SlideShare a Scribd company logo
“HACKED”
Antheia Konstantellou
Theodora Plexida
Danai Theofilopoulou
You Have Been
Hacked!
ØNumber of Players: 3-8
ØObjective: The players must work
together to find the notorious black
hacker that lurks in the board before
they strike with another cyber attack
causing irreparable damage. Through
challenges players obtain clues about
the hacker’s plans. The player who
identifies the black hacker first wins
the game.
“The atmosphere in the FBI conference room was
tense as the director rapidly informed the team of
expert secret agents on their next mission. A group
of cybercriminals had unleashed a cryptic message,
threatening to unleash chaos with a major hacking
event. The team knew that the cybercriminals were
black hat hackers, the kind that operated in the
shadows, using their advanced technological skills to
wreak havoc on the world and gain millions of
dollars. The director’s words hung heavy in the air,
as the team absorbed the gravity of the situation.
They had only one month to discover the identity of
the mastermind behind the attack, where they
would strike, and what their deathly plans were!”
The clock was ticking, and the agents knew
that they had to act fast. Before they left the
room, they were warned by the FBI director:
“The fate of the world is in your hands, and
failure is not an option. If you lose never
come back, you will no longer have a place
here!”
Characters
Places
Events
Questions
Board
To begin the game, all of the
tokens must be placed on the
starting point of the board.
There are three sets of cards:
20 simple questions (pink),
10 bonus questions (purple),
and 22 clues (blue).
The pink and purple cards must
be mixed together and then be set
aside. The blue cards which are
divided into three distinct
categories: characters, places, and
events are to be shuffled so the
players can then randomly take 1
card from each category and place
it into a folder.
This folder will containt 3
different clues about the hacker’s
plans: the character who did it,
the event, and the location it
occurred.
After those 3 cards are placed in
the folder the rest of the clue
cards have to be mixed together
in order to start the game.
Game
Setup
1. The first player rolls the dice and moves their token
on the board.
2. Each time you stop, you will be asked a question
card. Your left-hand player will give you the question
and all multiple choices (if you want to harden the game
you can choose not to reveal the choices).
Answering correctly, gives you the choice of taking an
evidence card from the blue deck or requesting one from
another players cards. In the case of a bonus question
you receive evidence from both the blue deck and
another player’s cards.
Answering incorrectly deprives you from getting clue
cards.
3. As you progress through the game, you will gather
evidence and formulate a hypothesis. Once you have a
solid theory of who the hacker is, where they will strike,
and how they will attack, you can only state your
hypothesis when your token is on the corresponding
country on the board.
This is where things get exciting! If you state your
hypothesis and it is correct, you win the game. If not,
you lose and reveal all your evidence.
“Example: I believe the hacker is Celine, she
will attack in India and the hackers will
infiltrate a major social media platform and
steal millions of users’ personal information.
They will blackmail them into committing
major crimes in order to reclaim their personal
information.”
Tip! Make sure to keep track of all clues that
are gathered in a piece of paper in order to not
make a false hypothesis.
Gameplay
Are you ready to find the hacker? Gather your
knowledge and let’s play!

More Related Content

Similar to HACKED: A Cyber Security Board Game - Creative Project

Abandoning the Magic Circle
Abandoning the Magic CircleAbandoning the Magic Circle
Abandoning the Magic Circle
Darryl Woodford
 
Micro Transaction, Gambling Features, And Virtual Currency In Chinese Online...
Micro Transaction, Gambling Features,  And Virtual Currency In Chinese Online...Micro Transaction, Gambling Features,  And Virtual Currency In Chinese Online...
Micro Transaction, Gambling Features, And Virtual Currency In Chinese Online...
Zhan Ye
 
Video Game Planning
Video Game PlanningVideo Game Planning
Video Game Planning
Jesse Lapworth
 
Milites Fabula
Milites FabulaMilites Fabula
Milites Fabula
derrickbuckley13
 
Yu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official RulebookYu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official Rulebook
Haris Setiawan
 
Rebel scrum prototype_1214
Rebel scrum prototype_1214Rebel scrum prototype_1214
Rebel scrum prototype_1214
Shawn Neal
 
Game literacy and learning- Romanian team.pptx
Game literacy and learning- Romanian team.pptxGame literacy and learning- Romanian team.pptx
Game literacy and learning- Romanian team.pptx
AgtaDanieloviov
 
