sD&D: Design and Implementation of Cybersecurity Educational Game with Highly Extensible Functionality

  • Yoshiyuki KidoEmail author
  • Nelson Pinto Tou
  • Naoto Yanai
  • Shinji Shimojo
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1129)


Cybersecurity issues have gained more attention due to the rapid development of new technology. In many cases, cyber theft happened due to a lack of understanding of how to secure a single piece of private information. In the present paper, we attempt to provide an inexpensive and easy tool for learning cybersecurity through a board game simulation called Security Defense and Dungeons (sD&D). The basic concept is not only to introduce the latest cybersecurity equipment and solutions, but also to provide cybersecurity education for players to raise awareness regarding cybersecurity threats. In addition, we attempt to train users in good practices concerning team communication and human resources. The simple game interface includes cybersecurity task scenarios, featured intuitive game design for users, and easy exploration of the provided scenario. In addition, the proposed game, in which players can share game resources and bits of knowledge, communicate via a chat room. In the present study, in order to evaluate the proposed method and prototype implementation, we performed a user study with student users. The questionnaire results were mostly positive comments and opinions.


Gaming education Cybersecurity education Security awareness 



A part of this research work was supported by the JSPS KAKENHI Grant Number JP18K11355.


  1. 1.
  2. 2.
    Cetto, A., Netter, M., Pernul, G., Richthammer, C., Riesner, M., Roth, C., Sänger, J.: Friend inspector: a serious game to enhance privacy awareness in social networks. CoRR abs/1402.5878 (2014).
  3. 3.
    Cone, B., Thompson, M., Irvine, C., Nguyen, T.: Cyber security training and awareness through game play. In: Security and Privacy in Dynamic Environments (SEC 2006). IFIP International Federation for Information Processing, vol. 201, pp. 431–436 (2006)Google Scholar
  4. 4.
    Denning, T., Lerner, A., Shostack, A., Kohno, T.: Control-alt-hack: the design and evaluation of a card game for computer security awareness and education. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 915–928 (2013)Google Scholar
  5. 5.
    Eagle, M.: Level up: a frame work for the design and evaluation of educational games. In: Proceedings of the 4th International Conference on Foundations of Digital Games, pp. 339–341 (2009)Google Scholar
  6. 6.
    Ford, V., Siraj, A., Haynes, A., Brown, E.: Capture the flag unplugged: an offline cyber competition. In: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, pp. 225–230 (2017)Google Scholar
  7. 7.
    Gondree, M., Peterson, Z.N.: Valuing security by getting [d0x3d!]: experiences with a network security board game. Presented as Part of the 6th Workshop on Cyber Security Experimentation and Test (2013).
  8. 8.
    Grigg, D.W.: Cyber-aggression: definition and concept of cyberbullying. Aust. J. Guid. Couns. 20(2), 143–156 (2010)CrossRefGoogle Scholar
  9. 9.
    Gustafsson, A., Katzeff, C., Bang, M.: Evaluation of a pervasive game for domestic energy engagement among teenagers. Comput. Entertain. (CIE) 7(4) (2009)Google Scholar
  10. 10.
    Irvine, C.E., Thompson, M.: Teaching objectives of a simulation game for computer security. In: Proceedings of the Informing Science and Information Technology Joint Conference (2003)Google Scholar
  11. 11.
    Jin, G., Tu, M., Kim, T.H., Heffron, J., White, J.: Game based cybersecurity training for high school students. In: Proceedings of the 49th ACM Technical Symposium on Computer Science Education, pp. 68–73 (2018)Google Scholar
  12. 12.
    Yasin, A., Liu, L., Li, T., Wang, J., Zowghi, D.: Design and preliminary evaluation of a cyber security requirements education game (SREG). Inf. Softw. Technol. 95, 179–200 (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Yoshiyuki Kido
    • 1
    • 2
    Email author
  • Nelson Pinto Tou
    • 2
  • Naoto Yanai
    • 2
  • Shinji Shimojo
    • 1
    • 2
  1. 1.Cybermedia CenterOsaka UniversityIbaraki-shiJapan
  2. 2.Graduate School of Information Science and TechnologyOsaka UniversitySuita-shiJapan

Personalised recommendations