Difference between revisions of "Games - Security"

From
Jump to: navigation, search
m
m
 
(11 intermediate revisions by the same user not shown)
Line 2: Line 2:
 
|title=PRIMO.ai
 
|title=PRIMO.ai
 
|titlemode=append
 
|titlemode=append
|keywords=artificial, intelligence, machine, learning, models, algorithms, data, singularity, moonshot, TensorFlow, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Meta, Facebook
+
|keywords=ChatGPT, artificial, intelligence, machine, learning, GPT-4, GPT-5, NLP, NLG, NLC, NLU, models, data, singularity, moonshot, Sentience, AGI, Emergence, Moonshot, Explainable, TensorFlow, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Hugging Face, OpenAI, Tensorflow, OpenAI, Google, Nvidia, Microsoft, Azure, Amazon, AWS, Meta, LLM, metaverse, assistants, agents, digital twin, IoT, Transhumanism, Immersive Reality, Generative AI, Conversational AI, Perplexity, Bing, You, Bard, Ernie, prompt Engineering LangChain, Video/Image, Vision, End-to-End Speech, Synthesize Speech, Speech Recognition, Stanford, MIT |description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools
|description=Helpful resources for your journey with artificial intelligence; videos, articles, techniques, courses, profiles, and tools  
+
 
 +
<!-- Google tag (gtag.js) -->
 +
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4GCWLBVJ7T"></script>
 +
<script>
 +
  window.dataLayer = window.dataLayer || [];
 +
  function gtag(){dataLayer.push(arguments);}
 +
  gtag('js', new Date());
 +
 
 +
  gtag('config', 'G-4GCWLBVJ7T');
 +
</script>
 
}}
 
}}
[http://www.youtube.com/results?search_query=~game+Cyber+security+artificial+intelligence+deep+learning+ai Youtube search...]
+
[https://www.youtube.com/results?search_query=~game+Cyber+security+artificial+intelligence+deep+learning+ai Youtube search...]
[http://www.google.com/search?q=~game+Cyber+security+artificial+intelligence+deep+learning+ai ...Google search]
+
[https://www.google.com/search?q=~game+Cyber+security+artificial+intelligence+deep+learning+ai ...Google search]
  
 +
* [[Gaming]] ... [[Game-Based Learning (GBL)]] ... [[Games - Security|Security]] ... [[Game Development with Generative AI|Generative AI]] ... [[Metaverse#Games - Metaverse|Games - Metaverse]] ... [[Games - Quantum Theme|Quantum]] ... [[Game Theory]] ... [[Game Design | Design]]
 
* [[Case Studies]]
 
* [[Case Studies]]
** [[Gaming]]
 
 
** [[Education]]
 
** [[Education]]
 
** [[Healthcare]]
 
** [[Healthcare]]
* [[Game-Based Learning (GBL)]]
+
* [[What is Artificial Intelligence (AI)? | Artificial Intelligence (AI)]] ... [[Machine Learning (ML)]] ... [[Deep Learning]] ... [[Neural Network]] ... [[Reinforcement Learning (RL)|Reinforcement]] ... [[Learning Techniques]]
** [[Games - Security]]
 
** [[Games - Quantum Theme]]
 
** [[Metaverse#Games - Metaverse| Games - Metaverse]]
 
* [[Game Theory]]
 
* [[Metaverse]]  ... [[Metaverse#MetaverseGaming | Gaming]]                                          
 
* [[Reinforcement Learning (RL)]]
 
 
* [[Q Learning]]
 
* [[Q Learning]]
 
** [[Deep Q Network (DQN)]]
 
** [[Deep Q Network (DQN)]]
* [[Cybersecurity]]
+
* [[Cybersecurity]] ... [[Open-Source Intelligence - OSINT |OSINT]] ... [[Cybersecurity Frameworks, Architectures & Roadmaps | Frameworks]] ... [[Cybersecurity References|References]] ... [[Offense - Adversarial Threats/Attacks| Offense]] ... [[National Institute of Standards and Technology (NIST)|NIST]] ... [[U.S. Department of Homeland Security (DHS)| DHS]] ... [[Screening; Passenger, Luggage, & Cargo|Screening]] ... [[Law Enforcement]] ... [[Government Services|Government]] ... [[Defense]] ... [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration| Lifecycle Integration]] ... [[Cybersecurity Companies/Products|Products]] ... [[Cybersecurity: Evaluating & Selling|Evaluating]]
* [[Python]]   ... [[Generative AI with Python]] ... [[Javascript]] ... [[Generative AI with Javascript]] ... [[Game Development with Generative AI]]
+
* [[Python]] ... [[Generative AI with Python|GenAI w/ Python]] ... [[JavaScript]] ... [[Generative AI with JavaScript|GenAI w/ JavaScript]] ... [[TensorFlow]] ... [[PyTorch]]
* [[Development]] ...[[Development#AI Pair Programming Tools|AI Pair Programming Tools]] ... [[Analytics]] ... [[Visualization]] ... [[Diagrams for Business Analysis]]
+
* [[Analytics]] ... [[Visualization]] ... [[Graphical Tools for Modeling AI Components|Graphical Tools]] ... [[Diagrams for Business Analysis|Diagrams]] & [[Generative AI for Business Analysis|Business Analysis]] ... [[Requirements Management|Requirements]] ... [[Loop]] ... [[Bayes]] ... [[Network Pattern]]
* [http://shostack.org/games.html Tabletop Security Games & Cards | Shoestack + Associates]
+
* [[Development]] ... [[Notebooks]] ... [[Development#AI Pair Programming Tools|AI Pair Programming]] ... [[Codeless Options, Code Generators, Drag n' Drop|Codeless]] ... [[Hugging Face]] ... [[Algorithm Administration#AIOps/MLOps|AIOps/MLOps]] ... [[Platforms: AI/Machine Learning as a Service (AIaaS/MLaaS)|AIaaS/MLaaS]]
* [http://www.csiac.org/csiac-report/hypergaming-for-cyber-strategy-for-gaming-a-wicked-problem/ Hypergaming for Cyber - Strategy for Gaming a Wicked Problem]
+
* [https://shostack.org/games.html Tabletop Security Games & Cards | Shoestack + Associates]
* [http://www.circadence.com/ Circadence]
+
* [https://www.csiac.org/csiac-report/hypergaming-for-cyber-strategy-for-gaming-a-wicked-problem/ Hypergaming for Cyber - Strategy for Gaming a Wicked Problem]
* [http://cyberstart.com/ CyberStart]
+
* [https://www.circadence.com/ Circadence]
 +
* [https://cyberstart.com/ CyberStart]
  
