A Serious Game-Based Peer-Instruction Digital Forensics Workshop
- 160 Downloads
Increasing threats in the area of information security raise the necessity for companies to be prepared for a digital forensic investigation. However, even the best investments in technology and infrastructure will fail if employees are not adequately trained. In this paper we propose a workshop concept combining the peer instruction method and elements from the field of serious games. The goal of the combined methods is to enable the participants to investigate a use case in an interactive and playful way. Our concept guides the participants step by step into an increasingly independent way of performing a digital forensic investigation.
KeywordsDigital Forensics Workshop Peer instruction Serious games Capture the Flag
This work is partly performed under the BMBF TRIO project which is supported by the German Federal Ministry of Education and Research. (https://www.innovative-hochschule.de/de/innovative-hochschulen/trio).
- 1.Meier, S.: Digitale Forensik in Unternehmen. Ph.D. thesis, University of Regensburg (2017)Google Scholar
- 7.Grobler, T., Louwrens, C.P., von Solms, S.H.: A framework to guide the implementation of proactive digital forensics in organisations. In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, Krakow, Poland, 15–18 February 2010, pp. 677–682. IEEE Computer Society (2010)Google Scholar
- 8.Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response. NIST Special Publication 10(14), 800–86 (2006)Google Scholar
- 10.Johnson, W.E., Luzader, A., Ahmed, I., Roussev, V., Richard III, G.G., Lee, C.B.: Development of peer instruction questions for cybersecurity education. In: 2016 USENIX Workshop on Advances in Security Education (ASE 2016). USENIX Association, Austin, TX (2016)Google Scholar
- 13.Cetto, A., et al.: Friend inspector: a serious game to enhance privacy awareness in social networks. CoRR abs/1402.5878 (2014)Google Scholar
- 14.Tokola, T.J., et al.: A collaborative cybersecurity education program. In: Cybersecurity Education for Awareness and Compliance, pp. 181–200. IGI Global (2019)Google Scholar
- 17.McDaniel, L., Talvi, E., Hay, B.: Capture the flag as cyber security introduction. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 5479–5486, January 2016Google Scholar