gamifying security awareness [german]
Embed Size (px)
TRANSCRIPT
![Page 1: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/1.jpg)
Jürgen Grieshofer Managing Director, Co-FounderAWARITY – The Human Firewall
Gamifying Security
Awareness
![Page 2: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/2.jpg)
![Page 3: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/3.jpg)
3
Phishing / Spear-Phishing
© https://de.wikipedia.org/wiki/Phishing#/media/File:Phishing_Stadtsparkasse_München.png
![Page 4: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/4.jpg)
4© https://commons.wikimedia.org/wiki/File:No_tailgating_sign_-_Apple.jpg
Organisatorische Sicherheit
![Page 5: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/5.jpg)
5
Unachtsamkeit / Ignoranz
© https://www.pinterest.com/pin/295267319291607211/
![Page 6: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/6.jpg)
6
Begünstigende Umstände
© KPMG e-crime Studie 2015
![Page 7: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/7.jpg)
7
Menschen sind Protokolldroiden
Bild: © Roger Schultz | https://www.flickr.com/photos/elaws/3773702375/
![Page 8: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/8.jpg)
8
Konditionierung
![Page 9: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/9.jpg)
9
Max Weber
Affektuelles Handeln Gefühlslage, Emotionen, Reize
Traditionelles Handeln gelebte Gewohnheit
Wertrationales Handeln aus Überzeugung, ohne Folgen zu bewerten
Zweckrationales Handeln Subjektiv bestmögliche Lösung
![Page 10: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/10.jpg)
10
Konditionierung
© https://commons.wikimedia.org/wiki/File:Pavlov's_dog.svg
![Page 11: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/11.jpg)
11
Verstärker
© https://commons.wikimedia.org/wiki/File:Dynamische_Darstellung_der_Bedürfnishierarchie_nach_Maslow.svg
![Page 12: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/12.jpg)
12
Bewusstsein schärfen
© Roger Deetz | https://www.flickr.com/photos/rdeetz/10566972
![Page 13: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/13.jpg)
13
Klassisches Lernen
© Calimero | http://www.wallpaperup.com/243512/Star_Wars_death_classroom_blackboards_artwork_chalk_Storm_Trooper.html
![Page 14: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/14.jpg)
14
„Neues“ Paradigma
© Guest | http://www.wallpaperup.com/61235/Star_Wars_Obi-Wan_Kenobi_Revenge_of_the_Sith_Commander_Cody.html
![Page 15: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/15.jpg)
15
Gamification / Serious Gaming
BildungBewusstsein
Gamification Anwendung
![Page 16: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/16.jpg)
16
Typ. Elemente
Rangliste System Interaktion Transparenz Story Soziale Interaktionen Goodies
![Page 17: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/17.jpg)
17
Im Freundeskreis
© https://upload.wikimedia.org/wikipedia/commons/3/3b/Windows_9X_BSOD.png
![Page 18: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/18.jpg)
18
Im Unternehmen
Hemmend Fördernd
Spaß & Spielflow
Produktivität
Kooperation
Denunzierung
Destruktive Handlungen
![Page 19: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/19.jpg)
19
Grundausbildung abgeschlossen – nun?
© W_Minshull | https://www.flickr.com/photos/[email protected]/5506637899
![Page 20: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/20.jpg)
20
Nutzen
© https://de.wikipedia.org/wiki/Datei:Ids_funk.gif && W_Minshull | https://www.flickr.com/photos/[email protected]/6032572260
X( + )IDS / IPS
![Page 21: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/21.jpg)
21© Awarity Training Solutions GmbH
Beispiel Vulnerability
![Page 22: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/22.jpg)
22© Awarity Training Solutions GmbH
Beispielauswertung
![Page 23: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/23.jpg)
23
Fazit
• Spaß • Motivation• Persönlicher Nutzen
• Messbarkeit• Sicherheit
![Page 24: Gamifying Security Awareness [german]](https://reader033.vdocuments.net/reader033/viewer/2022061419/589fbec01a28ab91398b4a85/html5/thumbnails/24.jpg)
24