In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Derezzed Inc. (dba ThreatGEN) is an American small business located in Houston, Texas, currently specializing in emerging technology applications, engaged in network security (industrial control security) training, industrial control security service consulting and industrial control security threat monitoring solutions. In the network security (industrial control security) training service, the company uses advanced computer game engine to build a network security (industrial control security) training platform, which is based on game rules and combines a series of industrial control security training courses TGICS101, TGICS201 and TGICS301 to carry out industrial control security training. Among other service solutions, industrial control safety service consulting and industrial control safety threat monitoring are implemented based on the experience of the company's senior industrial control safety experts, and the founding team members have written the book "* exposure-Industrial Control system". At present, a new industrial control safety book is being prepared, and the industrial control safety experts have profound practical experience in industrial control safety. The company has been founded for a long time, and the company's products and technology direction are constantly changing with the development of this latest technology. Compared with the field of industrial control security, the company is a newcomer. In terms of technological innovation, it adopts the most popular network security gamification and artificial intelligence training mode to build network security (industrial control security) training courses and systems.
Derezzed Inc. The industrial control safety training platform has gone through several product exploration stages. at the beginning of the transformation of the industrial control safety field, the company once appeared in the industrial control safety field in the way of AR industrial network shooting range, that is, through 3D modeling / rendering, physical process modeling and simulation combined with AR technology to realize the simulation and visualization of industrial control system and physical environment. By means of * From the perspective of the development of human-computer interaction, the company applies the simulation products through AR, a human-computer interaction technology, which improves the visualization and immersive experience in the process of network security. In this product, it mainly focuses on the construction of industrial system simulation and AR interaction.
Because it is only a means of simulation and presentation, the actual landing and application scene of the product need to be optimized. The initial application scenario explored by the company is industrial control safety training. In the current market, enterprises or organizations are faced with a security governance problem, that is, whether enterprises or organizations will be subject to *, but when. The major information security manufacturers have established omni-directional security protection products and technical systems for the security governance problems of various enterprises and organizations, but they are far from solving the problems, and it is also necessary for enterprises or organizations to establish a network security team. the team should be familiar with these security products and technology systems and have the ability to deal with information security threats. Therefore, the safety training market should be the same market scale as the safety product market, with better market economic benefits. So in the second generation product launch, the company's AR industrial network shooting range has landed the practical application scene-industrial control safety training. In the application process of industrial control safety training, the simulation built by AR industrial network shooting range and the visual display scene of AR are used to import the experimental operation instruction manual and specific preset loopholes and * paths to achieve * operation training, in addition, including on-site classroom training, self-paced online learning, training video, knowledge base, etc. to complete the iterative optimization of the second generation products and put them into the market.
In the recently launched third-generation product, Derezzed Inc. Combined with the trend of computer gaming network security training, the computer game engine-driven simulation technology is used to make the training course scene, drama and game, so as to further enhance the rich interface of human-computer interaction. As we all know, games are currently interactive and immersive products. The combination of network security skills training and games is one of the more popular training simulation trends and technologies in the world. The technology trend emerged in the United States in 2017 and is mainly driven by the procurement needs of the US military. The game has a strong interest within the scope of the rules, and can guide today's young people to master the actual combat skills of network security based on gamification. The oldest games date back to board games. The origin of board games can be traced back to thousands of years ago, when go was invented in China and is considered to be the oldest board game that can still play a continuous role. Over time, various game tools have been used by commanders and staff to support military exercises. The predecessor of today's Maps environment (Defense Modeling and Simulation) was designed at the beginning of the 19th century. Originally, a board game based on China, created by Baron von Reisswitz in 1812 based on chess, was used to train the Prussian army. Later, his son LT Georg H.R.J. Von Reisswitz formulated a set of written rules for the military chess game in 1824 to make the game more consistent with the result. In the United States, based on the militarized procurement needs of network warfare and the mature theory of game-based military exercises, the theoretical system of training network security fighters based on game thinking was born, and named it "Serious Games". The term is used to identify games and game environments developed for purposes other than entertainment. Unlike military exercises, Serious Games's main focus is on supporting education and training. Based on this trend, the company's products combine the gamification mechanism in the third generation. The latest trend is that game-based network security training is the most perfect skill training method. Immersive gamification and simulation provide an attractive form of entertainment! Gamification and simulation expose students to interesting, fascinating storylines and environments, where they participate in narrative (usually competing with other students), practice skills and execution tools, and operate as they do in real life. Through the combination of gamification and immersive simulation environment, students are part of the game, and their operations have direct feedback and results, so they are more able to guide students to participate deeply. This can not only improve the knowledge retention rate, but also allow students to enjoy the process of the game during their study. Currently, in the United States, Serious Games has annual sales of $1.5 billion.
Derezzed Inc. The gamification security training platform, known as ThreatGEN ™Red vs. Blue, is the industry's first multiplayer strategy computer game, where players can compete with each other to control / maintain control of the computer network. This is not a fictional game application like the consumer game market. This is a training simulator based on the simulation of the on-site industrial control environment, players and players "gamification", which aims to teach network security skills in the immersive interactive application learning environment. In this online security game, there are many functions of traditional games, such as single-player versus computer AI (red team or blue team), 1-to-1 Internet and local popular multiplayer game challenges, cross-platform multiplayer games, beginner tutorials and so on. ThreatGEN:Red vs. Blue is a round-based strategy game, very similar to popular board games. "board" is not a world map, but made up of computer networks, where players compete for control. Players use "action cards" similar to transaction card games to select and submit actions. The computer network is not a virtual computer terminal, but a virtual machine based on real server hardware simulation and physical feedback of 3D modeling rendering. The computer game completely inherits the gamification design of the traditional game and integrates it into the content of network security skills training. I am looking forward to her listing, network security friends to play games! Learn in the game.
There are several versions of the product:
L Red vs. Blue
A version of the network security training game for individuals
L Red vs. Blue Corporate
For the enterprise network security training game version, provides customizable options and enterprise training programs
L Red vs. Blue CTF
Game version used to support CTF network security competition
L Red vs. Blue Tabletop
A version of the network security training game similar to the desktop chessboard.
L Red vs. Blue Instructor Led Training
Preview the screenshots of the next part of the game interface in advance:
A simulation factory based on 3D modeling and rendering, physical process modeling and simulation
Blue team operating interface
Red team operating interface
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.