56 lines
10 KiB
Plaintext
56 lines
10 KiB
Plaintext
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Security Card Games [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||
|
||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12mA curated list of security card games (which are sometimes known as tabletop exercises).[39m
|
||
|
||
[38;5;12mSecurity card games help train your skills and enable discussions for various areas of security.[39m
|
||
|
||
[38;2;255;187;0m[4mContents[0m
|
||
|
||
[38;5;12m- [39m[38;5;14m[1mApplication Security[0m[38;5;12m (#application-security)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mCryptography[0m[38;5;12m (#cryptography)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mData Privacy[0m[38;5;12m (#data-privacy)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mIncident Response[0m[38;5;12m (#incident-response)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mThreat Modeling[0m[38;5;12m (#threat-modeling)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mVarious Resources[0m[38;5;12m (#various-resources)[39m
|
||
|
||
[38;2;255;187;0m[4mApplication Security[0m
|
||
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCornucopia[0m[38;5;12m [39m[38;5;12m(https://cornucopia.owasp.org)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOWASP®[39m[38;5;12m [39m[38;5;12mCornucopia[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mmodeling[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mform[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcard[39m[38;5;12m [39m[38;5;12mgame[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12massist[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mdevelopment[39m[38;5;12m [39m[38;5;12mteams[39m[38;5;12m [39m[38;5;12midentify[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mrequirements[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mAgile,[39m[38;5;12m [39m[38;5;12mconventional[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mformal[39m[38;5;12m [39m[38;5;12mdevelopment[39m[38;5;12m [39m[38;5;12mprocesses.[39m[38;5;12m [39m[38;5;12mIt's[39m
|
||
[38;5;12mbased[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mOWASP's[39m[38;5;12m [39m[38;5;12mTop[39m[38;5;12m [39m[38;5;12m10,[39m[38;5;12m [39m[38;5;12mASVS/MASVS/MASTG,[39m[38;5;12m [39m[38;5;12mCAPEC[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mSAFECode.[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;14m[1mcard[0m[38;5;14m[1m [0m[38;5;14m[1mdecks[0m[38;5;12m [39m[38;5;12m([39m[38;5;14m[1mhttps://cornucopia.owasp.org/webshop))[0m[38;5;14m[1m [0m[38;5;14m[1mare[0m[38;5;14m[1m [0m[38;5;14m[1mavailable[0m[38;5;14m[1m [0m[38;5;14m[1mboth[0m[38;5;14m[1m [0m[38;5;14m[1mas[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mWebsite[0m[38;5;14m[1m [0m[38;5;14m[1mversion[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mMobile[0m[38;5;14m[1m [0m[38;5;14m[1mversion[0m[38;5;14m[1m [0m[38;5;14m[1mas[0m[38;5;14m[1m [0m[38;5;14m[1mphysical[0m[38;5;14m[1m [0m[38;5;14m[1mdecks[0m[38;5;14m[1m [0m[38;5;14m[1mthat[0m[38;5;14m[1m [0m[38;5;14m[1mcan[0m[38;5;14m[1m [0m[38;5;14m[1mbe[0m[38;5;14m[1m [0m[38;5;14m[1mbought[0m[38;5;14m[1m [0m[38;5;14m[1monline[0m[38;5;14m[1m [0m[38;5;14m[1mor[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mdigital[0m[38;5;14m[1m [0m[38;5;14m[1mformat[0m[38;5;14m[1m [0m
|
||
[38;5;14m[1mat[0m[38;5;14m[1m [0m[38;5;12mcopi.owasp.org[39m[38;5;14m[1m [0m[38;5;14m[1m(https://copi.owasp.org).[0m
|
||
|
||
[38;2;255;187;0m[4mCryptography[0m
|
||
|
||
[38;5;12m- [39m[38;5;14m[1mCrypto Go[0m[38;5;12m (https://www.cryptogogame.com/EN) - An educational card game designed to teach up to date [39m
|
||
[38;5;12m symmetric cryptography. Crypto Go deck consists of cards representing modern cryptographic tools.[39m
|
||
|
||
[38;2;255;187;0m[4mData Privacy[0m
|
||
|
||
[38;5;12m- [39m[38;5;14m[1mKnow your risks[0m[38;5;12m (https://aca.edu.au/resources/cyber-sharing-cards/) - Learn what information is safe to share online and understand the risks. Learn about whether to share, not share or be cautious with different pieces of information.[39m
|
||
|
||
[38;2;255;187;0m[4mIncident Response[0m
|
||
|
||
[38;5;12m- [39m[38;5;14m[1mBackdoors & Breaches[0m[38;5;12m (https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/) - An incident response card game. It helps you conduct incident response tabletop exercises and learn attack tactics, tools, and methods.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mDefensomania[0m[38;5;12m (https://github.com/Karneades/Defensomania) - An incident response card game for security monitoring and incident response teams to discuss priorities, possible response actions and attack scenarios.[39m
