Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course

Research output: Chapter in Book/Report/Conference proceedingChapter

Standard

Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course. / Chothia, Tom; Novakovic, Chris; Radu, Andreea Ina; Thomas, Richard J.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, 2019. p. 141-172 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11345 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

Harvard

Chothia, T, Novakovic, C, Radu, AI & Thomas, RJ 2019, Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11345 LNCS, Springer Verlag, pp. 141-172. https://doi.org/10.1007/978-3-662-59351-6_12

APA

Chothia, T., Novakovic, C., Radu, A. I., & Thomas, R. J. (2019). Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 141-172). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 11345 LNCS). Springer Verlag. https://doi.org/10.1007/978-3-662-59351-6_12

Vancouver

Chothia T, Novakovic C, Radu AI, Thomas RJ. Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag. 2019. p. 141-172. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-662-59351-6_12

Author

Chothia, Tom ; Novakovic, Chris ; Radu, Andreea Ina ; Thomas, Richard J. / Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, 2019. pp. 141-172 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).

Bibtex

@inbook{79e238fc60a145fe9ff572606d5de6c7,
title = "Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course",
abstract = "Narrative is an important element of gamification. In this article, we describe the development of a framework that adds a narrative to an 11-week cybersecurity course. The students play the part of a new IT security employee at a company and are asked to complete a number of security tasks, for which they receive flags. As well as being used to assess their performance throughout the course, students can send the flags they find to a number of different characters to progress the storyline in different ways. As the story unfolds they find deceit, corruption and ultimately murder, and their choices lead them to one of three different endings. Our framework for running the story and the exercises is completely self-contained in a single virtual machine, which the students each download at the start of the course; this means that no resource-consuming backend or cloud support is required. We report on the results of qualitative and quantitative evaluations of the course that provide evidence that both the VM and the story contained within it increased student engagement and improved their course results.",
author = "Tom Chothia and Chris Novakovic and Radu, {Andreea Ina} and Thomas, {Richard J.}",
year = "2019",
month = apr,
day = "27",
doi = "10.1007/978-3-662-59351-6_12",
language = "English",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "141--172",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

RIS

TY - CHAP

T1 - Choose Your Pwn Adventure: Adding Competition and Storytelling to an Introductory Cybersecurity Course

AU - Chothia, Tom

AU - Novakovic, Chris

AU - Radu, Andreea Ina

AU - Thomas, Richard J.

PY - 2019/4/27

Y1 - 2019/4/27

N2 - Narrative is an important element of gamification. In this article, we describe the development of a framework that adds a narrative to an 11-week cybersecurity course. The students play the part of a new IT security employee at a company and are asked to complete a number of security tasks, for which they receive flags. As well as being used to assess their performance throughout the course, students can send the flags they find to a number of different characters to progress the storyline in different ways. As the story unfolds they find deceit, corruption and ultimately murder, and their choices lead them to one of three different endings. Our framework for running the story and the exercises is completely self-contained in a single virtual machine, which the students each download at the start of the course; this means that no resource-consuming backend or cloud support is required. We report on the results of qualitative and quantitative evaluations of the course that provide evidence that both the VM and the story contained within it increased student engagement and improved their course results.

AB - Narrative is an important element of gamification. In this article, we describe the development of a framework that adds a narrative to an 11-week cybersecurity course. The students play the part of a new IT security employee at a company and are asked to complete a number of security tasks, for which they receive flags. As well as being used to assess their performance throughout the course, students can send the flags they find to a number of different characters to progress the storyline in different ways. As the story unfolds they find deceit, corruption and ultimately murder, and their choices lead them to one of three different endings. Our framework for running the story and the exercises is completely self-contained in a single virtual machine, which the students each download at the start of the course; this means that no resource-consuming backend or cloud support is required. We report on the results of qualitative and quantitative evaluations of the course that provide evidence that both the VM and the story contained within it increased student engagement and improved their course results.

UR - http://www.scopus.com/inward/record.url?scp=85065440360&partnerID=8YFLogxK

U2 - 10.1007/978-3-662-59351-6_12

DO - 10.1007/978-3-662-59351-6_12

M3 - Chapter

AN - SCOPUS:85065440360

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 141

EP - 172

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

PB - Springer Verlag

ER -