2020
DOI: 10.1007/978-3-030-42051-2_11
|View full text |Cite
|
Sign up to set email alerts
|

PROTECT – An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…A serious game model includes information about the following two types of games: PROTECT [37] or Awareness Quiz [38]. Updates occurred only on the creation of the latter.…”
Section: Serious Gamementioning
confidence: 99%
See 1 more Smart Citation
“…A serious game model includes information about the following two types of games: PROTECT [37] or Awareness Quiz [38]. Updates occurred only on the creation of the latter.…”
Section: Serious Gamementioning
confidence: 99%
“…Phishing and social engineering -Main lecture and educational material -Emulation of a virtual lab with an email phishing scenario and the use of OpenPGP software (Kleopatra) -Serious game for targeted social engineering on system administrators with the PROTECT game [37] The everlasting effects of social-engineering with a focus on phishing attacks, as well as email security authentication, integrity, and confidentiality.…”
Section: The Iot-enabled Smart Home Use Case 61 Outlinementioning
confidence: 99%
“…Some recent examples of SGs, such as 'Riskio' [25], 'CybAR' [2], 'AWATO' [18] and 'PROTECT' [21] look to provide innovation, incorporate new technologies, or tackle areas of knowledge that have seen little attention in this form. CybAR utilises augmented reality within a mobile application to increase awareness of different cyber attack forms.…”
Section: Related Workmentioning
confidence: 99%
“…THREAT-ARREST combines all modern training aspects of serious gaming [25,26], emulation and simulation in a concrete manner [27], and offers continuous security assurance and programme adaptation based on the trainee's performance and skills (Table 1). The platform [24] offers training on known and/or new advanced cyber-attack scenarios, taking different types of action against them, including: preparedness, detection and analysis, incident response, and post incident response actions.…”
Section: Modern Cyber-security Training Platformsmentioning
confidence: 99%
“…With this Tool, we can: (i) export the system's security vulnerabilities and threats, (ii) conduct a risk analysis to identify the most significant of them, and (iii) perform statistical analysis on the various system log-files in order to produce realistic synthetic logs (i.e., with the platform's Data Fabrication Tool). Afterwards, these logs are utilized by the CTTP models and can be processed by the Gamification, Emulation, and/or Simulation Tools [25][26][27].…”
Section: Teaching and Learning Strategiesmentioning
confidence: 99%