Game Instructions
Game Idea
You are part of a hacker group called “The Cyber Crusade”. The goal of this group is to hack into target systems and therefore gain access to the entire system. However, not all of your team members are loyal hackers, there are also some undercover agents among you.
The hackers have the goal to get full access to the system within 4 rounds of playing.
The agents try to prevent that by either stalling time or by decoying to hack into a honeypot.
Game Preparation
You are randomly given a role, either hacker (👨💻) or agent (🕵️) (you can see your role next to your name when playing a game). Each member gets 5 computer systems which they are responsible for (below your name you can see what types of computer systems you have).
Types of computer systems
- Honeypot: Honeypots are bad for hackers since they alert the security system. If two (or three, depending on how many players are playing) honeypots are attacked, the hackers loose and the agents win.
- Firewall: Firewalls protect systems from getting hacked. They don’t do any damage.
- Target: Targets are vulnerable systems and are hackable. Hackers need access to all available targets to win the game.
Game Process
⚠️ Important: You are allowed to lie during the entire game!
- You go through - player by player - and say what role you have (if you are a hacker or a agent). Remember: You may lie!
- You go through - player by player - and say what types of computer systems you have.
- The player who is marked in dark orange can now decide which computer system they want to attack. They cannot attack one of their own computer systems. The other players may talk to the active player and can persuade them.
- If the active player has decided, they can click on a computer monitor to reveal what type of system they have attacked.
- Now the new active player can decide which computer system they want to attack. Repeat step 3 and 4 until x systems are attacked (x being the number of players in the game).
- The round is over, and one player has to click ok to continue to the next round. For the next round, each player will have one card less than in the round before.
- repeat step 2-6 four times or until the game is over.
Game Ending
There are three possible outcomes:
- Hackers 👨💻 win: All the required targets are attacked (in the side box you can see how many you have already attacked)
- Agents 🕵️ win: All the required honeypots are found
- Agents 🕵️ win: You have played all four rounds and none of the other two possible outcomes occurred.
About This Project
Feedback
If you find a bug or have a feature request, please create an issue on my Github repository: Submit an issue
Project
This project was built by Jon Jampen as a project for school. It is built with SvelteKit and Firestore.
Project on Github | Contact:
hello@jonjampen.ch |
Project Plan