Post by rabiakhatun on Nov 3, 2024 5:51:23 GMT -5
Today marks six months since I started working at Pozitiv and I can say that I am still discovering new things in the company, stumbling upon unexpected things and all that. The other day, my colleagues from PT ESC (our expert center) gave me the board game Zone of Threats and I can say that this is probably the best game in my board game collection so far. And it's not just about the great illustrations...
Game Zone of Threats
On the one hand, there are quite a lot of card games in IB. I have already written about four of them , and I haven't written about some of them yet. And it seems content writing service like all of these games have a similar idea, but it only seems that way. Let's take, for example, the card game BlackHat , which I have already written about . It also has cards:
BlackHat Game Cards
But note that although there are quite a few cards, they are all the same type. There are no identical cards in Zone of Threats and there are many, many more of them than in BlackHat. Here are just a few of these cards from the game developed in PT ESC:
Individual cards of the game Zone of Threats
Moreover, each card is drawn with love - they were made not only by an excellent illustrator, but also by a person who understands information security and has a sense of humor:
Individual cards of the game Zone of Threats
Pay attention to the map in the middle of the photo. How cute If I have to use a new nickname (to the eight profiles that I already have on different social networks), I will definitely call myself Alex Chesnotsky
The idea of many card games on information security revolves around the hacker theme - you have to hack something. For example, in the already mentioned BlackHat, you play as a hacker who needs to implement an unacceptable event, getting to critical IT assets . And the playing field is oriented precisely to this task - you move along the cells in a certain direction, "hacking along the way" intermediate key systems.
BlackHat game board
Zone of Threats also has a game board, but the game is about pumping up the skills of information security specialists, not hackers. It is not surprising - PT ESC plays the role of Blue Team. You start the game as a regular newbie, that is, an information security beginner at level 1. During the game, you eliminate threats, sell so-called "devices", perform various actions that should increase your level of information security. As a result, having reached level 10, you receive the status of "Threat Storm" and the game ends. At the same time, various "fails", incidents, etc. can lower your information security level. Everything is like in the ordinary life of an information security specialist...
Game Zone of Threats
On the one hand, there are quite a lot of card games in IB. I have already written about four of them , and I haven't written about some of them yet. And it seems content writing service like all of these games have a similar idea, but it only seems that way. Let's take, for example, the card game BlackHat , which I have already written about . It also has cards:
BlackHat Game Cards
But note that although there are quite a few cards, they are all the same type. There are no identical cards in Zone of Threats and there are many, many more of them than in BlackHat. Here are just a few of these cards from the game developed in PT ESC:
Individual cards of the game Zone of Threats
Moreover, each card is drawn with love - they were made not only by an excellent illustrator, but also by a person who understands information security and has a sense of humor:
Individual cards of the game Zone of Threats
Pay attention to the map in the middle of the photo. How cute If I have to use a new nickname (to the eight profiles that I already have on different social networks), I will definitely call myself Alex Chesnotsky
The idea of many card games on information security revolves around the hacker theme - you have to hack something. For example, in the already mentioned BlackHat, you play as a hacker who needs to implement an unacceptable event, getting to critical IT assets . And the playing field is oriented precisely to this task - you move along the cells in a certain direction, "hacking along the way" intermediate key systems.
BlackHat game board
Zone of Threats also has a game board, but the game is about pumping up the skills of information security specialists, not hackers. It is not surprising - PT ESC plays the role of Blue Team. You start the game as a regular newbie, that is, an information security beginner at level 1. During the game, you eliminate threats, sell so-called "devices", perform various actions that should increase your level of information security. As a result, having reached level 10, you receive the status of "Threat Storm" and the game ends. At the same time, various "fails", incidents, etc. can lower your information security level. Everything is like in the ordinary life of an information security specialist...