SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
“HACKED”
Antheia Konstantellou
Theodora Plexida
Danai Theofilopoulou
You Have Been
Hacked!
ØNumber of Players: 3-8
ØObjective: The players must work
together to find the notorious black
hacker that lurks in the board before
they strike with another cyber attack
causing irreparable damage. Through
challenges players obtain clues about
the hacker’s plans. The player who
identifies the black hacker first wins
the game.
“The atmosphere in the FBI conference room was
tense as the director rapidly informed the team of
expert secret agents on their next mission. A group
of cybercriminals had unleashed a cryptic message,
threatening to unleash chaos with a major hacking
event. The team knew that the cybercriminals were
black hat hackers, the kind that operated in the
shadows, using their advanced technological skills to
wreak havoc on the world and gain millions of
dollars. The director’s words hung heavy in the air,
as the team absorbed the gravity of the situation.
They had only one month to discover the identity of
the mastermind behind the attack, where they
would strike, and what their deathly plans were!”
The clock was ticking, and the agents knew
that they had to act fast. Before they left the
room, they were warned by the FBI director:
“The fate of the world is in your hands, and
failure is not an option. If you lose never
come back, you will no longer have a place
here!”
Characters
Places
Events
Questions
Board
To begin the game, all of the
tokens must be placed on the
starting point of the board.
There are three sets of cards:
20 simple questions (pink),
10 bonus questions (purple),
and 22 clues (blue).
The pink and purple cards must
be mixed together and then be set
aside. The blue cards which are
divided into three distinct
categories: characters, places, and
events are to be shuffled so the
players can then randomly take 1
card from each category and place
it into a folder.
This folder will containt 3
different clues about the hacker’s
plans: the character who did it,
the event, and the location it
occurred.
After those 3 cards are placed in
the folder the rest of the clue
cards have to be mixed together
in order to start the game.
Game
Setup
1. The first player rolls the dice and moves their token
on the board.
2. Each time you stop, you will be asked a question
card. Your left-hand player will give you the question
and all multiple choices (if you want to harden the game
you can choose not to reveal the choices).
Answering correctly, gives you the choice of taking an
evidence card from the blue deck or requesting one from
another players cards. In the case of a bonus question
you receive evidence from both the blue deck and
another player’s cards.
Answering incorrectly deprives you from getting clue
cards.
3. As you progress through the game, you will gather
evidence and formulate a hypothesis. Once you have a
solid theory of who the hacker is, where they will strike,
and how they will attack, you can only state your
hypothesis when your token is on the corresponding
country on the board.
This is where things get exciting! If you state your
hypothesis and it is correct, you win the game. If not,
you lose and reveal all your evidence.
“Example: I believe the hacker is Celine, she
will attack in India and the hackers will
infiltrate a major social media platform and
steal millions of users’ personal information.
They will blackmail them into committing
major crimes in order to reclaim their personal
information.”
Tip! Make sure to keep track of all clues that
are gathered in a piece of paper in order to not
make a false hypothesis.
Gameplay
Are you ready to find the hacker? Gather your
knowledge and let’s play!

Mais conteúdo relacionado

Semelhante a HACKED: A Cyber Security Board Game - Creative Project

Abandoning the Magic Circle
Abandoning the Magic CircleAbandoning the Magic Circle
Abandoning the Magic CircleDarryl Woodford
 
Micro Transaction, Gambling Features, And Virtual Currency In Chinese Online...
Micro Transaction, Gambling Features,  And Virtual Currency In Chinese Online...Micro Transaction, Gambling Features,  And Virtual Currency In Chinese Online...
Micro Transaction, Gambling Features, And Virtual Currency In Chinese Online...Zhan Ye
 
Yu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official RulebookYu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official RulebookHaris Setiawan
 
Rebel scrum prototype_1214
Rebel scrum prototype_1214Rebel scrum prototype_1214
Rebel scrum prototype_1214Shawn Neal
 
Game literacy and learning- Romanian team.pptx
Game literacy and learning- Romanian team.pptxGame literacy and learning- Romanian team.pptx
Game literacy and learning- Romanian team.pptxAgtaDanieloviov
 
