Cyber security

Awesome Security Card Games – Mastering Cybersecurity Through Play

Security card games help train your skills and enable discussions for various areas of security. Mastering Cybersecurity Through Play,’ your essential guide to the innovative world of security card games.

These games aren’t just entertaining; they’re powerful tools designed to sharpen your skills and foster critical discussions across various domains of security.

From application security to threat modeling, we’ve curated a list of engaging card games that will transform your approach to cybersecurity training and awareness.

Contents

  • Application Security
  • Cryptography
  • Data Privacy
  • Incident Response
  • Threat Modeling
  • Various Resources

Application Security

  • Cornucopia – A card game based on OWASP’s Top 10 (authentication, data Validation etc.). The card deck is available as PDF from OWASP.

Cryptography

  • Crypto Go – An educational card game designed to teach up to date symmetric cryptography. Crypto Go deck consists of cards representing modern cryptographic tools.

Data Privacy

  • Know your risks – Learn what information is safe to share online and understand the risks. Learn about whether to share, not share or be cautious with different pieces of information.

Incident Response

  • Backdoors & Breaches – An incident response card game. It helps you conduct incident response tabletop exercises and learn attack tactics, tools, and methods.
  • Defensomania – An incident response card game for security monitoring and incident response teams to discuss priorities, possible response actions and attack scenarios.

Threat Modeling

  • Elevation of Privilege (EOP) by Microsoft – A card game based on Microsoft’s threat modeling framework “STRIDE” (Spoofing, Tampering etc.). The card deck is available as PDF from Microsoft. Adam Shostack, the author of EoP has also a git repo for EoP.
  • Security Cards – A card game encouraging to think broadly and creatively about computer security threats. Four dimensions are covered: Human Impact, Adversary’s Motivations, Adversary’s Resources, Adversary’s Methods.
  • Cumulus – A threat modeling card game for the clouds which helps you find threats to your DevOps or cloud project and teaches developers a security oriented mindset.

Various Resources

Varshini

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Kali Linux 2024.4 Released, What’s New?

Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…

2 days ago

Lifetime-Amsi-EtwPatch : Disabling PowerShell’s AMSI And ETW Protections

This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…

2 days ago

GPOHunter – Active Directory Group Policy Security Analyzer

GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…

4 days ago

2024 MITRE ATT&CK Evaluation Results – Cynet Became a Leader With 100% Detection & Protection

Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…

7 days ago

SecHub : Streamlining Security Across Software Development Lifecycles

The free and open-source security platform SecHub, provides a central API to test software with…

1 week ago

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don't worry if there are any bugs in the tool, we will try to fix…

1 week ago