55 lines
9.8 KiB
Plaintext
55 lines
9.8 KiB
Plaintext
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Security Card Games [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||
|
||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12mA curated list of security card games (which are sometimes known as tabletop exercises).[39m
|
||
|
||
[38;5;12mSecurity card games help train your skills and enable discussions for various areas of security.[39m
|
||
|
||
[38;2;255;187;0m[4mContents[0m
|
||
|
||
[38;5;12m- [39m[38;5;14m[1mApplication Security[0m[38;5;12m (#application-security)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mCryptography[0m[38;5;12m (#cryptography)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mData Privacy[0m[38;5;12m (#data-privacy)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mIncident Response[0m[38;5;12m (#incident-response)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mThreat Modeling[0m[38;5;12m (#threat-modeling)[39m
|
||
[38;5;12m- [39m[38;5;14m[1mVarious Resources[0m[38;5;12m (#various-resources)[39m
|
||
|
||
[38;2;255;187;0m[4mApplication Security[0m
|
||
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCornucopia[0m[38;5;12m [39m[38;5;12m(https://www.owasp.org/index.php/OWASP_Cornucopia)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcard[39m[38;5;12m [39m[38;5;12mgame[39m[38;5;12m [39m[38;5;12mbased[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mOWASP's[39m[38;5;12m [39m[38;5;12mTop[39m[38;5;12m [39m[38;5;12m10[39m[38;5;12m [39m[38;5;12m(authentication,[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mValidation[39m[38;5;12m [39m[38;5;12metc.).[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;14m[1mcard[0m[38;5;14m[1m [0m[38;5;14m[1mdeck[0m[38;5;12m [39m[38;5;12m(https://www.owasp.org/images/7/71/Owasp-cornucopia-ecommerce_website.pdf)[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m
|
||
[38;5;12mavailable[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mPDF[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mOWASP.[39m
|
||
|
||
[38;2;255;187;0m[4mCryptography[0m
|
||
|
||
[38;5;12m- [39m[38;5;14m[1mCrypto Go[0m[38;5;12m (https://www.cryptogogame.com/EN) - An educational card game designed to teach up to date [39m
|
||
[38;5;12m symmetric cryptography. Crypto Go deck consists of cards representing modern cryptographic tools.[39m
|
||
|
||
[38;2;255;187;0m[4mData Privacy[0m
|
||
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mKnow[0m[38;5;14m[1m [0m[38;5;14m[1myour[0m[38;5;14m[1m [0m[38;5;14m[1mrisks[0m[38;5;12m [39m[38;5;12m(https://aca.edu.au/resources/cyber-sharing-cards/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mLearn[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12msafe[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mshare[39m[38;5;12m [39m[38;5;12monline[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12munderstand[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mrisks.[39m[38;5;12m [39m[38;5;12mLearn[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mwhether[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mshare,[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12mshare[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mcautious[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mdifferent[39m[38;5;12m [39m[38;5;12mpieces[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m
|
||
[38;5;12minformation.[39m
|
||
|
||
[38;2;255;187;0m[4mIncident Response[0m
|
||
|
||
[38;5;12m- [39m[38;5;14m[1mBackdoors & Breaches[0m[38;5;12m (https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/) - An incident response card game. It helps you conduct incident response tabletop exercises and learn attack tactics, tools, and methods.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mDefensomania[0m[38;5;12m (https://github.com/Karneades/Defensomania) - An incident response card game for security monitoring and incident response teams to discuss priorities, possible response actions and attack scenarios.[39m
|
||
|
||
[38;2;255;187;0m[4mThreat Modeling[0m
|
||
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mElevation[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mPrivilege[0m[38;5;14m[1m [0m[38;5;14m[1m(EOP)[0m[38;5;14m[1m [0m[38;5;14m[1mby[0m[38;5;14m[1m [0m[38;5;14m[1mMicrosoft[0m[38;5;12m [39m[38;5;12m(https://web.archive.org/web/20150312215303/http://www.microsoft.com/security/sdl/adopt/eop.aspx)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcard[39m[38;5;12m [39m[38;5;12mgame[39m[38;5;12m [39m[38;5;12mbased[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mMicrosoft's[39m[38;5;12m [39m[38;5;12mthreat[39m[38;5;12m [39m[38;5;12mmodeling[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12m"STRIDE"[39m[38;5;12m [39m[38;5;12m(Spoofing,[39m[38;5;12m [39m[38;5;12mTampering[39m[38;5;12m [39m
