Web Content Display Web Content Display

Movies
The CyberCIEGE game includes tutorial movies that illustrate information assurance concepts explored by the game.  These tutorial movies are listed below.  These tutorial movies require a Flash plug-in.

Movies of sample game play can be seen via this link.

In addition to the links below, all tutorial movies are available in the CyberCIEGE game Encyclopedia, under "Tutorials and Movies".  And after installing the game or the evaluation version of the game, they can be found in Cyberciege\game\exec\Movies

Introduction Movie (3:40) - What is the role of an Information Security Decision Maker?
 
movie icon  (Subtitled version: http://www.cisr.us/cyberciege/downloads/cc_intro_fl.mov -- requires Quicktime)

Movie 1: The Information Security Policy (7:47)- How do you know if a system is secure?
 
movie icon

Movie 2: Malicious Software (6:10)- What are your enemies capable of?
movie icon

Movie 3: Assurance (3:55)- How can we have confidence in the protection mechanism?
movie icon

Movie 4: Firewalls (4:00)- What is the use of firewalls, intrusion detection and antivirus products?
 movie icon

Movie 5: Filters (2:10)- How do we deploy network filters to limit network traffic?
 movie icon

Movie 6: Multilevel Components (4:03)- What is a multilevel component?
 movie icon

Movie 7: Encryption (5:16)- Introduction to using cryptography to protect network communication.
 movie icon

Movie 8: Symmetric & Public Key Cryptography (2:16)- Encryption for confidentiality.
 movie icon

Movie 9: Network Authentication Through Cryptography (4:10) - Identifying the source of data.
movie icon

Movie 10: Public Key Infrastructure (12:45) - Use and limitations of PKI.
movie icon

Movie 11: Patch Management (3:50) - Software contains flaws your enemy can exploit.  What can you do?
movie icon

Movie12: CyberCIEGE PKI Installed Roots (3:20) - What are PKI "installed roots", why are they important, and how do you manage them in CyberCIEGE?
movie icon

Movie13: CyberCIEGE VPN Connection Profiles (3:32) - Deciding who we are willing to communicate with, and the protection we want for that communication.

movie icon