ABSTRACT

War gaming is one of the layers of the cyber physical systems that aims to simulate the real-time system and provide training to handle all known cyber security vulnerability attacks.

This chapter intends to provide an overview of war gaming in cyber physical systems, its history, design choices, implementation and importance. Security in cyber physical systems is a rapidly advancing necessity, with superior technological upgrades in the physical systems, equally advanced cyber-attacks, ever-growing patches and security fixes for the same, always trying to keep up with the attacks. In addition to being cognizant of the security updates and protocols in the globally networked systems, any company which is heavily involved in information technology and cyber physical systems must also continually train its employees on the in-house cyber security protocols and pipelines, in order to be ready for the defence. In addition to that, war gaming also provides facilities to kick-start discussions, which can lead to identifying any foreseeable future attacks and to formulate their defence strategies. The process includes gathering useful data, in order to equip the systems and human personnel, and to enable them to avert attacks and/or defend their company's systems, software, hardware, and, most crucially, their data. It is helpful to rely upon a formidable methodology, like war gaming, that has been implemented successfully in cyber physical systems of the USA government, for instance. War gaming acts as a foundation upon which professionals can learn in-depth about the existing security workflow and prepare countermeasures for any cyber security loopholes discovered.

Any industry, aiming to keep their products and services up to date with the latest cyber security protocols, should be well equipped and be ready to think outside the box, as well as along the edges of the box. War gaming aims to provide an experience that complements the existing training programme in an interactive and immersive manner, that empowers the professionals to be highly prepared in case of any cyber-attack on their systems.