This website has been created to demonstrate the cyber security game called Riskio which has been created as part of a PhD in Cyber Security at University of Southampton.
This website has been created to demonstrate the cyber security game called Riskio which has been created as part of a PhD in Cyber Security at University of Southampton.
The game should be played by a team of between 3 to 5 players under the direction of the Games Master. Each team requires a deck of Attack Cards. Each player in the team needs a deck of Defence Cards. The players must attend a short tutorial on Microsoft STRIDE threat taxonomy before the game starts.
Please click on the link for a copy of Game Rules
The game boards represent the organisation that the game players must consider the possible threats and defences to protect the organisation data and services. The game board can be tailored to a scenario that the players are familiar within their organisation. The game supports three different game boards: Office Diagram (see figure 1), Network Diagram (see figure 2) and Data Flow Diagrams (see figure 3). The game can be played with one or more of these types of game boards.
The deck is shuffled in respective suits and place face down on the table. In six suits in 2 to 10, Jack, Queen, King Ace:
In one suit in 2 to 10, Jack, Queen, King Ace:
This deck is used by the Games Master to give information to the players at the start of the game and to add information during game play
This deck is also used to give players opportunity for bonus points, if they answer the Games Master question correctly
In one suit in 2 to 10, Jack, Queen, King Ace:
Each player has a deck of these cards