SlideShare una empresa de Scribd logo
1 de 53
Project
KidHack
Teaching Kids (and even some
adults) Security through Gaming
@grecs & @pupstrr
Disclaimer
• Opinions expressed do not express the views
or opinions of my
– my employers
– his schools
– my customers,
– my wife
– his sister
– my parents
– my in-laws
Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
20 Years
Agenda
• Background
• Existing Games
• KidHack Project
• What’s Next?
• Conclusion
Background
Why
Background
Why
Background
Why
Background
Why
Background
Why
Feds Need 10,000 Cyber Security Experts (6/7/2009)
Cybersecurity business, jobs expected to grow through 2016 (10/21/12)
Fewer Cyber Pros, More Cyber Problems (9/1/14)
Background
Why
• NSA Tapping Schools of Excellence
• Wait … Wait … Don’t Need Degrees
• More Technical Skills
Background
Why
• Preparing Next Generation of
Infosec Pros by Getting Interested Early
– Seeing if My Kids into Infosec
• Recent Trainer Role
– Contemplating Best Ways to Teach
– Lecture, Socratic, Active, Rote, …
• Focus on Simulation with Gaming
– Versus Setting Up Real Environment
Background
Inspiration
• CTFs (for years)
• Bruce Potter – DerbyCon 2013
– It’s Only a Game: Learning Security through Gaming
• History of CTF Contests & Other Games Hardcore Security Pros Play
• Games that Can Be Used to Engage Non-Security Pros  More Focused on
Theory vs Collecting List of Games
• http://bit.ly/pottergaming
• MrsYIsY – Network Computing
– Want To Develop Information Security Skills?
Capture The Flag
• Simulation of Real-World Security Operations
• http://bit.ly/mrsyctf
• Ender’s Game
– Military Tactics
– Simulations/Drills
EXISTING GAMES
Existing Games
Hacker
• Type: Card
• History
– 1990: Secret Service Raided Steve Jackson Games
• Confiscated Equipment, including Illuminati BBS.
– 1992: Made Game of It
• Satirizing Secret Service, Hackers, Phone Companies, etc.
– 1993: Hacker II – The Dark Side - more players & new rules
– 2001: Hacker – Deluxe Edition – Combined All Above into
Box Set
• Objective
– Players Act as Hackers
– Compete Against Each Other to Control Most Systems
Existing Games
Hacker
• Hacker uses a variation of the Illuminati system; players lay
out cards (representing systems) to create the Net, which is
never the same twice. But instead of separate “power
structures” for each player, there is only one Net, and
players place tokens to indicate what systems they have
invaded and how completely they control them.
• For 3 to 6 players; takes from 90 minutes to 2 1/2 hours.
The supplement, Hacker II, lets you add two more players.
• Components include rulebook, 110 cards, 172 marker
chips, 6 console units, lots of “system upgrades,” and other
markers.
Existing Games
Hacker
• Hacker II
– Supplement to Hacker (not playable alone)
– New Rules: Viruses, the Internet Worm, outdials, multiple accounts,
Black Ice, and Military Hardware.
– Consoles & Tokens for 2 More Players
• Hacker – Deluxe Edition
– Can you break into the world’s toughest computer systems? In Hacker,
players sail through the Net, competing to invade the most systems.
The more systems you crack, the more you learn, and the easier your
next target is. You can find back doors and secret phone lines, and
even crash the systems your rivals are using. But be careful. There’s a
Secret Service Raid waiting for you!
– Designed by Steve Jackson, Hacker requires guile and diplomacy. To
win, you must trade favors with your fellow hackers – and get more
than you give away. But jealous rivals will try to bust you. Three busts
and you’re out of the game!
Existing Games
Hacker
• Availability
– Out of Print
– Dealers In Out-Of-Print Games
• http://www.sjgames.com/general/outofprint.html
• Write-Up
– http://bit.ly/hackercardgame
• Kid Review
Existing Games
[d0x3d!]
• Type: Board
• History
– Inspired by 2010 Game
Forbidden Island
– Introduces Attack & Defend Mechanics and Other
Basic Computer Security Constructs
• Objective
