CTD Card Game

Rackspace Booster

Rackspace supports and manages the world’s leading cloud platforms by listening to customers as they explore how technology can better serve their business. Cloud services are designed to fit the customer’s unique IT needs while protecting their cloud environments.

With cloud services in mind, the Rackspace Booster Pack contains cards that highlight various considerations for detecting and ejecting threats to help minimize damage to an organization’s network. Unique to this deck is the rare “Rackspace Managed Services” defense card and uncommon cards such as “Secure Coding Practices” and “Stack Overflow”.

Released April 2018

Discontinued End of 2019

One of your opponent’s websites was attacked by hacktivists and now displays a message that scares away visitors.

Select an Asset that an opponent has in play. That Asset does not generate any points this round, and that player loses 2 points at the end of this round. At the end of this round, remove this card from play.

A program attempted to use more memory than it had available, and has crashed during a critical operation.

Select an opponent. That opponent must discard the top 2 cards from their draw pile. Discard this card from play afterward.

The interface that communicates with your opponent’s database does not prevent user input from manipulating how the SQL code is executed. An attacker is using this exploit to manipulate confidential information.

Select an opponent. That opponent loses 1 point each round this card is in play, and must discard the top card from their deck at the end of each round this card is in play. Discard this card after 3 rounds.

A search engine is a powerful information retrieval tool that crawls through and indexes large sets of complex data. Once the data is indexed, it is possible to search for specific information quickly.

While this card is in play, at the beginning of your turn, you may draw two cards from your deck. If you do so, immediately place one of these two cards into your hand, and put the other at the bottom of your deck.

You establish a contract with specialist from Rackspace Managed Services (RMS) which helps to automate security processes, quickly detecting and ejecting threats to help minimize damage.

While this card is in play, all Attack cards that target you expire in one round instead of their usual timeframe. Remove this card from play after 3 rounds.

Your opponent was attacked by the CryptoLocker ransomware, which maliciously encrypted files on their devices to make them unusable. The ransomware is demanding payment in exchange for decrypting the files.

Target opponent cannot earn any points from Asset – Data cards, and loses 1 point at the end of each round that this is in play. The affected player may discard 3 cards to remove CryptoLocker from play.

A program in one of your opponent’s systems was not written with secure code. An attacker was able to cause a buffer overflow, overwriting an unrelated system memory by exceeding the intended capacity of a data storage structure. They used that memory override to issue unauthorized instructions to the system.

Select an opponent. That opponent loses 3 points at the end of this round. Discard the Buffer Overflow card at the end of the round.

You have acquired and configured a server to host database applications and facilitate queries and connections to that data.

You receive 1 point each round this card is in play.

One of your opponent’s policies is outdated and has become useless. As technologies and threats evolve, it is important to ensure that policies are kept updated with relevant information and procedures for handling these changes.

Select a Defense – Policy card that an opponent has in play. The target card and this card are immediately discarded.

An application is allocating memory for data storage but is not appropriately deallocating that memory, leading to a memory leak which reduces the resources available on that system.

Select an opponent. That player must immediately discard one (1) card from their hand.

A binary search is an algorithm designed to quickly search a sorted data structure by recursively splitting sets of data in half and comparing their values.

Cut your deck into two piles. Draw one card from the top of each pile, then shuffle your deck. If the values of the two cards match, put both into your hand. Otherwise, put the card with the higher value in your hand, and the card with the lower value at the bottom of your deck.

Many vulnerabilities in computer systems come from programming errors found in software. You have implemented training and code review policies that significantly improved your software security.

This card prevents all Attack – Code Exploit cards from affecting you.