCon 2012 – Available Nov 2012 (Amazon) – Designed by Tamara Denning, Tadayoshi Kohno, Adam Shostack • Objective – Teaching Non-Techies Computer Security Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 30. Existing Games Control-Alt-Hack • Based on a game mechanic by gaming powerhouse Steve Jackson Games (Munchkin and GURPS), Control-Alt-Hack™ is a tabletop card game about white hat hacking. • You and your fellow players work for Hackers, Inc.: a small, elite computer security company of ethical (a.k.a. white hat) hackers who perform security audits and provide consultation services. Their motto? “You Pay Us to Hack You.” • Your job is centered around Missions-tasks that require you to apply your hacker skills (and a bit of luck) in order to succeed. Use your Social Engineering and Network Ninja skills to break the Pacific Northwest’s power grid, or apply a bit of Hardware Hacking and Software Wizardry to convert your robotic vacuum cleaner into an interactive pet toy…no two jobs are the same. So pick up the dice, and get hacking! Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 33. Existing Games Pwn: Combat Hacking • Type: Video • History – Released March 2013 – Designed by 82 Apps, Inc. • Objective – Take Over All Competitor Nodes Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 34. Existing Games Pwn: Combat Hacking • Engage in fast-paced computer hacking wars against your cyberpunk rivals like you were in a retro-futuristic hacking movie. • PWN is a fast-paced, real-time strategy game where you face off against other hackers within 3D virtual networks and take each other out using wits, skill, and computer viruses. Place devious hidden trojans and backdoors, while strategically defending yourself with encrypted nodes and firewalls. PWN lets you feel like the hero (or villain) of your favorite computer hacking action movies. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 35. Existing Games Pwn: Combat Hacking http://youtu.be/9D23qABd9gg
  • 36. Existing Games Pwn: Combat Hacking • Availability – IOS • $2.99 • http://bit.ly/pwnios1 – Mac • $4.99 • http://bit.ly/pwnmac1 • Kid Review
  • 37. Existing Games Uplink • Type: Video • History – 2001: Released for Windows & Linux by Introversion Software – 2006: Valve's Steam – 2011: Ubuntu Software Center – 2012: iPad & Android • Objective – Standard One-Off Missions – Storyline with Player Receiving an E-Mail from Deceased Uplink Agent Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 38. Existing Games Uplink • You play an Uplink Agent who makes a living by performing jobs for major corporations. Your tasks involve hacking into rival computer systems, stealing research data, sabotaging other companies, laundering money, erasing evidence, or framing innocent people. • You use the money you earn to upgrade your computer systems, and to buy new software and tools. As your experience level increases you find more dangerous and profitable missions become available. You can speculate on a fully working stock market (and even influence its outcome). You can modify peoples academic or criminal records. You can divert money from bank transfers into your own accounts. You can even take part in the construction of the most deadly computer virus ever designed. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 40. Existing Games Uplink • Availability – Windows/Linux • $15 download; $20 Delivery – iPad • $4.99 • http://bit.ly/uplinkipad – Mac • $10 • http://bit.ly/uplinkmac – Android (coming) • Kid Review
  • 41. Existing Games CryptoClub • Type: Website • History – Created by University of Illinois & Partners – cryptoclub.math.uic.edu – CryptoClub.org • Objective – Teach Basic Crypto Concepts – Test Skills with Games & Challenges Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 43. Existing Games NSA CryptoChallenge • Type: Most Mobile Devices • History – No such story exists – So I can not tell you much – But here you go • Objective – Teach Basic Crypto Concepts – Test Skills with Games & Challenges Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 44. Existing Games NSA CryptoChallenge Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 45. Existing Games VIM Adventures • Type: Website • History – Few Years Ago – 3 Levels – Recently Finalized – 13 Levels • Objective – Learn VIM through Gaming – “It’s the ‘Zelda meets text editing’ game.” Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 47. Other • HackTikes Podcast • Hacker High School • Online (Regex Golf, …) • https://sites.google.com/site/cybersafetygam es/ Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 48. KidHack Project • Platform – Blog: bit.ly/kidhack – Fancy .io Domains • Game Categories – Computers – Programming – Games – Conferences – Books/Podcasts Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 49. Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 51. What’s Next • Contribute (comments, emails, etc.) Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 52. Conclusion • Introduction • Background • Existing Games • KidHack Project • What’s Next • Conclusion Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 53. Questions? • Presentation http://bit.ly/grecsbsidesde • Twitter @grecs • Website NovaInfosec.com • Contact http://bit.ly/nispcontact