Glossary of Cards

Explore all the cards in the Hackbusters game.

2
Basic Phishing

Image Placeholder

Type: Attack

Description: A simple phishing attempt to steal your personal information or passwords.

3
Light Spyware

Image Placeholder

Type: Attack

Description: A low-level spyware program quietly collecting personal data.

2
Minor Virus

Image Placeholder

Type: Attack

Description: A malicious program causing limited disruptions to your system.

4
Configuration Error

Image Placeholder

Type: Attack

Description: A vulnerability introduced through improper system or service configuration.

3
Network Exploit

Image Placeholder

Type: Attack

Description: An attack targeting vulnerabilities in your network for unauthorized access.

4
Phone Phishing

Image Placeholder

Type: Attack

Description: A scam attempt via phone to gather sensitive information.

3
Physical Intrusion

Image Placeholder

Type: Attack

Description: Unauthorized access to your premises to steal or compromise equipment.

1
Spam

Image Placeholder

Type: Attack

Description: A flood of unwanted messages disrupting your communications.

2
Employee Error

Image Placeholder

Type: Attack

Description: Human error causing a security breach or data leak.

3
Outdated Software

Image Placeholder

Type: Attack

Description: An outdated program with vulnerabilities exploited by attackers.

4
Light Ransomware

Image Placeholder

Type: Attack

Description: A malicious software encrypting files in exchange for ransom.

3
Network Intrusion

Image Placeholder

Type: Attack

Description: An attack exploiting network vulnerabilities to infiltrate your systems.

3
Basic Keylogger

Image Placeholder

Type: Attack

Description: A program recording keystrokes to steal sensitive information.

4
Light Denial-of-Service

Image Placeholder

Type: Attack

Description: An attempt to overload your systems with a flood of requests.

6
Advanced Phishing

Image Placeholder

Type: Attack

Description: A sophisticated phishing campaign targeting specific users.

7
Complex Spyware

Image Placeholder

Type: Attack

Description: Advanced spyware quietly collecting sensitive data.

8
Denial-of-Service Attack

Image Placeholder

Type: Attack

Description: A massive attack aiming to render your systems or services unavailable.

7
Advanced Ransomware

Image Placeholder

Type: Attack

Description: A highly sophisticated ransomware demanding a significant ransom.

8
Advanced Network Exploit

Image Placeholder

Type: Attack

Description: A complex network vulnerability exploitation leading to full control.

6
Sensitive Data Theft

Image Placeholder

Type: Attack

Description: A targeted attack to exfiltrate critical or confidential information.

7
Multi-Step Intrusion

Image Placeholder

Type: Attack

Description: A multi-phase attack requiring coordination to achieve its goals.

8
Zero-Day Exploit

Image Placeholder

Type: Attack

Description: An attack exploiting an unknown and unpatched vulnerability.

7
Persistent Malware

Image Placeholder

Type: Attack

Description: Malware designed to remain undetected and active for a long period.

6
Massive Spam

Image Placeholder

Type: Attack

Description: A coordinated flood of emails or messages severely disrupting communications.

7
System Intrusion

Image Placeholder

Type: Attack

Description: A targeted attack aiming to directly access critical systems.

8
Brute Force

Image Placeholder

Type: Attack

Description: A method attempting all possible combinations to crack a password.

7
Advanced Keylogger

Image Placeholder

Type: Attack

Description: A sophisticated keystroke recorder collecting sensitive information.

6
Outdated Protocol

Image Placeholder

Type: Attack

Description: An attack exploiting weaknesses in aging protocols or technologies.

2
Two-Factor Authentication

Image Placeholder

Type: Defense

Description: Protects against unauthorized access.

1
Access Management

Image Placeholder

Type: Defense

Description: Controls access permissions.

2
Firewall

Image Placeholder

Type: Defense

Description: Blocks network intrusions.

2
Antivirus

Image Placeholder

Type: Defense

Description: Protects against malware.

1
Email Filtering

Image Placeholder

Type: Defense

Description: Blocks spam and fraudulent emails.

2
Employee Training

Image Placeholder

Type: Defense

Description: Reduces human error.

1
Audit

Image Placeholder

Type: Defense

Description: Verifies the security of processes.

2
Regular Backups

Image Placeholder

Type: Defense

Description: Allows data recovery after attacks.

1
Software Patching

Image Placeholder

Type: Defense

Description: Fixes security flaws.

2
Behavioral Analysis

Image Placeholder

Type: Defense

Description: Detects abnormal behavior.

3
Anti-Intrusion AI

Image Placeholder

Type: Defense

Description: Blocks real-time attacks.

4
Two-Factor Authentication

Image Placeholder

Type: Defense

Description: Protects against unauthorized access.

3
Access Management

Image Placeholder

Type: Defense

Description: Controls access permissions.

4
Firewall

Image Placeholder

Type: Defense

Description: Blocks network intrusions.

3
Antivirus

Image Placeholder

Type: Defense

Description: Protects against malware.

2
Email Filtering

Image Placeholder

Type: Defense

Description: Blocks spam and fraudulent emails.

3
Employee Training

Image Placeholder

Type: Defense

Description: Reduces human error.

2
Audit

Image Placeholder

Type: Defense

Description: Verifies the security of processes.

4
Regular Backups

Image Placeholder

Type: Defense

Description: Allows data recovery after attacks.

2
Software Patching

Image Placeholder

Type: Defense

Description: Fixes security flaws.

3
Behavioral Analysis

Image Placeholder

Type: Defense

Description: Detects abnormal behavior.

4
Anti-Intrusion AI

Image Placeholder

Type: Defense

Description: Blocks real-time attacks.