– Teaching Non-Techies Computer Security
Existing Games
[d0x3d!]
• In [d0x3d!], you and up to three other players take on the role of an 1337 hacker
syndicate, infiltrating a network to reclaim valuable digital assets that have been
stolen from them. What are these assets? There are four types—financial data,
personally identifiable information, authentication credentials, and intellectual
property—but what exactly these represents is your little secret. Embarrassing
photos? The recipe for the best BBQ in the world? You decide.
• As you seek out these valuable digital assets, the network admins respond:
patching compromised machines, raising alarms, sometimes changing its very
topology to impede your movement. You and your team work together,
compromising and looting machines on the network, trying to not alert the
network admins of your presence. If the admins feel too threatened by the activity
they see on their network, they will take your stolen personal data and release it
onto the internet! In other words, you’ll get d0x3d!
• You all win together, or you all lose together. Brave the network and protect your
data!
Existing Games
[d0x3d!]
http://youtu.be/oMi-GB9tc6s
Existing Games
[d0x3d!]
• Availability
– Open-Source & Freely Available
• https://github.com/TableTopSecurity/d0x3d-the-game
• Download & Print
– $25 Boxed Set from TheGameCrafter.com
• https://www.thegamecrafter.com/games/-d0x3d-
• Write-Up
– http://bit.ly/d0x3dgame
• Kid Review
Existing Games
Control-Alt-Hack
• Type: Card
• History
– Announced DefCon 2012
– Available Nov 2012 (Amazon)
– Designed by Tamara Denning, Tadayoshi Kohno,
Adam Shostack
• Objective
– Teaching Non-Techies Computer Security
Existing Games
Control-Alt-Hack
• Based on a game mechanic by gaming powerhouse Steve Jackson Games
(Munchkin and GURPS), Control-Alt-Hack™ is a tabletop card game about
white hat hacking.
• You and your fellow players work for Hackers, Inc.: a small, elite computer
security company of ethical (a.k.a. white hat) hackers who perform
security audits and provide consultation services. Their motto? “You Pay
Us to Hack You.”
• Your job is centered around Missions-tasks that require you to apply your
hacker skills (and a bit of luck) in order to succeed. Use your Social
Engineering and Network Ninja skills to break the Pacific Northwest’s
power grid, or apply a bit of Hardware Hacking and Software Wizardry to
convert your robotic vacuum cleaner into an interactive pet toy…no two
jobs are the same. So pick up the dice, and get hacking!
Existing Games
Control-Alt-Hack
http://youtu.be/Kpnvsgiiz8s
Existing Games
Control-Alt-Hack
• Availability
– Amazon.com
• Write-Up
– http://bit.ly/ctrl-alt-hack
• Kid Review
http://www.amazon.com/gp/product/B008HIX5KO/
Existing Games
Pwn: Combat Hacking
• Type: Video
• History
– Released March 2013
– Designed by 82 Apps, Inc.
• Objective
– Take Over All Competitor Nodes
Existing Games
Pwn: Combat Hacking
• Engage in fast-paced computer hacking wars against
your cyberpunk rivals like you were in a retro-futuristic
hacking movie.
• PWN is a fast-paced, real-time strategy game where
you face off against other hackers within 3D virtual
networks and take each other out using wits, skill, and
computer viruses. Place devious hidden trojans and
backdoors, while strategically defending yourself with
encrypted nodes and firewalls. PWN lets you feel like
the hero (or villain) of your favorite computer hacking
action movies.
Existing Games
Pwn: Combat Hacking
http://youtu.be/9D23qABd9gg
Existing Games
Pwn: Combat Hacking
• Availability
– IOS
• $2.99
• http://bit.ly/pwnios1
– Mac
• $4.99
• http://bit.ly/pwnmac1
• Write-Up
– http://bit.ly/pwngame
• Kid Review
Existing Games
Uplink
• Type: Video
• History
– 2001: Released for Windows &
Linux by Introversion Software
– 2006: Valve's Steam
– 2011: Ubuntu Software Center
– 2012: iPad & Android
• Objective
– Standard One-Off Missions
– Storyline with Player Receiving an E-Mail from
Deceased Uplink Agent