LIND, Camilla Nimue- Defenceless characters in survivalhorror games
LIND, Camilla Nimue- Defenceless characters in survivalhorror gamesLIND, Camilla Nimue- Defenceless characters in survivalhorror games
LIND, Camilla Nimue- Defenceless characters in survivalhorror gamesCamilla Nimue Lind
 
Yu-gi-oh Official Rulebook
Yu-gi-oh Official RulebookYu-gi-oh Official Rulebook
Yu-gi-oh Official RulebookHaris Setiawan
 
NCompass Live: Critical Hit! Tabletop Gaming in the Library
NCompass Live: Critical Hit! Tabletop Gaming in the LibraryNCompass Live: Critical Hit! Tabletop Gaming in the Library
NCompass Live: Critical Hit! Tabletop Gaming in the LibraryNebraska Library Commission
 
Community of Friends Rule Book
Community of Friends Rule BookCommunity of Friends Rule Book
Community of Friends Rule BookCaroline Moore
 
Proposal for the interactive game
Proposal for the interactive gameProposal for the interactive game
Proposal for the interactive gameAndrew Downes
 
7 Tips for Surviving Hearthstone: Heroes of Warcraft
7 Tips for Surviving Hearthstone: Heroes of Warcraft 7 Tips for Surviving Hearthstone: Heroes of Warcraft
7 Tips for Surviving Hearthstone: Heroes of Warcraft Michael Street
 
Grell & Rau - Ingress In Adult Life - ECER2016
Grell & Rau - Ingress In Adult Life - ECER2016Grell & Rau - Ingress In Adult Life - ECER2016
Grell & Rau - Ingress In Adult Life - ECER2016Petra Grell
 
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2..."Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...Sherry Jones
 
Designing for Creativity and Kindness in Games
Designing for Creativity and Kindness in GamesDesigning for Creativity and Kindness in Games
Designing for Creativity and Kindness in GamesMirjam Eladhari
 
Locative Lab Tools A5
Locative Lab Tools A5Locative Lab Tools A5
Locative Lab Tools A5Ronald Lenz
 

Semelhante a HACKED: A Cyber Security Board Game - Creative Project (20)

Abandoning the Magic Circle
Abandoning the Magic CircleAbandoning the Magic Circle
Abandoning the Magic Circle
 
Micro Transaction, Gambling Features, And Virtual Currency In Chinese Online...
Micro Transaction, Gambling Features,  And Virtual Currency In Chinese Online...Micro Transaction, Gambling Features,  And Virtual Currency In Chinese Online...
Micro Transaction, Gambling Features, And Virtual Currency In Chinese Online...
 
Video Game Planning
Video Game PlanningVideo Game Planning
Video Game Planning
 
Milites Fabula
Milites FabulaMilites Fabula
Milites Fabula
 
Yu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official RulebookYu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official Rulebook
 
Rebel scrum prototype_1214
Rebel scrum prototype_1214Rebel scrum prototype_1214
Rebel scrum prototype_1214
 
Game literacy and learning- Romanian team.pptx
Game literacy and learning- Romanian team.pptxGame literacy and learning- Romanian team.pptx
Game literacy and learning- Romanian team.pptx
 
LIND, Camilla Nimue- Defenceless characters in survivalhorror games
LIND, Camilla Nimue- Defenceless characters in survivalhorror gamesLIND, Camilla Nimue- Defenceless characters in survivalhorror games
LIND, Camilla Nimue- Defenceless characters in survivalhorror games
 
Yu-gi-oh Official Rulebook
Yu-gi-oh Official RulebookYu-gi-oh Official Rulebook
Yu-gi-oh Official Rulebook
 
NCompass Live: Critical Hit! Tabletop Gaming in the Library
NCompass Live: Critical Hit! Tabletop Gaming in the LibraryNCompass Live: Critical Hit! Tabletop Gaming in the Library
NCompass Live: Critical Hit! Tabletop Gaming in the Library
 