LIND, Camilla Nimue- Defenceless characters in survivalhorror games
LIND, Camilla Nimue- Defenceless characters in survivalhorror gamesLIND, Camilla Nimue- Defenceless characters in survivalhorror games
LIND, Camilla Nimue- Defenceless characters in survivalhorror games
Camilla Nimue Lind
 
Yu-gi-oh Official Rulebook
Yu-gi-oh Official RulebookYu-gi-oh Official Rulebook
Yu-gi-oh Official Rulebook
Haris Setiawan
 
NCompass Live: Critical Hit! Tabletop Gaming in the Library
NCompass Live: Critical Hit! Tabletop Gaming in the LibraryNCompass Live: Critical Hit! Tabletop Gaming in the Library
NCompass Live: Critical Hit! Tabletop Gaming in the Library
Nebraska Library Commission
 
Community of Friends Rule Book
Community of Friends Rule BookCommunity of Friends Rule Book
Community of Friends Rule Book
Caroline Moore
 
igrology_s
igrology_sigrology_s
igrology_s
Timofey Bokarev
 
Proposal for the interactive game
Proposal for the interactive gameProposal for the interactive game
Proposal for the interactive game
Andrew Downes
 
7 Tips for Surviving Hearthstone: Heroes of Warcraft
7 Tips for Surviving Hearthstone: Heroes of Warcraft 7 Tips for Surviving Hearthstone: Heroes of Warcraft
7 Tips for Surviving Hearthstone: Heroes of Warcraft
Michael Street
 
SOL III RULES
SOL III RULESSOL III RULES
Grell & Rau - Ingress In Adult Life - ECER2016
Grell & Rau - Ingress In Adult Life - ECER2016Grell & Rau - Ingress In Adult Life - ECER2016
Grell & Rau - Ingress In Adult Life - ECER2016
Petra Grell
 
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2..."Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
Sherry Jones
 
Among us
Among usAmong us
Among us
MY Designs
 
Designing for Creativity and Kindness in Games
Designing for Creativity and Kindness in GamesDesigning for Creativity and Kindness in Games
Designing for Creativity and Kindness in Games
Mirjam Eladhari
 
Locative Lab Tools A5
Locative Lab Tools A5Locative Lab Tools A5
Locative Lab Tools A5
Ronald Lenz
 

Similar to HACKED: A Cyber Security Board Game - Creative Project (20)

Abandoning the Magic Circle
Abandoning the Magic CircleAbandoning the Magic Circle
Abandoning the Magic Circle
 
Micro Transaction, Gambling Features, And Virtual Currency In Chinese Online...
Micro Transaction, Gambling Features,  And Virtual Currency In Chinese Online...Micro Transaction, Gambling Features,  And Virtual Currency In Chinese Online...
Micro Transaction, Gambling Features, And Virtual Currency In Chinese Online...
 
Video Game Planning
Video Game PlanningVideo Game Planning
Video Game Planning
 
Milites Fabula
Milites FabulaMilites Fabula
Milites Fabula
 
Yu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official RulebookYu-gi-oh Zexal Official Rulebook
Yu-gi-oh Zexal Official Rulebook
 
Rebel scrum prototype_1214
Rebel scrum prototype_1214Rebel scrum prototype_1214
Rebel scrum prototype_1214
 
Game literacy and learning- Romanian team.pptx
Game literacy and learning- Romanian team.pptxGame literacy and learning- Romanian team.pptx
Game literacy and learning- Romanian team.pptx
 
LIND, Camilla Nimue- Defenceless characters in survivalhorror games
LIND, Camilla Nimue- Defenceless characters in survivalhorror gamesLIND, Camilla Nimue- Defenceless characters in survivalhorror games
LIND, Camilla Nimue- Defenceless characters in survivalhorror games
 
Yu-gi-oh Official Rulebook
Yu-gi-oh Official RulebookYu-gi-oh Official Rulebook
Yu-gi-oh Official Rulebook
 
NCompass Live: Critical Hit! Tabletop Gaming in the Library
NCompass Live: Critical Hit! Tabletop Gaming in the LibraryNCompass Live: Critical Hit! Tabletop Gaming in the Library
NCompass Live: Critical Hit! Tabletop Gaming in the Library
 
