Security configuration analytics using video games | IEEE Conference Publication | IEEE Xplore