Ethical hacking: The card game

Whether you are a precocious youngster brought up on classic hacking films or a seasoned professional at the top of his game, Control-Alt-Hack, which has been developed by the University of Washington, is a card game that is worth a try.

The game is based on the pursuit of ethical hacking, which is, in short, the activity that sees individuals, on behalf of an organisation, attack or infiltrate a system in a controlled way so as to establish what weaknesses there are.

Now then, we are quite sure we’ve piqued your curiosity here, so allow us elaborate further. The theme is based on the Information Security industry and attempts to paint an accurate picture of what ethical hacking, sometimes referred to as white hat hacking, is all about.

The premise is that you, along with your fellow players, work for a Hackers Inc, an elite company specialising in network security and data protection. The motto of the company, brilliant by the way, is: “You Pay Us to Hack You.”

“Your job is centred around missions – tasks that require you to apply your hacker skills (and a bit of luck) in order to succeed,” the designers of the game explain.

“Use your social engineering and network ninja skills to break the Pacific Northwest’s power grid, or apply a bit of hardware hacking and software wizardry to convert your robotic vacuum cleaner into an interactive pet toy…no two jobs are the same. So pick up the dice, and get hacking!”

It all sounds very exciting and aside from the fact that it is, in part, a game, the authenticity of it is not to be underestimated. After all, the developers, Tamara Denning, Tadayoshi Kohno, and Adam Shostack, are all computer security experts. They have wanted the game to mimic reality, and thus it has as much “juicy and accurate” content as possible.

While the developers and the university are keen to point out that it should not be mistaken for a being educational – it is, above all, designed for entertainment – the unfolding narratives of the game nevertheless reveal important information security concepts.

Consequently, it can therefore be used as an educational tool, be it in a school session informing the next generation of potential ethical hackers of some of the things they might be involved in, or as a genuinely engaging and fun way of conducting training sessions in a professional capacity.

The game might be fun and a little bit dramatic, a quasi-fictional representation so to speak, but it can be instrumental in triggering new ideas, discussion points and strategies in a decidedly novel way. In this, the efforts must be applauded. Although it is not out yet, professionals, academics and instructors can sign up here for notification.

Before go, we thought we’d elaborate on those timeless hacking movies we’ve all come across. There’s a ton, that much is true, but, for some reason, what came to mind instantly was WarGames with a young Matthew Broderick, the Net, with, well, young Sandra Bullock, and Tron, with Jeff Bridges. And yes, he is young.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • RANT Events
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy