Ethical Hacker vs. Cyber Defender

Print Instructions

Background

This game doesn’t have a limitation on number of players, so you can include all your students in your class. It is a fun way to introduce the simple concept of attacking and defending cyber networks and systems to students using the “Candy Man,” or the designated Ethical Hacker, and the “Policeman,” or Cyber Defender. The Ethical Hacker sends signals to players signifying he’s trying to hack a system using one simple sign like a wink, nose tweak, lip pucker, and so forth. If the Ethical Hacker accidentally signals to the Cyber Defender, the game or round is over.

One game should take around 20 mins.

Instructions

Remove all face cards except for one Ace (Ethical Hacker) and one King (Cyber Defender). If you have a larger group, you can add in another set of an Ace and King but use just one set when you play your first time, so you can get a feel for it.

Explain to the students what the Ace and King cards represent and that the number cards represent either the victims of hacks or individuals who cyber defenders protect.

If you have 20 students, you’ll have an Ace, King, and 18 number cards.

Shuffle and deal one card to each player. The players shouldn’t let others know what they have and should not indicate if they are the Ethical Hacker or Cyber Defender.

After all the cards are passed out, the sign from the Ethical Hacker conspicuously begins (in this case a wink). If one of the 18 number players sees the sign by the Ethical Hacker, they lay their card down and say, “I’ve been hacked.” The Ethical Hacker may pause and look around the group and try to deceive the Cyber Defender into thinking they’re just one of the number cards.

While cards are being laid down with players’ voices uttering, “I’ve been Hacked,” the Cyber Defender looks for the Ethical Hacker. If he thinks he knows, he says, “Got You!”, and the person he accuses lays down their card. If it’s an Ace, the round ends, and the Ethical Hacker was found. If it’s not, the game continues, and the person with that number card is out of the game until the next round.

Once someone is out by being hacked, they should avoid eye contact with the Ethical Hacker to not tip off the Cyber Defender.

You can play multiple rounds and/or keep score, depending on your time and a gauge of your students’ interest. Between each round, you could discuss the different types of attacks like phishing or a DNS attack.

This game helps students understand what it means for Hackers to look for vulnerabilities inside systems and how Cyber Defenders need to find those vulnerabilities in the systems they’re protecting. The act of searching on the part of the Cyber Defender and sneakiness on the part of the Ethical Hacker should hit home with your students and solidify this concept and help get them interested to keep learning about the exciting field of cybersecurity.

×
 
TestOut

Free Unplugged Class Activities

 

We're dealing teachers a sweet hand and created multiple activities you can use to help teach your students computing concepts using a deck of cards.

Ethical Hacker vs. Cyber Defender
 
Topic: Cybersecurity
Ethical Hacker vs. Cyber Defender
 

Introduce students to the concepts of cyber attacks and defense through the laugh-out-loud face card game, Candyman.

See Full Instructions

START PLAYING!

Ethical Hacker vs Cyber Defender

Introduce students to the concepts of cyber attacks and defense through the laugh-out-loud face card game, Candyman.

BACKGROUND

This game doesn’t have a limitation on number of players, so you can include all your students in your class. It is a fun way to introduce the simple concept of attacking and defending cyber networks and systems to students using the “Candy Man,” or the designated Ethical Hacker, and the “Policeman,” or Cyber Defender. The Ethical Hacker sends signals to players signifying he’s trying to hack a system using one simple sign like a wink, nose tweak, lip pucker, and so forth. If the Ethical Hacker accidentally signals to the Cyber Defender, the game or round is over.

One game should take around 20 mins.

INSTRUCTIONS

Remove all face cards except for one Ace (Ethical Hacker) and one King (Cyber Defender). If you have a larger group, you can add in another set of an Ace and King but use just one set when you play your first time, so you can get a feel for it.

Explain to the students what the Ace and King cards represent and that the number cards represent either the victims of hacks or individuals who cyber defenders protect.

If you have 20 students, you’ll have an Ace, King, and 18 number cards.

Shuffle and deal one card to each player. The players shouldn’t let others know what they have and should not indicate if they are the Ethical Hacker or Cyber Defender.

After all the cards are passed out, the sign from the Ethical Hacker conspicuously begins (in this case a wink). If one of the 18 number players sees the sign by the Ethical Hacker, they lay their card down and say, “I’ve been hacked.” The Ethical Hacker may pause and look around the group and try to deceive the Cyber Defender into thinking they’re just one of the number cards.

While cards are being laid down with players’ voices uttering, “I’ve been Hacked,” the Cyber Defender looks for the Ethical Hacker. If he thinks he knows, he says, “Got You!”, and the person he accuses lays down their card. If it’s an Ace, the round ends, and the Ethical Hacker was found. If it’s not, the game continues, and the person with that number card is out of the game until the next round.

Once someone is out by being hacked, they should avoid eye contact with the Ethical Hacker to not tip off the Cyber Defender.

You can play multiple rounds and/or keep score, depending on your time and a gauge of your students’ interest. Between each round, you could discuss the different types of attacks like phishing or a DNS attack.

This game helps students understand what it means for Hackers to look for vulnerabilities inside systems and how Cyber Defenders need to find those vulnerabilities in the systems they’re protecting. The act of searching on the part of the Cyber Defender and sneakiness on the part of the Ethical Hacker should hit home with your students and solidify this concept and help get them interested to keep learning about the exciting field of cybersecurity.

Make Learning Fun

Flip the cards below to learn more about each game. All of the activity instructions are free; just fill out the form to receive access.

Get More Free Activities
Face Up / Face Down
 
Topic: Computing
Face Up / Face Down
 

Teach students how computers communicate through binary numbers and decimals.

Fill out the form to access instructions
Don't be Duped
 
Topic: Cyber Safety
Don't be Duped
 

Teach students the impact of Social Engineering using the classic face card game, Ranter Go Round.

Fill out the form to access instructions
52-Card Pick Up with Common Keyboard Shortcuts
 
Topic: Computer Applications
52-Card Pick Up with Common Keyboard Shortcuts
 

Play a game with a key that matches all 52 cards with keyboard shortcuts for Windows, Word, Excel, and PowerPoint.

Fill out the form to access instructions
Cloud Computing at "Face" Value
 
Topic: Data Computing
Cloud Computing at "Face" Value
 

Teach the pros and cons of Cloud computing and on-premise computing through this fun card and interactive attention getter game.

Fill out the form to access instructions
Ace, King, Queen, or Jack: What are Networking Topologies?
 
Topic: Networking
Ace, King, Queen, or Jack: What are Networking Topologies?
 

Interactively teach students the four main topologies using face cards, getting up from their desks and moving around the classroom.

Fill out the form to access instructions
Conditionals with Cards
 
Topic: Programming
Conditionals with Cards
 

Teach students the importance of conditionals in programming and experience how they work through a hands-on card game.

Fill out the form to access instructions
Sort It Out
 
Topic: Sorting Algorithms
Sort It Out
 

Provide students with a hands-on experience of different sorting algorithms such as, bubble sort, insertion sort, and selection sort.

Fill out the form to access instructions
Stack'n Queue: Card Shuffle of Data Structures
 
Topic: Data Structures
Stack'n Queue: Card Shuffle of Data Structures
 

Understand the concept of different data structures such as stack and queue, and visualize how these data structures work and their practical applications.

Fill out the form to access instructions
Parity Party: The Card Game of Error Checking
 
Topic: Error Checking
Parity Party: Card Game of Error Checking
 

Students will simulate the process of sending and receiving data, and check for errors to ensure the data was not corrupted during transmission.

Fill out the form to access instructions

Fill out the form to receive access to all of the activities.