Skip to main content

CyberCentric: Increasing SME and Citizen Resilience Against Cyberattacks

  • Chapter
  • First Online:
Serious Games for Enhancing Law Enforcement Agencies

Part of the book series: Security Informatics and Law Enforcement ((SILE))

  • 661 Accesses

Abstract

This chapter showcases the realistic cybersecurity scenario simulation platform CyberCentric. The objective of CyberCentric is to reach out to small- and medium-sized enterprises (SMEs) in a number of defined areas to provide them with the capability to share information on cybersecurity-related issues and help them experience the impact of cyberattacks as well as means to mitigate against them. CyberCentric’s overall goal is to provide SMEs and citizens with protective knowledge to improve their cyber resilience. This chapter provides an overview of the game and its components from a user perspective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    CENTRIC is the Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research at Sheffield Hallam University, UK.

  2. 2.

    https://www.gov.uk/government/publications/cyber-essentials-scheme-overview

  3. 3.

    https://www.cyberstreetwise.com

  4. 4.

    https://cybersecuritymonth.eu

  5. 5.

    http://ec.europa.eu/dgs/home-affairs/e-library/documents/basic-documents/docs/eu_agenda_on_security_en.pdf

  6. 6.

    http://www.focusproject.eu/web/focus/wiki/-/wiki/ESG/European+Security+Model

  7. 7.

    EU Research COURAGE project. See Akhgar and Brewster (2016).

  8. 8.

    Botnets can be used to push other strains of malware, harvest users’ credentials, compromise their online bank or other accounts, exfiltrate confidential information or facilitate other crimes such as denial of service attacks, spam email campaigns or ransomware attacks. Often botnets can compromise many thousands of computers. For example, GameOver Zeus had over 326,000 victims globally (cp. goz.shadowserver.org/stats/), and Conficker – a piece of malware known since 2008 – still has over 600,000 infections globally (cp. https://www.grahamcluley.com/2015/12/seven-years-conficker-worm-dead-dominating/; http://www.shadowserver.org/wiki /pmwiki.php/Stats/Conficker). Crime of this scale requires a paradigm shift in approach for law enforcement globally.

  9. 9.

    http://ec.europa.eu/COMMFrontOffice/PublicOpinion/index.cfm/Survey/getSurveyDetail/instruments/SPECIAL/surveyKy/2019

References

  • Akhgar, B., & Brewster, B. (Eds.). (2016). Combating cyber cime and cyber terrorism. Cham, Switzerland: Springer.

    Google Scholar 

  • Bayerl, P. S., & Jacobs, G. (2017). Evaluating the design and implementation of CP-support technologies: A participatory framework. In P. S. Bayerl, R. Karlovic, B. Akhgar, & G. Markarian (Eds.), Community policing - A European perspective (Advanced sciences and technologies for security applications) (pp. 247–267). Cham, Germany: Springer.

    Chapter  Google Scholar 

  • Dix, A. (2007). Designing for appropriation. Proceedings of the 21st British HCI Group Annual Conference on People and Computers (pp. 27–30).

    Google Scholar 

  • Eldridge, S., Lancaster, G., Campbell, M., Thabane, L., Hopewell, S., Coleman, C., et al. (2016). Defining feasibility and pilot studies in preparation for randomised controlled trials: Development of a conceptual framework. PloS one, 11(3), e0150205.

    Article  Google Scholar 

  • Sauer, J., Seibel, K., & Rüttinger, B. (2010). The influence of user expertise and prototype fidelity in usability tests. Applied Ergonomics, 41(1), 130–140.

    Article  Google Scholar 

  • Sauro, J. (2018). Do novices or experts uncover more usability issues? Available online: https://measuringu.com/novice-expert-issues/

  • Thabane, L., Ma, J., Chu, R., Cheng, J., Ismaila, A., Rios, L., et al. (2010). A tutorial on pilot studies: The what, why and how. BMC Medical Research Methodology, 10(1), 1–10.

    Article  Google Scholar 

  • Van Teijlingen, E., & Hundley, V. (2001). The importance of pilot studies. Social Research Updates, 35. Available online: http://sru.soc.surrey.ac.uk/SRU35.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Babak Akhgar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Akhgar, B., Saunders, J., Hancock, P., Lyle, A., Newsham, D.S.S. (2019). CyberCentric: Increasing SME and Citizen Resilience Against Cyberattacks. In: Akhgar, B. (eds) Serious Games for Enhancing Law Enforcement Agencies. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-29926-2_12

Download citation

Publish with us

Policies and ethics