Security Serious Game

Here is a list of Security Serious Games: techniques for transmitting knowledge through gamification techniques, achieving good results.

“This is the real secret of life, to be completely engaged with what you are doing in the here and now. And instead of calling it work, realize it is play.” ― Alan Watts

PLAY & ENJOY!


Games:

Crypto Club

On this site there are several sections containing very simple mini-games for players in the world of removal.

Centigrade

The games is composed by 3 different minigames: Documents, please; Spam Defense; Hack the Planet.

Minigame Security  

There minigames which cover different thematics: phishing, firewall, authentication, blockchain, XSS, ARP spoofing, Log and Monitoring and sensitive data exposure.

Interland

This game focuses in particular on the dangers that moving online can entail and on the behaviors to be followed or avoided in the contexts of social networks or digital payments.

Targeted Attack

The game is a visual novel consisting of short videos in which the actors participate, interspersed with sections where the player has to make a decision. This allows the game to be very immersive and realistic, and to have a good number of alternative scenarios.

Data Center Attack

The game is made by the company TrendMicro, which deals with IT security in the corporate environment. The purpose of the game is to show potential buyers, but not limited to, the area in which the company operates, emphasizing the usefulness of managing corporate IT security with clarity and competence.

CyberSecurity Lab

The player must manage the growth of a new social network and consequently defend himself from a series of increasingly sophisticated attacks against his start-up. The gameplay is made up of minigames that deal with different themes. This game aims to: teach how to defend your personal information in the digital world; identify phishing attempts; learn programming basics; defend against cyber attacks.

Netsim

It is a computer network simulator, in which it is possible to send and receive packets within the fictitious network.

Permission Impossible

The game is very simple and is divided into a series of levels in which the player has to build the input and output rules of a firewall, following the indicated requests. To do this, bricks must be dragged in a row to form the aforementioned rules.

The Weakest Link

The protagonist is a new employee who has just started working in the company and the player has to answer a multiple choice question every working day for a month. Each answer is communicated whether the selected one is correct or not, with a brief explanation of its implications.

Keep Tradition Secure

In this game players have the role of Texas A&M students tasked with protecting the university's computer systems from cyber attacks. Players can earn points by completing tasks and making good decisions regarding cybersecurity, and they can compete with other players on leaderboards.

CyberSprinters

In this game, the player takes on the role of a "cybersprinter," a character who faces a series of challenges and obstacles to complete a virtual race. It is designed for children aged 7 to 11 and aims to teach the importance of online safety.

Privacy pirates

The game is set in a virtual world where players become hackers and must navigate through an ocean of personal data, attempting to steal information from other players while defending themselves against attacks from opponents.

Bitburner

In the game, players are transported to a dystopian cyberpunk world where they assume the role of a motivated hacker. They use their skills to uncover hidden secrets and pursue personal gain in this alternate future.

Games:

CyberCraft

The aim of the game is to introduce some cybersecurity concepts by emphasizing the attack-countermeasure relationship of the techniques described.

Fintech Tycoon

In this game, you have to manage the funds earned by employees, and purchase products and features to improve the IT security of the company.