Existing Games
Uplink
• You play an Uplink Agent who makes a living by performing jobs for
major corporations. Your tasks involve hacking into rival computer
systems, stealing research data, sabotaging other companies,
laundering money, erasing evidence, or framing innocent people.
• You use the money you earn to upgrade your computer systems,
and to buy new software and tools. As your experience level
increases you find more dangerous and profitable missions become
available. You can speculate on a fully working stock market (and
even influence its outcome). You can modify peoples academic or
criminal records. You can divert money from bank transfers into
your own accounts. You can even take part in the construction of
the most deadly computer virus ever designed.
Existing Games
Uplink
http://youtu.be/xmqvoFfVbAo
Existing Games
Uplink
• Availability
– Windows/Linux
• $15 download; $20 Delivery
– iPad
• $4.99
• http://bit.ly/uplinkipad
– Mac
• $10
• http://bit.ly/uplinkmac
– Android (coming)
• Kid Review
Existing Games
CryptoClub
• Type: Website
• History
– Created by University of Illinois & Partners
– cryptoclub.math.uic.edu
– CryptoClub.org
• Objective
– Teach Basic Crypto Concepts
– Test Skills with Games & Challenges
Existing Games
Crypto Club
http://www.cryptoclub.org/
Existing Games
Crypto Club
• More Detail
– “The CryptoClub Project develops
classroom and web-based material
to teach cryptography and related
mathematics, as well as material to
support teachers of these topics. The
project is a collaboration between
UIC's Learning Sciences Research
Institute, Department of
Mathematics, Statistics, and
Computer Science, and School of Art
and Design.”
• Kid Review
Existing Games
NSA CryptoChallenge
• Type: Most Mobile Devices
• History
– No such story exists
– So I can not tell you much
– But here you go
• Objective
– Teach Basic Crypto Concepts
– Test Skills with Games & Challenges
Existing Games
NSA CryptoChallenge
Existing Games
NSA CryptoChallenge
• More Detail
– “Developed by the National Security
Agency, NSA CryptoChallenge is a game
that tests your pattern recognition skills
through a series of cryptographs. Your
mission is to decipher encrypted quotes,
factoids, historical events and more. It’s
you against the clock to see how fast
you can crack the code.”
• Write-Up
– http://bit.ly/nsacryptochallenge
• Kid Review
Existing Games
VIM Adventures
• Type: Website
• History
– Few Years Ago – 3 Levels
– Recently Finalized – 13 Levels
• Objective
– Learn VIM through Gaming
– “It’s the ‘Zelda meets text editing’ game.”
• Write-Up
– http://bit.ly/vim-adventures
Existing Games
VIM Adventures
http://youtu.be/I7ppbu9muzI
http://vim-adventures.com/
Other
• InventWithPython.com
– 3 Free Kid-Focused Python Books
– Invent Your Own Computer Games with Python, Making Games with Python
and Pygame, Hacking Secret Ciphers with Python
• Audio/Video
– “HackTikes Podcast” - mubix (http://bit.ly/hackertikes)
– “Teaching Kids Cyber Security” - Reuben Paul (http://bit.ly/teachingkidscyber)
– “Minecraft Security” by Riese Goerlich (http://bit.ly/minecraftsecurity)
• Learning the Computer
– Qimo and Edubuntu
– http://bit.ly/learningthecomputer
• Learning to Program
– Scratch, Logo, …
– http://bit.ly/learningtoprogram
• Hacker High School (http://bit.ly/hackerhighschool)
• r00tz/Defcon Kids (http://bit.ly/defconkids)
• Online (Regex Golf, …)
• …
KidHack Project
• Platform
– Blog: bit.ly/kidhack
– Fancy .io Domains
• Game Categories
– Computers
– Programming
– Games
– Conferences
– Books/Podcasts
What’s Next
OpenSecurityTraining.info
What’s Next
• Contribute
– Comments on KidHack Page: http://bit.ly/kidhack
– Contact Us Form: http://bit.ly/nispcontact
Conclusion
• Introduction
• Background
• Existing Games
• KidHack Project
• What’s Next
• Conclusion
Questions?
• Presentation http://bit.ly/grecsbsidesta
• Twitter @grecs & @pupstrr
• Website NovaInfosec.com
• Contact http://bit.ly/nispcontact
Backup

