Skip to content

Commit

Permalink
Imrove list based on feedback from claire-lex
Browse files Browse the repository at this point in the history
  • Loading branch information
Karneades authored Jun 13, 2023
1 parent 42ecb5c commit 29d9894
Showing 1 changed file with 2 additions and 5 deletions.
7 changes: 2 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,10 +20,7 @@ Security card games help train your skills and enable discussions for various ar
## Cryptography

- [Crypto Go](https://www.cryptogogame.com/EN) - An educational card game designed to teach up to date
symmetric cryptography. Crypto Go decks consist of 108 cards, representing modern cryptographic tools.
- [Crypto Against Humanity](https://github.com/CryptoAgainstHumanity/crypto-against-humanity) - Crypto Against Humanity
is a never ending game of Cards Against Humanity, where all participants compete to find the best matches.
Crypto-economic primitives incentivize and reward card creation and curation.
symmetric cryptography. Crypto Go deck consists of cards representing modern cryptographic tools.

## Data Privacy

Expand All @@ -32,7 +29,7 @@ Security card games help train your skills and enable discussions for various ar
## Incident Response

- [Backdoors & Breaches](https://www.blackhillsinfosec.com/projects/backdoorsandbreaches/) - An incident response card game, it and contains 52 unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods.
- [Defensomania](https://github.com/Karneades/Defensomania) - An incident response card game for security monitoring and incident response teams. It consists of over 150 cards, most of them are incident response activities and over 30 attack scenarios. Play your best incident response activity card against the given attack scenario.
- [Defensomania](https://github.com/Karneades/Defensomania) - An incident response card game for security monitoring and incident response teams to discuss priorities, possible response actions and attack scenarios.

## Threat Modeling

Expand Down

0 comments on commit 29d9894

Please sign in to comment.