Video Games and Hacking??{2}


by Taylor G
Summary:

So the article I read about talks about bridging the gap between video games and computer security.  They talk about how they can use video games to benefit the educational aspect of teaching.  For example in a security class a professor can’t upload a virus to the network and expect the students to be able to stop it without already compromising the security of the entire school and/or implying illegal actions.  Video games let the user react to a series of events and recognize the results within a certain time frame.  For example they created this game where the user, a fish, searches for food, but they must face sharks.  When the user slides over a worm it shows a website, and the user must determine if the website is safe or it is a phishing website.  This informs the user how to determine whether a website is valid or not.  There are also more advanced games for those who have a better knowledge of security and hacking.  One game has missions like being able to hack a bank, hank into a jail, crash the stock market, and you have to get out before you get caught.  The game has a plot that makes you feel like you have to get out because you have the world’s deadliest virus.

Reflection:

As a Computer Information Systems major, I am really interested in video games, and more specifically ‘hacking’.  Someday I would like to gain some knowledge on hacking without breaking any laws.  I would also like to be able to prevent hackers.  So the concept of hacking in games brings it to a different level, because the user no longer has to worry about the risk of breaking laws and/or getting caught.  I think that if these games were properly used and had the right concepts that they could be very beneficial to those of us who plan on getting into internet/network security, databases, etc.  Especially if you’re working on a system that could potentially carry very important data.

Guimaraes, M., Said, H., & Austin, R. (2012). Experience with video games for security. Journal of Computing Sciences in Colleges,27(3), 95-104. Retrieved from http://0-delivery.acm.org.opac.library.csupomona.edu/10.1145/2040000/2038793/p95-guimaraes.pdf?ip=134.71.59.187&acc=PUBLIC&CFID=54588798&CFTOKEN=83099072&__acm__=1321859040_76021f386b749eff03e44fd09144f80a