Más contenido relacionado

Destacado

Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016grecsl
 
Filter part list
Filter part listFilter part list
Filter part listJ2smartceo
 
Green rich shower
Green rich showerGreen rich shower
Green rich showerJ2smartceo
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...grecsl
 

Destacado (9)

Dog 10 commandments
Dog 10 commandmentsDog 10 commandments
Dog 10 commandments
 
презентация оборудования Via
презентация оборудования Viaпрезентация оборудования Via
презентация оборудования Via
 
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
 
Filter part list
Filter part listFilter part list
Filter part list
 
презентация компании Via
презентация компании Viaпрезентация компании Via
презентация компании Via
 
UVa Protocol
UVa ProtocolUVa Protocol
UVa Protocol
 
Green rich shower
Green rich showerGreen rich shower
Green rich shower
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...Malware Analysis 101 -  N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
 
Bridges
BridgesBridges
Bridges
 

Similar a Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on February 21, 2015

Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DANeil Lines
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptricagip499
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdNipun Jaswal
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hackingBeing Uniq Sonu
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
Landscape Of Virtual World Systems
Landscape Of Virtual World SystemsLandscape Of Virtual World Systems
Landscape Of Virtual World SystemsTim Holt
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 

Similar a Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on February 21, 2015 (20)

How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. LtdBeyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Ethi mini - ethical hacking
Ethi mini - ethical hackingEthi mini - ethical hacking
Ethi mini - ethical hacking
 
44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?44CON @ IPexpo - You're fighting an APT with what exactly?
44CON @ IPexpo - You're fighting an APT with what exactly?
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
V3 gamingcasestudy
V3 gamingcasestudyV3 gamingcasestudy
V3 gamingcasestudy
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Landscape Of Virtual World Systems
Landscape Of Virtual World SystemsLandscape Of Virtual World Systems
Landscape Of Virtual World Systems
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 

Último

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on February 21, 2015

  • 1. Project KidHack Teaching Kids (and even some adults) Security through Gaming @grecs & @pupstrr
  • 2. Disclaimer • Opinions expressed do not express the views or opinions of my – my employers – his schools – my customers, – my wife – his sister – my parents – my in-laws Project KidHack: Teaching Kids Security through Gaming NovaInfosec.com@grecs,
  • 3.
  • 5.
  • 6. Agenda • Background • Existing Games • KidHack Project • What’s Next? • Conclusion
  • 7.
  • 12. Background Why Feds Need 10,000 Cyber Security Experts (6/7/2009) Cybersecurity business, jobs expected to grow through 2016 (10/21/12) Fewer Cyber Pros, More Cyber Problems (9/1/14)
  • 13. Background Why • NSA Tapping Schools of Excellence • Wait … Wait … Don’t Need Degrees • More Technical Skills
  • 14. Background Why • Preparing Next Generation of Infosec Pros by Getting Interested Early – Seeing if My Kids into Infosec • Recent Trainer Role – Contemplating Best Ways to Teach – Lecture, Socratic, Active, Rote, … • Focus on Simulation with Gaming – Versus Setting Up Real Environment
  • 15. Background Inspiration • CTFs (for years) • Bruce Potter – DerbyCon 2013 – It’s Only a Game: Learning Security through Gaming • History of CTF Contests & Other Games Hardcore Security Pros Play • Games that Can Be Used to Engage Non-Security Pros  More Focused on Theory vs Collecting List of Games • http://bit.ly/pottergaming • MrsYIsY – Network Computing – Want To Develop Information Security Skills? Capture The Flag • Simulation of Real-World Security Operations • http://bit.ly/mrsyctf • Ender’s Game – Military Tactics – Simulations/Drills
  • 17.
  • 18. Existing Games Hacker • Type: Card • History – 1990: Secret Service Raided Steve Jackson Games • Confiscated Equipment, including Illuminati BBS. – 1992: Made Game of It • Satirizing Secret Service, Hackers, Phone Companies, etc. – 1993: Hacker II – The Dark Side - more players & new rules – 2001: Hacker – Deluxe Edition – Combined All Above into Box Set • Objective – Players Act as Hackers – Compete Against Each Other to Control Most Systems
  • 19. Existing Games Hacker • Hacker uses a variation of the Illuminati system; players lay out cards (representing systems) to create the Net, which is never the same twice. But instead of separate “power structures” for each player, there is only one Net, and players place tokens to indicate what systems they have invaded and how completely they control them. • For 3 to 6 players; takes from 90 minutes to 2 1/2 hours. The supplement, Hacker II, lets you add two more players. • Components include rulebook, 110 cards, 172 marker chips, 6 console units, lots of “system upgrades,” and other markers.
  • 20. Existing Games Hacker • Hacker II – Supplement to Hacker (not playable alone) – New Rules: Viruses, the Internet Worm, outdials, multiple accounts, Black Ice, and Military Hardware. – Consoles & Tokens for 2 More Players • Hacker – Deluxe Edition – Can you break into the world’s toughest computer systems? In Hacker, players sail through the Net, competing to invade the most systems. The more systems you crack, the more you learn, and the easier your next target is. You can find back doors and secret phone lines, and even crash the systems your rivals are using. But be careful. There’s a Secret Service Raid waiting for you! – Designed by Steve Jackson, Hacker requires guile and diplomacy. To win, you must trade favors with your fellow hackers – and get more than you give away. But jealous rivals will try to bust you. Three busts and you’re out of the game!
  • 21. Existing Games Hacker • Availability – Out of Print – Dealers In Out-Of-Print Games • http://www.sjgames.com/general/outofprint.html • Write-Up – http://bit.ly/hackercardgame • Kid Review
  • 22. Existing Games [d0x3d!] • Type: Board • History – Inspired by 2010 Game Forbidden Island – Introduces Attack & Defend Mechanics and Other Basic Computer Security Constructs • Objective – Teaching Non-Techies Computer Security
  • 23. Existing Games [d0x3d!] • In [d0x3d!], you and up to three other players take on the role of an 1337 hacker syndicate, infiltrating a network to reclaim valuable digital assets that have been stolen from them. What are these assets? There are four types—financial data, personally identifiable information, authentication credentials, and intellectual property—but what exactly these represents is your little secret. Embarrassing photos? The recipe for the best BBQ in the world? You decide. • As you seek out these valuable digital assets, the network admins respond: patching compromised machines, raising alarms, sometimes changing its very topology to impede your movement. You and your team work together, compromising and looting machines on the network, trying to not alert the network admins of your presence. If the admins feel too threatened by the activity they see on their network, they will take your stolen personal data and release it onto the internet! In other words, you’ll get d0x3d! • You all win together, or you all lose together. Brave the network and protect your data!
  • 25. Existing Games [d0x3d!] • Availability – Open-Source & Freely Available • https://github.com/TableTopSecurity/d0x3d-the-game • Download & Print – $25 Boxed Set from TheGameCrafter.com • https://www.thegamecrafter.com/games/-d0x3d- • Write-Up – http://bit.ly/d0x3dgame • Kid Review
  • 26. Existing Games Control-Alt-Hack • Type: Card • History – Announced DefCon 2012 – Available Nov 2012 (Amazon) – Designed by Tamara Denning, Tadayoshi Kohno, Adam Shostack • Objective – Teaching Non-Techies Computer Security
