Update and add index

This commit is contained in:
Jonas Zeunert
2024-04-23 15:17:38 +02:00
parent 4d0cd768f7
commit 8d4db5d359
726 changed files with 41721 additions and 53949 deletions

View File

@@ -1,4 +1,4 @@
 Awesome Security Card Games !Awesome (https://awesome.re/badge.svg) (https://github.com/sindresorhus/awesome)
 Awesome Security Card Games !Awesome (https://awesome.re/badge.svg) (https://github.com/sindresorhus/awesome)
▐ A curated list of security card games (which are sometimes known as tabletop exercises).
@@ -15,8 +15,8 @@
Application Security
- Cornucopia (https://www.owasp.org/index.php/OWASP_Cornucopia) - A card game based on OWASP's Top 10 (authentication, data Validation etc.). The card deck 
(https://www.owasp.org/images/7/71/Owasp-cornucopia-ecommerce_website.pdf) is available as PDF from OWASP.
- Cornucopia (https://www.owasp.org/index.php/OWASP_Cornucopia) - A card game based on OWASP's Top 10 (authentication, data Validation etc.). The card deck (https://www.owasp.org/images/7/71/Owasp-cornucopia-ecommerce_website.pdf) is 
available as PDF from OWASP.
Cryptography
@@ -25,33 +25,29 @@
Data Privacy
- Know your risks (https://aca.edu.au/resources/cyber-sharing-cards/) - Learn what information is safe to share online and understand the risks. Learn about whether to share, not share or be 
cautious with different pieces of information.
- Know your risks (https://aca.edu.au/resources/cyber-sharing-cards/) - Learn what information is safe to share online and understand the risks. Learn about whether to share, not share or be cautious with different pieces of 
information.
Incident Response
- Backdoors & Breaches (https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/) - An incident response card game. It helps you conduct incident response tabletop exercises and learn
attack tactics, tools, and methods.
- Defensomania (https://github.com/Karneades/Defensomania) - An incident response card game for security monitoring and incident response teams to discuss priorities, possible response 
actions and attack scenarios.
- Backdoors & Breaches (https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/) - An incident response card game. It helps you conduct incident response tabletop exercises and learn attack tactics, tools, and methods.
- Defensomania (https://github.com/Karneades/Defensomania) - An incident response card game for security monitoring and incident response teams to discuss priorities, possible response actions and attack scenarios.
Threat Modeling
- Elevation of Privilege (EOP) by Microsoft (https://web.archive.org/web/20150312215303/http://www.microsoft.com/security/sdl/adopt/eop.aspx) - A card game based on Microsoft's threat 
modeling framework "STRIDE" (Spoofing, Tampering etc.). The card deck (https://www.microsoft.com/en-us/download/details.aspx?id=20303) is available as PDF from Microsoft. Adam Shostack, the 
author of EoP has also a git repo (https://github.com/adamshostack/eop/) for EoP.
- Security Cards (http://securitycards.cs.washington.edu/index.html) - A card game encouraging to think broadly and creatively about computer security threats. Four dimensions are covered: 
Human Impact, Adversary's Motivations, Adversary's Resources, Adversary's Methods.
- Cumulus (https://github.com/TNG/cumulus) - A threat modeling card game for the clouds which helps you find threats to your DevOps or cloud project and teaches developers a security oriented
mindset.
- Elevation of Privilege (EOP) by Microsoft (https://web.archive.org/web/20150312215303/http://www.microsoft.com/security/sdl/adopt/eop.aspx) - A card game based on Microsoft's threat modeling framework "STRIDE" (Spoofing, Tampering 
etc.). The card deck (https://www.microsoft.com/en-us/download/details.aspx?id=20303) is available as PDF from Microsoft. Adam Shostack, the author of EoP has also a git repo (https://github.com/adamshostack/eop/) for EoP.
- Security Cards (http://securitycards.cs.washington.edu/index.html) - A card game encouraging to think broadly and creatively about computer security threats. Four dimensions are covered: Human Impact, Adversary's Motivations, 
Adversary's Resources, Adversary's Methods.
- Cumulus (https://github.com/TNG/cumulus) - A threat modeling card game for the clouds which helps you find threats to your DevOps or cloud project and teaches developers a security oriented mindset.
Various Resources
- Tabletop Security Games & Cards (https://adam.shostack.org/games.html) - List of security card games created and maintained by Adam Shostack.
- Tabletop Simulations to Improve Your Information Security Program (https://redcanary.com/blog/using-tabletop-simulations-to-improve-information-security/) - Red Canary's write-up about 
tabletop exercises for information security programs.
- Game On: Tabletop Games to Teach Cyber and Information Security Concepts (https://www.linkedin.com/pulse/game-tabletop-games-teach-cyber-information-security-mike-mcgannon) - List of 
tabletop games to teach cyber and information security concepts.
- Tabletop Simulations to Improve Your Information Security Program (https://redcanary.com/blog/using-tabletop-simulations-to-improve-information-security/) - Red Canary's write-up about tabletop exercises for information security 
programs.
- Game On: Tabletop Games to Teach Cyber and Information Security Concepts (https://www.linkedin.com/pulse/game-tabletop-games-teach-cyber-information-security-mike-mcgannon) - List of tabletop games to teach cyber and information 
security concepts.
Contributing