2022
DOI: 10.1002/iis2.12902
|View full text |Cite
|
Sign up to set email alerts
|

Serious Games with SysML: Gamifying Threat Modelling in a Small Business Setting

Abstract: This paper describes using casual games to capture and disseminate expert security knowledge with a digital model at a small company. Most companies in the global supply chain are Very Small Entities (VSE), meaning they employ five (5) to twenty‐five (25) people. These companies represent a risk because they have little to no security proficiency and limited resources and incentive to prioritize system security. Moreover, this is a hidden risk because the companies higher up in the supply chain rely on contrac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…Michael, et al claim that the concept of ZTA is currently a moving target, and developing and sustaining ZTA is essentially impossible [61]. Some experts consider Zero Trust as a misnomer [62]. When a good majority of cybersecurity experts believe ZTA itself is impossible or illusive [63], the legitimacy of research reports claiming ZTAbD (Zero Trust Architecture by Design) is at best questionable.…”
Section: How Does the Zero Trust Strategy Playout In The Zvc/3soc Fra...mentioning
confidence: 99%
See 1 more Smart Citation
“…Michael, et al claim that the concept of ZTA is currently a moving target, and developing and sustaining ZTA is essentially impossible [61]. Some experts consider Zero Trust as a misnomer [62]. When a good majority of cybersecurity experts believe ZTA itself is impossible or illusive [63], the legitimacy of research reports claiming ZTAbD (Zero Trust Architecture by Design) is at best questionable.…”
Section: How Does the Zero Trust Strategy Playout In The Zvc/3soc Fra...mentioning
confidence: 99%
“…Each of these pillars is layered in legacy computing systems mandating third-party permissions, which are governed by a policy engine, policy administration, and policy enforcement process defined by the system's varying operational circumstances (Figure 9). Although several reports [62]- [67] claim the merit of ZT by Design or absolute zero trust (AZT), technically all those proposed ZT implementations in the prior art are policy based [61]- [69], and therefore strictly speaking cannot be ZTbD or AZT. Embedding full, seamless, and autonomous ZT in any legacy computing system is wishful thinking that can only be desired but not achieved.…”
Section: How Does the Zero Trust Strategy Playout In The Zvc/3soc Fra...mentioning
confidence: 99%