Scenarios - Center for Cybersecurity and Cyber Operations
CyberCIEGE Scenarios
Game Scenarios
The following games are included in the CyberCIEGE distribution. If you have created a scenario that you would like to share, email the project directory to cyberciege@nps.edu.
The following games are included in the CyberCIEGE distribution. If you have created a scenario that you would like to share, email the project directory to cyberciege@nps.edu.
| Scenario Name | Description |
| Stop Worms | Highlights risks of malicious software within email attachments. A good initial scenario for introducing some of the CyberCIEGE interfaces |
| Life with Macros | Describes risks of macro viruses and the use of antivirus tools to reduce these risks in environments that must handle many external documents. |
| Identity Theft | Help protect a home computer user from the perils of identity theft. |
| Passwords | Define password policies for an online dating service. |
| Introduction | Simple tutorial scenario that walks the player through the mechanics of the game and introduces the player to a number of the CyberCIEGE security concepts. |
| Physical Security | Introduces CyberCIEGE zones and methods of physically protecting assets. |
| Filters | Explores issues arising from connecting networks to the Internet and the use of filters to protect assets. |
| Patches | Highlights the need to have a patch management plan. |
| PCA | Help the Professional Croquette Assocation protect their secrets using a DMZ. |
| Link Encrypt | Introduces link encryptors, basic key management issues and assurance. |
| Key Types | Some differences between symmetric and public key encryption. Introduces password hash cracking |
| Virtual Private Networks | Introduced VPNs and their use to authenticate the source of connections and the need for high assurance to counter highly motivated attackers. |
| Advanced VPNs | Extends the introductory VPN scenario to introduce PKI concepts including Certification Authorities, installed roots, cross certification and certificate policies. |
| Hard Rain | Use of PKI to protect email. |
| ParaZog | Protect email using smart cards in the context of a paramilitary unit stood up to protect an international carbon credit cartel. |
| Angle Locks | Use SSL & TLS to help a small business grow and ward off attackers. |
| User Identification | Explores strategies for identifying users to computers. |
| Who Are You? | Identity Management and the use of biometric devices to control entry to a base. |
| Down Time | Help an industrial spy avoid pitfalls in an Internet cafe. |
| Identity Database Protection | Protect a database used to mint smart cards. |
| Mandatory Access Controls | Use a multilevel server to achieve controlled sharing of sensitive data. |
| MAC Integrity | Like the MAC scenario, but this time with an integrity policy. |
| Genes R Us | Help a biotech company secure their trade secrets while developing revolutionary products. |
Extra Scenarios -- these have not been maintained and may not fully work. |
|
| Ares | Two scenarios that explore issues associated with maintaining the integrity of information in the face of well funded professional attacks. Ares1 is a introduction and Ares2 is a more sophisticated and difficult scenario. |
| Venture Games | A series of scenarios (VG_scenario1 through VG_scenario5) built around a small business having proprietary information and requirements to connect to the Internet. VG_scenario1 is the easiest and VG_scenario5 is the most complex of the series. |
| Area 91 | Planet Desmid's premiere secret projects research facility. Protect special compartmented information while keeping internal intrigues from derailing the missions. |
| IA Training & Awareness | Basic IA training in a Navy environment |
| Technical User Training | Network security decision making in a Navy environment. |