 
{|<!-- T -->
 
{|<!-- T -->
Line 35: Line 39:
 
<youtube>1IoY_RyX1-w</youtube>
 
<youtube>1IoY_RyX1-w</youtube>
 
<b>CSIAC Podcast - Hypergaming for Cyber - Strategy for Gaming a Wicked Problem
 
<b>CSIAC Podcast - Hypergaming for Cyber - Strategy for Gaming a Wicked Problem
</b><br>CSIAC [http://www.csiac.org/podcast/hypergaming-for-cyber-strategy-for-gaming-a-wicked-problem/ Learn more]  Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many interlaced attributes with other information related capabilities (IRCs), namely electromagnetic warfare (EW), information operations (IO), and intelligence, surveillance, and reconnaissance (ISR), within an information warfare (IW) construct that serves to add to its multifaceted nature. In this cyber analysis, the concept of hypergaming will be defined and discussed in reference to its potential as a way to examine cyber as a discipline and domain, and to explore how hypergaming can address cyber’s “wicked” nature from the perspectives of decision making, modeling, operational research (OR), IO, and finally IW. Finally, a cyber-centric hypergame model (CHM) will be presented.  
+
</b><br>CSIAC [https://www.csiac.org/podcast/hypergaming-for-cyber-strategy-for-gaming-a-wicked-problem/ Learn more]  Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many interlaced attributes with other information related capabilities (IRCs), namely electromagnetic warfare (EW), information operations (IO), and intelligence, surveillance, and reconnaissance (ISR), within an information warfare (IW) construct that serves to add to its multifaceted nature. In this cyber analysis, the concept of hypergaming will be defined and discussed in reference to its potential as a way to examine cyber as a discipline and domain, and to explore how hypergaming can address cyber’s “wicked” nature from the perspectives of decision making, modeling, operational research (OR), IO, and finally IW. Finally, a cyber-centric hypergame model (CHM) will be presented.  
 
|}
 
|}
 
|<!-- M -->
 
|<!-- M -->
Line 43: Line 47:
 
<youtube>wv7I_TjPWDE</youtube>
 
<youtube>wv7I_TjPWDE</youtube>
 
<b>Live Project Ares Walk Through
 
<b>Live Project Ares Walk Through
</b><br>If you are interested in playing Project Ares, please fill out this form - http://bit.ly/ITCQ-ARES-Q  Project Ares Gamified Cyber Security Training from Circadence  http://www.circadence.com  www.zachtalkstech.com  teespring.com/stores/it-career-questions
+
</b><br>If you are interested in playing Project Ares, please fill out this form - https://bit.ly/ITCQ-ARES-Q  Project Ares Gamified Cyber Security Training from Circadence  https://www.circadence.com  www.zachtalkstech.com  teespring.com/stores/it-career-questions
 
|}
 
|}
 
|}<!-- B -->
 
|}<!-- B -->

Latest revision as of 22:03, 3 November 2024

Youtube search... ...Google search

CSIAC Podcast - Hypergaming for Cyber - Strategy for Gaming a Wicked Problem
CSIAC Learn more Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many interlaced attributes with other information related capabilities (IRCs), namely electromagnetic warfare (EW), information operations (IO), and intelligence, surveillance, and reconnaissance (ISR), within an information warfare (IW) construct that serves to add to its multifaceted nature. In this cyber analysis, the concept of hypergaming will be defined and discussed in reference to its potential as a way to examine cyber as a discipline and domain, and to explore how hypergaming can address cyber’s “wicked” nature from the perspectives of decision making, modeling, operational research (OR), IO, and finally IW. Finally, a cyber-centric hypergame model (CHM) will be presented.

Live Project Ares Walk Through
If you are interested in playing Project Ares, please fill out this form - https://bit.ly/ITCQ-ARES-Q Project Ares Gamified Cyber Security Training from Circadence https://www.circadence.com www.zachtalkstech.com teespring.com/stores/it-career-questions

CyberStart Game - Video1
How to quickly get up and running with the the CyberStart game. This video includes an overview of the game Intro, the Basic Layout and the Field Manual.

TryHackMe - Beginner Learning Path
ActualTom Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/actual_tom