Glossary of Cards
Explore all the cards in the Hackbusters game.
Basic Phishing
Image Placeholder
Type: Attack
Description: A simple phishing attempt to steal your personal information or passwords.
Light Spyware
Image Placeholder
Type: Attack
Description: A low-level spyware program quietly collecting personal data.
Minor Virus
Image Placeholder
Type: Attack
Description: A malicious program causing limited disruptions to your system.
Configuration Error
Image Placeholder
Type: Attack
Description: A vulnerability introduced through improper system or service configuration.
Network Exploit
Image Placeholder
Type: Attack
Description: An attack targeting vulnerabilities in your network for unauthorized access.
Phone Phishing
Image Placeholder
Type: Attack
Description: A scam attempt via phone to gather sensitive information.
Physical Intrusion
Image Placeholder
Type: Attack
Description: Unauthorized access to your premises to steal or compromise equipment.
Spam
Image Placeholder
Type: Attack
Description: A flood of unwanted messages disrupting your communications.
Employee Error
Image Placeholder
Type: Attack
Description: Human error causing a security breach or data leak.
Outdated Software
Image Placeholder
Type: Attack
Description: An outdated program with vulnerabilities exploited by attackers.
Light Ransomware
Image Placeholder
Type: Attack
Description: A malicious software encrypting files in exchange for ransom.
Network Intrusion
Image Placeholder
Type: Attack
Description: An attack exploiting network vulnerabilities to infiltrate your systems.
Basic Keylogger
Image Placeholder
Type: Attack
Description: A program recording keystrokes to steal sensitive information.
Light Denial-of-Service
Image Placeholder
Type: Attack
Description: An attempt to overload your systems with a flood of requests.
Advanced Phishing
Image Placeholder
Type: Attack
Description: A sophisticated phishing campaign targeting specific users.
Complex Spyware
Image Placeholder
Type: Attack
Description: Advanced spyware quietly collecting sensitive data.
Denial-of-Service Attack
Image Placeholder
Type: Attack
Description: A massive attack aiming to render your systems or services unavailable.
Advanced Ransomware
Image Placeholder
Type: Attack
Description: A highly sophisticated ransomware demanding a significant ransom.
Advanced Network Exploit
Image Placeholder
Type: Attack
Description: A complex network vulnerability exploitation leading to full control.
Sensitive Data Theft
Image Placeholder
Type: Attack
Description: A targeted attack to exfiltrate critical or confidential information.
Multi-Step Intrusion
Image Placeholder
Type: Attack
Description: A multi-phase attack requiring coordination to achieve its goals.
Zero-Day Exploit
Image Placeholder
Type: Attack
Description: An attack exploiting an unknown and unpatched vulnerability.
Persistent Malware
Image Placeholder
Type: Attack
Description: Malware designed to remain undetected and active for a long period.
Massive Spam
Image Placeholder
Type: Attack
Description: A coordinated flood of emails or messages severely disrupting communications.
System Intrusion
Image Placeholder
Type: Attack
Description: A targeted attack aiming to directly access critical systems.
Brute Force
Image Placeholder
Type: Attack
Description: A method attempting all possible combinations to crack a password.
Advanced Keylogger
Image Placeholder
Type: Attack
Description: A sophisticated keystroke recorder collecting sensitive information.
Outdated Protocol
Image Placeholder
Type: Attack
Description: An attack exploiting weaknesses in aging protocols or technologies.
Two-Factor Authentication
Image Placeholder
Type: Defense
Description: Protects against unauthorized access.
Access Management
Image Placeholder
Type: Defense
Description: Controls access permissions.
Firewall
Image Placeholder
Type: Defense
Description: Blocks network intrusions.
Antivirus
Image Placeholder
Type: Defense
Description: Protects against malware.
Email Filtering
Image Placeholder
Type: Defense
Description: Blocks spam and fraudulent emails.
Employee Training
Image Placeholder
Type: Defense
Description: Reduces human error.
Audit
Image Placeholder
Type: Defense
Description: Verifies the security of processes.
Regular Backups
Image Placeholder
Type: Defense
Description: Allows data recovery after attacks.
Software Patching
Image Placeholder
Type: Defense
Description: Fixes security flaws.
Behavioral Analysis
Image Placeholder
Type: Defense
Description: Detects abnormal behavior.
Anti-Intrusion AI
Image Placeholder
Type: Defense
Description: Blocks real-time attacks.
Two-Factor Authentication
Image Placeholder
Type: Defense
Description: Protects against unauthorized access.
Access Management
Image Placeholder
Type: Defense
Description: Controls access permissions.
Firewall
Image Placeholder
Type: Defense
Description: Blocks network intrusions.
Antivirus
Image Placeholder
Type: Defense
Description: Protects against malware.
Email Filtering
Image Placeholder
Type: Defense
Description: Blocks spam and fraudulent emails.
Employee Training
Image Placeholder
Type: Defense
Description: Reduces human error.
Audit
Image Placeholder
Type: Defense
Description: Verifies the security of processes.
Regular Backups
Image Placeholder
Type: Defense
Description: Allows data recovery after attacks.
Software Patching
Image Placeholder
Type: Defense
Description: Fixes security flaws.
Behavioral Analysis
Image Placeholder
Type: Defense
Description: Detects abnormal behavior.
Anti-Intrusion AI
Image Placeholder
Type: Defense
Description: Blocks real-time attacks.