Cyber Defense (2024)
ag.gameitem.AGID:
Playtime: 60
Min. Age: 7
Number of Players:
2
ag.gameitem.publisher:
(Self-Published)
Designers:
Dusan Sidlo,
Benjamin Cheung
Artists:
Benjamin Cheung
Mechanics:
Card Play Conflict Resolution,
Area Majority / Influence,
Deduction
Beschreibung
The modern high-tech world is full of digital perils. The internet age has brought a cornucopia of knowledge and technological progress. However, we are prey to digital predators. Cyber Defense thematically explores concepts in cyber security. Modern computer systems are vulnerable to cyber attacks, and there is a constant vigil to keep computer systems safe against cyber attacks through cyber security measures. Common types of cyber attacks include Phishing, Man-in-the-middle and Distributed Denial of Service (DDOS) attacks. In Cyber Defense, one player plays as the Hacker who is trying to crack a password. The other player plays as the Defender trying to keep their password safe.
OBJECTIVE – The objective for the Hacker is to try to deduce the Defender’s password. The objective of the Defender is to try to protect his password.
GAME PLAY – Each turn, players develop battlegrounds, play card effects, and resolve battlegrounds. Winning battlegrounds allows the Hacker to try to deduce the Defender’s password. When the Defender wins battlegrounds, they can strengthen their password and reduce the effectiveness of Hacker attacks.
GAME END AND WINNING – The game ends after three rounds or if the Hacker has cracked the Defender’s password.
THEME – Cyber Security
—description from the designer
The modern high-tech world is full of digital perils. The internet age has brought a cornucopia of knowledge and technological progress. However, we are prey to digital predators. Cyber Defense thematically explores concepts in cyber security. Modern computer systems are vulnerable to cyber attacks, and there is a constant vigil to keep computer systems safe against cyber attacks through cyber security measures. Common types of cyber attacks include Phishing, Man-in-the-middle and Distributed Denial of Service (DDOS) attacks. In Cyber Defense, one player plays as the Hacker who is trying to crack a password. The other player plays as the Defender trying to keep their password safe.
OBJECTIVE – The objective for the Hacker is to try to deduce the Defender’s password. The objective of the Defender is to try to protect his password.
GAME PLAY – Each turn, players develop battlegrounds, play card effects, and resolve battlegrounds. Winning battlegrounds allows the Hacker to try to deduce the Defender’s password. When the Defender wins battlegrounds, they can strengthen their password and reduce the effectiveness of Hacker attacks.
GAME END AND WINNING – The game ends after three rounds or if the Hacker has cracked the Defender’s password.
THEME – Cyber Security
—description from the designer
Verwandte Spiele
ag.gameitem.lastUpdated: 2025-05-07 05:50:46.362