Community of Friends Rule Book
Community of Friends Rule BookCommunity of Friends Rule Book
Community of Friends Rule Book
 
igrology_s
igrology_sigrology_s
igrology_s
 
Proposal for the interactive game
Proposal for the interactive gameProposal for the interactive game
Proposal for the interactive game
 
7 Tips for Surviving Hearthstone: Heroes of Warcraft
7 Tips for Surviving Hearthstone: Heroes of Warcraft 7 Tips for Surviving Hearthstone: Heroes of Warcraft
7 Tips for Surviving Hearthstone: Heroes of Warcraft
 
SOL III RULES
SOL III RULESSOL III RULES
SOL III RULES
 
Grell & Rau - Ingress In Adult Life - ECER2016
Grell & Rau - Ingress In Adult Life - ECER2016Grell & Rau - Ingress In Adult Life - ECER2016
Grell & Rau - Ingress In Adult Life - ECER2016
 
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2..."Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
"Game Design: Creating Psychological Experiences" by Sherry Jones (Nov. 12, 2...
 
Among us
Among usAmong us
Among us
 
Designing for Creativity and Kindness in Games
Designing for Creativity and Kindness in GamesDesigning for Creativity and Kindness in Games
Designing for Creativity and Kindness in Games
 
Locative Lab Tools A5
Locative Lab Tools A5Locative Lab Tools A5
Locative Lab Tools A5
 

Recently uploaded

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 

Recently uploaded (20)

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 

HACKED: A Cyber Security Board Game - Creative Project

  • 2. You Have Been Hacked! ØNumber of Players: 3-8 ØObjective: The players must work together to find the notorious black hacker that lurks in the board before they strike with another cyber attack causing irreparable damage. Through challenges players obtain clues about the hacker’s plans. The player who identifies the black hacker first wins the game.
  • 3. “The atmosphere in the FBI conference room was tense as the director rapidly informed the team of expert secret agents on their next mission. A group of cybercriminals had unleashed a cryptic message, threatening to unleash chaos with a major hacking event. The team knew that the cybercriminals were black hat hackers, the kind that operated in the shadows, using their advanced technological skills to wreak havoc on the world and gain millions of dollars. The director’s words hung heavy in the air, as the team absorbed the gravity of the situation. They had only one month to discover the identity of the mastermind behind the attack, where they would strike, and what their deathly plans were!” The clock was ticking, and the agents knew that they had to act fast. Before they left the room, they were warned by the FBI director: “The fate of the world is in your hands, and failure is not an option. If you lose never come back, you will no longer have a place here!”
  • 8.
  • 10. To begin the game, all of the tokens must be placed on the starting point of the board. There are three sets of cards: 20 simple questions (pink), 10 bonus questions (purple), and 22 clues (blue). The pink and purple cards must be mixed together and then be set aside. The blue cards which are divided into three distinct categories: characters, places, and events are to be shuffled so the players can then randomly take 1 card from each category and place it into a folder. This folder will containt 3 different clues about the hacker’s plans: the character who did it, the event, and the location it occurred. After those 3 cards are placed in the folder the rest of the clue cards have to be mixed together in order to start the game. Game Setup
  • 11. 1. The first player rolls the dice and moves their token on the board. 2. Each time you stop, you will be asked a question card. Your left-hand player will give you the question and all multiple choices (if you want to harden the game you can choose not to reveal the choices). Answering correctly, gives you the choice of taking an evidence card from the blue deck or requesting one from another players cards. In the case of a bonus question you receive evidence from both the blue deck and another player’s cards. Answering incorrectly deprives you from getting clue cards. 3. As you progress through the game, you will gather evidence and formulate a hypothesis. Once you have a solid theory of who the hacker is, where they will strike, and how they will attack, you can only state your hypothesis when your token is on the corresponding country on the board. This is where things get exciting! If you state your hypothesis and it is correct, you win the game. If not, you lose and reveal all your evidence. “Example: I believe the hacker is Celine, she will attack in India and the hackers will infiltrate a major social media platform and steal millions of users’ personal information. They will blackmail them into committing major crimes in order to reclaim their personal information.” Tip! Make sure to keep track of all clues that are gathered in a piece of paper in order to not make a false hypothesis. Gameplay
  • 12. Are you ready to find the hacker? Gather your knowledge and let’s play!