Data Stream Defender Game Interface

Data Stream Defender.

p5.js • Tower Defense • Cybersecurity Education

* Disclaimer: This project is a generalized concept based on real-world scenarios. All proprietary data and branding have been removed or adapted.

Launch Simulation

Key Findings

This project proves the effectiveness of gamification in teaching cybersecurity strategy, visualizing the complex, layered nature of security for a foundational understanding.

The solution moves beyond passive learning by forcing the user to implement a Defense-in-Depth Layering Model in real-time. Success requires strategic alignment of security controls against specific threat vectors, demonstrating that failure is a direct, measurable consequence of poor strategic planning.

Architecturally, the reliance on p5.js and modular JavaScript ensures high-performance geometric rendering without latency. The project showcases an ability to convert abstract security concepts (like policy and threat mapping) into engaging, measurable behavioral practice that drives superior strategic decision-making.

The ADDIE Process

From analysis to deployment.

01. ANALYSIS (THE WHY)

Traditional cybersecurity training often relies on passive multiple-choice tests that fail to build strategic decision-making or demonstrate the functional concept of security layers.

  • TARGET AUDIENCE:
    Security Analysts, IT Administrators, and Developers learning foundational DiD principles.
  • PROBLEM:
    Static training cannot measure a learner's ability to strategically align defenses under pressure.
  • SOLUTION:
    A Tower Defense prototype where Node placement must correspond to the real-world vulnerability of the incoming Threat.

02. DESIGN (THE BLUEPRINT)

I designed a Cyberpunk Data Stream concept to teach DiD principles through visual strategic mapping over a data path.

  • INSTRUCTIONAL MAPPING:
    Defense Nodes (Firewall, IDS) map to Security Controls; Threats (Malware, Phishing) map to Attack Vectors.
  • MECHANIC:
    Success requires placing layered nodes (e.g., Firewall to slow a threat, allowing an IDS to fire).
  • MODEL:
    Teaches control-specific mitigation: Encryption mitigates Data Exfil, while Authentication mitigates Phishing.

03. DEVELOPMENT (THE BUILD)

Prototype built using modular JavaScript classes to manage complex game logic and showcase mastery of modern coding practices.

  • STACK:
    p5.js (Canvas) for high-performance game loop; JavaScript (ES6 Modules) for entity classes.
  • CORE LOGIC:
    Defense Nodes use complex targeting checks to mimic real-world control limitations and threat vectors.
  • VISUAL FEEDBACK:
    Transient VFX and pulsing fields communicate node activity instantly to reinforce learning.

04. IMPLEMENTATION (DELIVERY)

Features accessible instruction via in-game Instructional Pause System and is built for seamless LMS integration.

  • HOSTING:
    Deployed via GitHub Pages for instant public access and portfolio viewing.
  • LEARNING INTEGRATION:
    Instructional Pause System explains new threats and optimal Defense Strategy.
  • MODULARITY:
    Structure is ready for SCORM reporting across an enterprise LMS for score tracking.

05. EVALUATION (METRICS)

Success metrics validate the learner’s ability to apply DiD principles strategically, translating directly to educational effectiveness.

  • KPIs:
    Strategic Alignment Index (SAI) and Budget Efficiency.
  • FEEDBACK LOOP:
    Failure to stop a specific threat highlights the need to revisit the corresponding security control rationale immediately.

Let's Build Something.

Ready to discuss your next learning strategy? Drop me a line.