Difference between revisions of "Games - Security"

From
Jump to: navigation, search
m
m
Line 26: Line 26:
 
* [[Cybersecurity]] ... [[Open-Source Intelligence - OSINT |OSINT]] ... [[Cybersecurity Frameworks, Architectures & Roadmaps | Frameworks]] ... [[Cybersecurity References|References]] ... [[Offense - Adversarial Threats/Attacks| Offense]] ... [[National Institute of Standards and Technology (NIST)|NIST]] ... [[U.S. Department of Homeland Security (DHS)| DHS]] ... [[Screening; Passenger, Luggage, & Cargo|Screening]] ... [[Law Enforcement]] ... [[Government Services|Government]] ... [[Defense]] ... [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration| Lifecycle Integration]] ... [[Cybersecurity Companies/Products|Products]] ... [[Cybersecurity: Evaluating & Selling|Evaluating]]
 
* [[Cybersecurity]] ... [[Open-Source Intelligence - OSINT |OSINT]] ... [[Cybersecurity Frameworks, Architectures & Roadmaps | Frameworks]] ... [[Cybersecurity References|References]] ... [[Offense - Adversarial Threats/Attacks| Offense]] ... [[National Institute of Standards and Technology (NIST)|NIST]] ... [[U.S. Department of Homeland Security (DHS)| DHS]] ... [[Screening; Passenger, Luggage, & Cargo|Screening]] ... [[Law Enforcement]] ... [[Government Services|Government]] ... [[Defense]] ... [[Joint Capabilities Integration and Development System (JCIDS)#Cybersecurity & Acquisition Lifecycle Integration| Lifecycle Integration]] ... [[Cybersecurity Companies/Products|Products]] ... [[Cybersecurity: Evaluating & Selling|Evaluating]]
 
* [[Python]]  ... [[Generative AI with Python]]  ... [[Javascript]]  ... [[Generative AI with Javascript]]   
 
* [[Python]]  ... [[Generative AI with Python]]  ... [[Javascript]]  ... [[Generative AI with Javascript]]   
* [[Development]] ...[[Development#AI Pair Programming Tools|AI Pair Programming Tools]] ... [[Analytics]] ... [[Visualization]] ... [[Diagrams for Business Analysis]]
+
* [[Analytics]] ... [[Visualization]] ... [[Graphical Tools for Modeling AI Components|Graphical Tools]] ... [[Loop]] ... [[Diagrams for Business Analysis|Diagrams]] & [[Generative AI for Business Analysis|Business Analysis]] ... [[Requirements Management|Requirements]] ... [[Bayes]] ... [[Network Pattern]]
 +
* [[Development]] ... [[Notebooks]] ... [[Development#AI Pair Programming Tools|AI Pair Programming]] ... [[Codeless Options, Code Generators, Drag n' Drop|Codeless, Generators, Drag n' Drop]] ... [[Algorithm Administration#AIOps/MLOps|AIOps/MLOps]] ... [[Platforms: AI/Machine Learning as a Service (AIaaS/MLaaS)|AIaaS/MLaaS]]
 
* [https://shostack.org/games.html Tabletop Security Games & Cards | Shoestack + Associates]
 
* [https://shostack.org/games.html Tabletop Security Games & Cards | Shoestack + Associates]
 
* [https://www.csiac.org/csiac-report/hypergaming-for-cyber-strategy-for-gaming-a-wicked-problem/ Hypergaming for Cyber - Strategy for Gaming a Wicked Problem]
 
* [https://www.csiac.org/csiac-report/hypergaming-for-cyber-strategy-for-gaming-a-wicked-problem/ Hypergaming for Cyber - Strategy for Gaming a Wicked Problem]

Revision as of 19:37, 5 July 2023

Youtube search... ...Google search

CSIAC Podcast - Hypergaming for Cyber - Strategy for Gaming a Wicked Problem
CSIAC Learn more Cyber as a domain and battlespace coincides with the defined attributes of a “wicked problem” with complexity and inter-domain interactions to spare. Since its elevation to domain status, cyber has continued to defy many attempts to explain its reach, importance, and fundamental definition. Corresponding to these intricacies, cyber also presents many interlaced attributes with other information related capabilities (IRCs), namely electromagnetic warfare (EW), information operations (IO), and intelligence, surveillance, and reconnaissance (ISR), within an information warfare (IW) construct that serves to add to its multifaceted nature. In this cyber analysis, the concept of hypergaming will be defined and discussed in reference to its potential as a way to examine cyber as a discipline and domain, and to explore how hypergaming can address cyber’s “wicked” nature from the perspectives of decision making, modeling, operational research (OR), IO, and finally IW. Finally, a cyber-centric hypergame model (CHM) will be presented.

Live Project Ares Walk Through
If you are interested in playing Project Ares, please fill out this form - https://bit.ly/ITCQ-ARES-Q Project Ares Gamified Cyber Security Training from Circadence https://www.circadence.com www.zachtalkstech.com teespring.com/stores/it-career-questions

CyberStart Game - Video1
How to quickly get up and running with the the CyberStart game. This video includes an overview of the game Intro, the Basic Layout and the Field Manual.

TryHackMe - Beginner Learning Path
ActualTom Broadcasted live on Twitch -- Watch live at https://www.twitch.tv/actual_tom