  • 27. Existing Games Control-Alt-Hack • Based on a game mechanic by gaming powerhouse Steve Jackson Games (Munchkin and GURPS), Control-Alt-Hack™ is a tabletop card game about white hat hacking. • You and your fellow players work for Hackers, Inc.: a small, elite computer security company of ethical (a.k.a. white hat) hackers who perform security audits and provide consultation services. Their motto? “You Pay Us to Hack You.” • Your job is centered around Missions-tasks that require you to apply your hacker skills (and a bit of luck) in order to succeed. Use your Social Engineering and Network Ninja skills to break the Pacific Northwest’s power grid, or apply a bit of Hardware Hacking and Software Wizardry to convert your robotic vacuum cleaner into an interactive pet toy…no two jobs are the same. So pick up the dice, and get hacking!
  • 29. Existing Games Control-Alt-Hack • Availability – Amazon.com • Write-Up – http://bit.ly/ctrl-alt-hack • Kid Review http://www.amazon.com/gp/product/B008HIX5KO/
  • 30. Existing Games Pwn: Combat Hacking • Type: Video • History – Released March 2013 – Designed by 82 Apps, Inc. • Objective – Take Over All Competitor Nodes
  • 31. Existing Games Pwn: Combat Hacking • Engage in fast-paced computer hacking wars against your cyberpunk rivals like you were in a retro-futuristic hacking movie. • PWN is a fast-paced, real-time strategy game where you face off against other hackers within 3D virtual networks and take each other out using wits, skill, and computer viruses. Place devious hidden trojans and backdoors, while strategically defending yourself with encrypted nodes and firewalls. PWN lets you feel like the hero (or villain) of your favorite computer hacking action movies.
  • 32. Existing Games Pwn: Combat Hacking http://youtu.be/9D23qABd9gg
  • 33. Existing Games Pwn: Combat Hacking • Availability – IOS • $2.99 • http://bit.ly/pwnios1 – Mac • $4.99 • http://bit.ly/pwnmac1 • Write-Up – http://bit.ly/pwngame • Kid Review
  • 34. Existing Games Uplink • Type: Video • History – 2001: Released for Windows & Linux by Introversion Software – 2006: Valve's Steam – 2011: Ubuntu Software Center – 2012: iPad & Android • Objective – Standard One-Off Missions – Storyline with Player Receiving an E-Mail from Deceased Uplink Agent
  • 35. Existing Games Uplink • You play an Uplink Agent who makes a living by performing jobs for major corporations. Your tasks involve hacking into rival computer systems, stealing research data, sabotaging other companies, laundering money, erasing evidence, or framing innocent people. • You use the money you earn to upgrade your computer systems, and to buy new software and tools. As your experience level increases you find more dangerous and profitable missions become available. You can speculate on a fully working stock market (and even influence its outcome). You can modify peoples academic or criminal records. You can divert money from bank transfers into your own accounts. You can even take part in the construction of the most deadly computer virus ever designed.
  • 37. Existing Games Uplink • Availability – Windows/Linux • $15 download; $20 Delivery – iPad • $4.99 • http://bit.ly/uplinkipad – Mac • $10 • http://bit.ly/uplinkmac – Android (coming) • Kid Review
  • 38. Existing Games CryptoClub • Type: Website • History – Created by University of Illinois & Partners – cryptoclub.math.uic.edu – CryptoClub.org • Objective – Teach Basic Crypto Concepts – Test Skills with Games & Challenges
  • 40. Existing Games Crypto Club • More Detail – “The CryptoClub Project develops classroom and web-based material to teach cryptography and related mathematics, as well as material to support teachers of these topics. The project is a collaboration between UIC's Learning Sciences Research Institute, Department of Mathematics, Statistics, and Computer Science, and School of Art and Design.” • Kid Review
  • 41. Existing Games NSA CryptoChallenge • Type: Most Mobile Devices • History – No such story exists – So I can not tell you much – But here you go • Objective – Teach Basic Crypto Concepts – Test Skills with Games & Challenges
  • 43. Existing Games NSA CryptoChallenge • More Detail – “Developed by the National Security Agency, NSA CryptoChallenge is a game that tests your pattern recognition skills through a series of cryptographs. Your mission is to decipher encrypted quotes, factoids, historical events and more. It’s you against the clock to see how fast you can crack the code.” • Write-Up – http://bit.ly/nsacryptochallenge • Kid Review
  • 44. Existing Games VIM Adventures • Type: Website • History – Few Years Ago – 3 Levels – Recently Finalized – 13 Levels • Objective – Learn VIM through Gaming – “It’s the ‘Zelda meets text editing’ game.” • Write-Up – http://bit.ly/vim-adventures
  • 46. Other • InventWithPython.com – 3 Free Kid-Focused Python Books – Invent Your Own Computer Games with Python, Making Games with Python and Pygame, Hacking Secret Ciphers with Python • Audio/Video – “HackTikes Podcast” - mubix (http://bit.ly/hackertikes) – “Teaching Kids Cyber Security” - Reuben Paul (http://bit.ly/teachingkidscyber) – “Minecraft Security” by Riese Goerlich (http://bit.ly/minecraftsecurity) • Learning the Computer – Qimo and Edubuntu – http://bit.ly/learningthecomputer • Learning to Program – Scratch, Logo, … – http://bit.ly/learningtoprogram • Hacker High School (http://bit.ly/hackerhighschool) • r00tz/Defcon Kids (http://bit.ly/defconkids) • Online (Regex Golf, …) • …
  • 47. KidHack Project • Platform – Blog: bit.ly/kidhack – Fancy .io Domains • Game Categories – Computers – Programming – Games – Conferences – Books/Podcasts
  • 48.
  • 50. What’s Next • Contribute – Comments on KidHack Page: http://bit.ly/kidhack – Contact Us Form: http://bit.ly/nispcontact
  • 51. Conclusion • Introduction • Background • Existing Games • KidHack Project • What’s Next • Conclusion
  • 52. Questions? • Presentation http://bit.ly/grecsbsidesta • Twitter @grecs & @pupstrr • Website NovaInfosec.com • Contact http://bit.ly/nispcontact