|
||
[38;5;12metc.).[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;14m[1mcard[0m[38;5;14m[1m [0m[38;5;14m[1mdeck[0m[38;5;12m [39m[38;5;12m(https://www.microsoft.com/en-us/download/details.aspx?id=20303)[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mavailable[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mPDF[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mMicrosoft.[39m[38;5;12m [39m[38;5;12mAdam[39m[38;5;12m [39m[38;5;12mShostack,[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mauthor[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mEoP[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12malso[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;14m[1mgit[0m[38;5;14m[1m [0m[38;5;14m[1mrepo[0m[38;5;12m [39m[38;5;12m(https://github.com/adamshostack/eop/)[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mEoP.[39m
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mCards[0m[38;5;12m [39m[38;5;12m(http://securitycards.cs.washington.edu/index.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcard[39m[38;5;12m [39m[38;5;12mgame[39m[38;5;12m [39m[38;5;12mencouraging[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthink[39m[38;5;12m [39m[38;5;12mbroadly[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcreatively[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mcomputer[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mthreats.[39m[38;5;12m [39m[38;5;12mFour[39m[38;5;12m [39m[38;5;12mdimensions[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mcovered:[39m[38;5;12m [39m[38;5;12mHuman[39m[38;5;12m [39m[38;5;12mImpact,[39m[38;5;12m [39m[38;5;12mAdversary's[39m[38;5;12m [39m[38;5;12mMotivations,[39m[38;5;12m [39m
|
||
[38;5;12mAdversary's[39m[38;5;12m [39m[38;5;12mResources,[39m[38;5;12m [39m[38;5;12mAdversary's[39m[38;5;12m [39m[38;5;12mMethods.[39m
|
||
[38;5;12m- [39m[38;5;14m[1mCumulus[0m[38;5;12m (https://github.com/TNG/cumulus) - A threat modeling card game for the clouds which helps you find threats to your DevOps or cloud project and teaches developers a security oriented mindset.[39m
|
||
|
||
[38;2;255;187;0m[4mVarious Resources[0m
|
||
|
||
[38;5;12m- [39m[38;5;14m[1mTabletop Security Games & Cards[0m[38;5;12m (https://adam.shostack.org/games.html) - List of security card games created and maintained by Adam Shostack.[39m
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mTabletop[0m[38;5;14m[1m [0m[38;5;14m[1mSimulations[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mImprove[0m[38;5;14m[1m [0m[38;5;14m[1mYour[0m[38;5;14m[1m [0m[38;5;14m[1mInformation[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mProgram[0m[38;5;12m [39m[38;5;12m(https://redcanary.com/blog/using-tabletop-simulations-to-improve-information-security/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mRed[39m[38;5;12m [39m[38;5;12mCanary's[39m[38;5;12m [39m[38;5;12mwrite-up[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mtabletop[39m[38;5;12m [39m[38;5;12mexercises[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m
|
||
[38;5;12mprograms.[39m
|
||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mGame[0m[38;5;14m[1m [0m[38;5;14m[1mOn:[0m[38;5;14m[1m [0m[38;5;14m[1mTabletop[0m[38;5;14m[1m [0m[38;5;14m[1mGames[0m[38;5;14m[1m [0m[38;5;14m[1mto[0m[38;5;14m[1m [0m[38;5;14m[1mTeach[0m[38;5;14m[1m [0m[38;5;14m[1mCyber[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mInformation[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mConcepts[0m[38;5;12m [39m[38;5;12m(https://www.linkedin.com/pulse/game-tabletop-games-teach-cyber-information-security-mike-mcgannon)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mList[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtabletop[39m[38;5;12m [39m[38;5;12mgames[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mteach[39m[38;5;12m [39m[38;5;12mcyber[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m
|
||
[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mconcepts.[39m
|
||
|
||
[38;2;255;187;0m[4mContributing[0m
|
||
|
||
[38;5;12mContributions welcome! Read the [39m[38;5;14m[1mcontribution guidelines[0m[38;5;12m (CONTRIBUTING.md) first.[39m
|