Community of Friends Rule Book
Community of Friends Rule BookCommunity of Friends Rule Book
Community of Friends Rule Book
 
igrology_s
igrology_sigrology_s
igrology_s
 
Proposal for the interactive game
Proposal for the interactive gameProposal for the interactive game
Proposal for the interactive game
 
7 Tips for Surviving Hearthstone: Heroes of Warcraft
7 Tips for Surviving Hearthstone: Heroes of Warcraft 7 Tips for Surviving Hearthstone: Heroes of Warcraft
7 Tips for Surviving Hearthstone: Heroes of Warcraft
 
SOL III RULES
SOL III RULESSOL III RULES
SOL III RULES
 
Grell & Rau - Ingress In Adult Life - ECER2016
Grell & Rau - Ingress In Adult Life - ECER2016Grell & Rau - Ingress In Adult Life - ECER2016
Grell & Rau - Ingress In Adult Life - ECER2016
 
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2..."Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
 
Among us
Among usAmong us
Among us
 
Designing for Creativity and Kindness in Games
Designing for Creativity and Kindness in GamesDesigning for Creativity and Kindness in Games
Designing for Creativity and Kindness in Games
 
Locative Lab Tools A5
Locative Lab Tools A5Locative Lab Tools A5
Locative Lab Tools A5
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

HACKED: A Cyber Security Board Game - Creative Project

  • 2. You Have Been Hacked! ØNumber of Players: 3-8 ØObjective: The players must work together to find the notorious black hacker that lurks in the board before they strike with another cyber attack causing irreparable damage. Through challenges players obtain clues about the hacker’s plans. The player who identifies the black hacker first wins the game.
  • 3. “The atmosphere in the FBI conference room was tense as the director rapidly informed the team of expert secret agents on their next mission. A group of cybercriminals had unleashed a cryptic message, threatening to unleash chaos with a major hacking event. The team knew that the cybercriminals were black hat hackers, the kind that operated in the shadows, using their advanced technological skills to wreak havoc on the world and gain millions of dollars. The director’s words hung heavy in the air, as the team absorbed the gravity of the situation. They had only one month to discover the identity of the mastermind behind the attack, where they would strike, and what their deathly plans were!” The clock was ticking, and the agents knew that they had to act fast. Before they left the room, they were warned by the FBI director: “The fate of the world is in your hands, and failure is not an option. If you lose never come back, you will no longer have a place here!”
  • 8.
  • 10. To begin the game, all of the tokens must be placed on the starting point of the board. There are three sets of cards: 20 simple questions (pink), 10 bonus questions (purple), and 22 clues (blue). The pink and purple cards must be mixed together and then be set aside. The blue cards which are divided into three distinct categories: characters, places, and events are to be shuffled so the players can then randomly take 1 card from each category and place it into a folder. This folder will containt 3 different clues about the hacker’s plans: the character who did it, the event, and the location it occurred. After those 3 cards are placed in the folder the rest of the clue cards have to be mixed together in order to start the game. Game Setup
  • 11. 1. The first player rolls the dice and moves their token on the board. 2. Each time you stop, you will be asked a question card. Your left-hand player will give you the question and all multiple choices (if you want to harden the game you can choose not to reveal the choices). Answering correctly, gives you the choice of taking an evidence card from the blue deck or requesting one from another players cards. In the case of a bonus question you receive evidence from both the blue deck and another player’s cards. Answering incorrectly deprives you from getting clue cards. 3. As you progress through the game, you will gather evidence and formulate a hypothesis. Once you have a solid theory of who the hacker is, where they will strike, and how they will attack, you can only state your hypothesis when your token is on the corresponding country on the board. This is where things get exciting! If you state your hypothesis and it is correct, you win the game. If not, you lose and reveal all your evidence. “Example: I believe the hacker is Celine, she will attack in India and the hackers will infiltrate a major social media platform and steal millions of users’ personal information. They will blackmail them into committing major crimes in order to reclaim their personal information.” Tip! Make sure to keep track of all clues that are gathered in a piece of paper in order to not make a false hypothesis. Gameplay
  • 12. Are you ready to find the hacker? Gather your knowledge and let’s play!