|
||
|
||
[38;2;255;187;0m[4mThreat Modeling[0m
|
||
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mElevation[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mPrivilege[0m[38;5;14m[1m [0m[38;5;14m[1m(EOP)[0m[38;5;14m[1m [0m[38;5;14m[1mby[0m[38;5;14m[1m [0m[38;5;14m[1mMicrosoft[0m[38;5;12m [39m[38;5;12m(https://web.archive.org/web/20150312215303/http://www.microsoft.com/security/sdl/adopt/eop.aspx)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcard[39m[38;5;12m [39m[38;5;12mgame[39m[38;5;12m [39m[38;5;12mbased[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mMicrosoft's[39m[38;5;12m [39m[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mmodeling[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12m"STRIDE"[39m[38;5;12m [39m[38;5;12m(Spoofing,[39m[38;5;12m [39m[38;5;12mTampering[39m[38;5;12m [39m[38;5;12metc.).[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m
|
||
[38;5;14m[1mcard[0m[38;5;14m[1m [0m[38;5;14m[1mdeck[0m[38;5;12m [39m[38;5;12m(https://www.microsoft.com/en-us/download/details.aspx?id=20303)[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mavailable[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mPDF[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mMicrosoft.[39m[38;5;12m [39m[38;5;12mAdam[39m[38;5;12m [39m[38;5;12mShostack,[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mauthor[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mEoP[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12malso[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;14m[1mgit[0m[38;5;14m[1m [0m[38;5;14m[1mrepo[0m[38;5;12m [39m[38;5;12m(https://github.com/adamshostack/eop/)[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mEoP.[39m
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mCards[0m[38;5;12m [39m[38;5;12m(http://securitycards.cs.washington.edu/index.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcard[39m[38;5;12m [39m[38;5;12mgame[39m[38;5;12m [39m[38;5;12mencouraging[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthink[39m[38;5;12m [39m[38;5;12mbroadly[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcreatively[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mcomputer[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mthreats.[39m[38;5;12m [39m[38;5;12mFour[39m[38;5;12m [39m[38;5;12mdimensions[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mcovered:[39m[38;5;12m [39m[38;5;12mHuman[39m[38;5;12m [39m[38;5;12mImpact,[39m[38;5;12m [39m[38;5;12mAdversary's[39m[38;5;12m [39m[38;5;12mMotivations,[39m[38;5;12m [39m[38;5;12mAdversary's[39m[38;5;12m [39m
|
||
[38;5;12mResources,[39m[38;5;12m [39m[38;5;12mAdversary's[39m[38;5;12m [39m[38;5;12mMethods.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mCumulus[0m[38;5;12m (https://github.com/TNG/cumulus) - A threat modeling card game for the clouds which helps you find threats to your DevOps or cloud project and teaches developers a security oriented mindset.[39m
|
||
|
||
[38;2;255;187;0m[4mVarious Resources[0m
|
||
|
||
[38;5;12m- [39m[38;5;14m[1mTabletop Security Games & Cards[0m[38;5;12m (https://adam.shostack.org/games.html) - List of security card games created and maintained by Adam Shostack.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mTabletop Simulations to Improve Your Information Security Program[0m[38;5;12m (https://redcanary.com/blog/using-tabletop-simulations-to-improve-information-security/) - Red Canary's write-up about tabletop exercises for information security programs.[39m
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGame[0m[38;5;14m[1m [0m[38;5;14m[1mOn:[0m[38;5;14m[1m [0m[38;5;14m[1mTabletop[0m[38;5;14m[1m [0m[38;5;14m[1mGames[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mTeach[0m[38;5;14m[1m [0m[38;5;14m[1mCyber[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mInformation[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mConcepts[0m[38;5;12m [39m[38;5;12m(https://www.linkedin.com/pulse/game-tabletop-games-teach-cyber-information-security-mike-mcgannon)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mList[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtabletop[39m[38;5;12m [39m[38;5;12mgames[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mteach[39m[38;5;12m [39m[38;5;12mcyber[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m
|
||
[38;5;12mconcepts.[39m
|
||
|
||
[38;2;255;187;0m[4mContributing[0m
|
||
|
||
[38;5;12mContributions welcome! Read the [39m[38;5;14m[1mcontribution guidelines[0m[38;5;12m (CONTRIBUTING.md) first.[39m
|
||
|
||
[38;5;12msecuritycardgames Github: https://github.com/Karneades/awesome-security-card-games[39m
|