100%(4)4 out of 4 people found this document helpful
This preview shows page 1 - 2 out of 3 pages.
1. Gamification, the application of game design techniques to real-world problems, will play a far more important role in Information Security education in the coming years. Because capture the flag games and other InfoSec challenges provide excellent vehicles for building skills and identifying talented personnel across a wide range of skill levels, competitions will proliferate in 2012, with new, engaging challenges filling the calendar to run on a near continual basis. Although it is by no means a new phenomenon, with airline and hotel rewards programs benefiting from its ideas for decades, its use in the classroom in only just beginning to be explored. The field of Information Security education is uniquely positioned to explore these possibilities and act as an incubator of ideas for gamifying education.2. The "Post Post PC era" or the "Internet of Devices": Up to now, the proliferation of these devices was limited to specialized networks and environments. However, in particular the advent of IPv6, and the continuation of Moore's law to deliver cheaper and more powerful devices, will make it mucheasier to deploy devices ubiquitously. We already see a surge in internet controlled home automation and alarm systems. Cars with not one but several IP addresses, sub $50 "servers" as implemented in the Raspberry Pi project and projects like Androino to deliver sensory and control capabilities to the masses.3. Thinking Beyond the Public Cloud: The use of cloud computing promises better computing resource utilization by centralizing computing capability and arranging them in multi tenant facilities. However, much of the world's computing resources are still unused in desktops, laptops and mobile devices. Some of the original cloud computing approaches used clients installed on these systems to harness spare CPU cycles. While this approach has been widely overlooked in recent cloud approaches, it is bound to resurge and become a part of future cloud aware operating systems.