Advertisement

Active Sellers
FUN.com
Things From Another World
Calendars
Puzzle Master
CyberStrategy
CyberStrategy
by Zacatrus (2019)
Player Count
2 to 5

Player Ages
12+

Playing Time
1 hour, 30 minutes to 2 hours
Categories
  • Card Game
  • Educational
  • Mechanisms
  • Area Control / Area Influence
  • Events
  • Roles with Asymmetric Information
  • Artists
  • Paco Arenas
  • Family
  • Hackers
  • One versus Many
  • Theme: Computer / Information Technology Industry
  • Rating: 7/10 from 1 users

    Description

    CyberStrategy is an asymmetric, educational strategy board game in which 2 teams face each other: (1) a Chief Information Security Officer (CISO) tries to protect the bank's corporate network and its assets with security measures and (2) one or more hackers attack it trying to reveal the master password.

    The CISO wins when he successfully fends off the attacks and reveals the identity of the hackers (all hackers lost all 3 identity tokens) or the hackers run out of bitcoin to fund their operation. In the other case, the hacker with the highest individual score (bitcoin) wins; which creates some healthy paranoia amongst the hackers.

    The CISO starts with (at least) one defence card ("security measure") per type of attack and a starting budget in euro. Each hacker starts with 3 attacks of their choice, 3 identity tokens, and a starting money stack in bitcoin.

    Each player also has a hidden goal for the game, which - when completed - gives them a leg up.

    The game plays in 3 phases per round:

    (1) the EVENT phase:
    (a) the CISO receives his budgets (which depends on the number of hackers) and
    (b) both CISO and hackers draw an event card (which is resolved as indicated on the card)

    (2) the PLANNING phase:
    (a) the CISO can spend budget to purchase additional security measures (= draw cards) and can deploy security measures (= ready cards)
    (b) the hackers can learn additional attacks (= draw cards, up to a hand limit of 4) and can plan attacks

    (3) the ATTACK phase:
    (a) the hackers declare (joint or separate) attacks on the assets of the bank, starting with the assets at the outer rim of the corporate infrastructure (ATM, router,...) and pay for the attack (in bitcoins)
    (b) the CISO then checks if they security measures they put in play are sufficient to block the attack
    => if the attack succeeded (defence value is lower than total attack value), the asset is hacked and the hackers receive a bitcoin reward for the successful attack
    => if the attack failed, the hacker leading the attack hands over 1 identity token to the CISO

    Game Discussions

    Add Comment

    You need to be logged in to comment.

    Comments (0)

    No comments yet. Be the first!

    Marketplace

    No listings at the moment.


    Do you own this game?
    Best Sellers
    Board Games





    Latest Searches: electronic detective | Disney Frozen Classic Fashion | bahasa arab | cheese+chasers | Transformed | Transformers: The Last Knight Premier Edition Voyager Class Autobot Hound | darth+vader+black+series+helmet | interview+challenge | Replacement sorry cards | castles+of+burgundy+expansions | Hutchopoly | South | Bullhead City | hogwarts | Bc+state | Beyblade-+Spryzen+Requiem+S3 | expanding adventure | The game of goodrich | Connect+Four | friady | battle bosses | +Spankopoly+Spankopoly | trump+monoply+game | Detroit+monopoly+game | this+warof+mine | war+for+cybertron | limited edition ems monopoly | the+front+nine | 3-9 | rappe+fingre
    Sitemap: All Categories | All Publishers | All Designers | All Mechanisms | All Artists | All Family
    © 2018-2024 BoardGames.com | Your source for everything to do with Board Games
    All Rights Reserved
    Please note: BoardGames.com will receive commissions from purchases made through links on this page.
    Privacy Policy | Contact Us