Here is a list of Security Serious Games: techniques for transmitting knowledge through
gamification techniques, achieving good results.
“This is the real secret of life, to be completely engaged with what you are doing in the
here and now. And
instead of calling it work, realize it is play.”
― Alan Watts
PLAY & ENJOY!
Games:
Crypto Club
On this site there are several sections containing very simple mini-games for players
in the world of removal.
Centigrade
The games is composed by 3 different minigames: Documents, please; Spam Defense; Hack
the Planet.
Minigame Security
There minigames which cover different thematics: phishing, firewall, authentication,
blockchain, XSS, ARP spoofing, Log and Monitoring and sensitive data exposure.
Interland
This game focuses in particular on the dangers that moving online can entail and on
the behaviors to be followed or avoided in
the contexts of social networks or digital payments.
Targeted Attack
The game is a visual novel consisting of short videos in which the actors
participate, interspersed with sections where
the player has to make a decision. This allows the game to be very immersive and
realistic, and to have a good number of
alternative scenarios.
Data Center Attack
The game is made by the company TrendMicro, which deals with IT security in the
corporate environment. The purpose of
the game is to show potential buyers, but not limited to, the area in which the
company operates, emphasizing the
usefulness of managing corporate IT security with clarity and competence.
CyberSecurity Lab
The player must manage the growth of a new social network and consequently defend
himself from a series of increasingly
sophisticated attacks against his start-up. The gameplay is made up of minigames
that deal with different themes.
This game aims to: teach how to defend your personal information in the digital
world; identify phishing attempts; learn programming basics; defend against cyber
attacks.
Netsim
It is a computer network simulator, in which it is possible to send and receive
packets within the fictitious network.
Permission Impossible
The game is very simple and is divided into a series of levels in which the player
has to build the input and output
rules of a firewall, following the indicated requests. To do this, bricks must be
dragged in a row to form the
aforementioned rules.
The Weakest Link
The protagonist is a new employee who has just started working in the company and the
player has to answer a multiple
choice question every working day for a month. Each answer is communicated whether
the selected one is correct or not,
with a brief explanation of its implications.
Keep Tradition Secure
In this game players have the role of Texas A&M students tasked with protecting the
university's computer systems from cyber attacks. Players can earn points by
completing tasks and making good decisions regarding cybersecurity, and they can
compete with other players on leaderboards.
CyberSprinters
In this game, the player takes on the role of a "cybersprinter," a character who
faces a series of challenges and obstacles to complete a virtual race. It is
designed for children aged 7 to 11 and aims to teach the importance of online
safety.
Privacy pirates
The game is set in a virtual world where players become hackers and must navigate
through an ocean of personal data, attempting to steal information from other
players while defending themselves against attacks from opponents.
Bitburner
In the game, players are transported to a dystopian cyberpunk world where they assume
the role of a motivated hacker. They use their skills to uncover hidden secrets and
pursue personal gain in this alternate future.
Games:
CyberCraft
The aim of the game is to introduce some cybersecurity concepts by emphasizing the attack-countermeasure relationship of
the techniques described.
Fintech Tycoon
In this game, you have to manage the funds earned by employees, and purchase products
and features to improve the IT security of the company.