Game On: Tabletop Games to Teach Cyber and Information Security Concepts

Game On: Tabletop Games to Teach Cyber and Information Security Concepts

Blackhat

Is a trick-taking game with a board to advance through. The cards and board are themed with solid security content, and the game could be used to drive conversations. Amazon, [BoardGameGeek description]

Control-Alt-Hack

Control-Alt-Hack™ is a tabletop card game about white hat hacking, based on game mechanics by gaming powerhouse Steve Jackson Games (Munchkin and GURPS) and developed by Tammy Denning, Yoshi Kohno and Adam Shostack. [BoardGameGeek description]

Crypto Go

Crypto Go is an educational card game designed to teach up to date symmetric cryptography. Crypto Go is designed to engage players with symmetric cryptography, and teach them about the correct usage and security level of symmetric tools. It makes players aware of the ephemeral nature of security levels and standards, and stimulates them to learn more about real-world cryptography.

Crypto Against Humanity - Crypto Against Humanity is a never ending game of Cards Against Humanity, where all participants compete to find the best matches. Crypto-economic primitives incentivize and reward card creation and curation.

Cyber Threat Defender

The Cyber Threat Defender (CTD) collectible card game is available for small, individual orders online and can be purchased as single packs/starter decks, a double deck (great for two players) and/or the Cyber Patriot Booster Pack.

Starter decks are designed to teach the essentials of cybersecurity information and feature 54 asset, defense, attack and event cards. Game play requires one card deck per player. Each booster pack features its own special Cyber Patriot card, plus 11 additional specialized cards to customize your starter deck. Please click the decks below to order your starter or booster pack today! Or you can visit the UTSA Bookstore Here to order your decks.

Defensomania - A incident response card game for security monitoring and incident response teams. It consists of over 150 cards, most of them are incident response activities and over 30 attack scenarios. Play your best incident response activity card against the given attack scenario.

Emergynt Risk

The Emergynt Risk Deck is a teaching and modeling tool developed by our RiskLabs Division to easily demonstrate the power of our scenario-analysis approach. Use it to speed up table-top exercises or illustrate the vast risk universe of your digitally-enabled organization to your executive leadership.

Enter The Spudnet

"A board game on cybersecurity and computer networking, We mashed potatoes (pun intended) and networking concepts into this cyber-fueled board game for ages 10 and up to learn about networking and cybersecurity concepts - all without computers! This board game is designed for 3-6 players and is perfect for gamers, parents and educators alike." Boardgame Geek page.

Hacker (Cyber Security Logic Game)

The players impersonate hackers fighting for the control of computer networks. It is based primarily on interlocking access to different computer systems in the web. Players are not set directly towards each other, and several players can share access to a system.

Hacker

  • "Can you outsmart cybercriminals? Defend the world from cybercriminals by joining the white hat hacker team Oblivion! Play the role of a coder, hacker, and security engineer in 40 beginner to expert challenges. Program your agents to collect data chips while avoiding viruses and alarms. As you discover how a hacker can damage your programs, you will learn how to secure them from future attacks! Each of the 40 challenges includes three phases of play for a total of 120 coding puzzles. Teaches: CONCURRENCY and SECURITY MINDSET" Thinkfun or Amazon. (Not to be confused with the 1992 Steve Jackson game of the same name.)

NetRunner

There are 2 versions of NetRunner, the original collectible card game published by Wizards of the Coast in 1996 and Android: NetRunner a card game published in 2012 by Fantasy Flight Games.

NetRunner depicts cyberspace combat between a global mega-corporation (the Corp) and a hacker (the Runner). The Corp aims to complete its secret agendas before the Runner can hack in and steal data. It isn't easy, though, as the Corp has strong defensive data forts protected by malevolent computer programs known as ICE (short for Intrusion Countermeasures Electronics). Runners must use special programs of their own, called icebreakers, to break through and steal the hidden plans. All this is paid for in the game by credits (representing currency), which are earned and spent during the course of play

OWASP Cornucopia

OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology agnostic.

The Security Cards

Created by Tamara Denning, Batya Friedman, and Tadayoshi Kohno of the University of Washington, "The Security Cards encourage you to think broadly and creatively about computer security threats. Explore with 42 cards along 4 dimensions (suits): Human impact, adversary motivation, adversary resources and adversary methods."

SECWEREWOLF

“SEC WEREWOLF” is a board game based on a famous party game “Werewolf” (also known as “Mafia”), which is a communication type game between a group of “villagers” and “werewolves” who attack villagers. Players probe other players in an attempt to find enemies to eliminate. In “SEC WEREWOLF”, “villagers” work as “CSIRT members” in an organization, while “werewolves” are the evils in the organization who are engaged in corruption.

Security Cards - A card game encouraging to think broadly and creatively about computer security threats. Explore with 42 cards along 4 dimensions (suits): Human Impact, Adversary's Motivations, Adversary's Resources, Adversary's Methods.

X-CODE

Mayday! The world’s computer networks are down, and you can only bring them back by entering a secret 12-digit code. But you can’t do it alone—tell the other players what you’re missing to complete your part of the code, then swap to collect the cards you need. But each card can only be passed in one direction, so you’ll need to work together in this frenetic game that requires good communication, strategy, a little luck, and lots of skill . . . and that’s only for the first level. There are 10 levels in all—they get more and more challenging in this game that is designed to bring people together.

#tabletopgames #securityawareness #securityeducation

Michael Lampe

CISO @ Kroll Bond Rating Agency | Cybersecurity Expert

2y

Elevation of Privilege and Backdoors and Breaches should be on this list!

Like
Reply

To view or add a comment, sign in

More articles by Mike M.

Explore content categories