Cyber Threat Guardian (CTG) is a multi-player card game, for ages five and up, that introduces players to technology and cybersecurity terms and concepts.

Like other family games, it involves a little strategy and a bit of luck. This game is a fun way for younger children to begin learning about patterns, online safety practices, technology terminology and cyber-attacks! CTG is a fun, easy card game for the classroom where students learn as they play.

In CTG, the goal is to build a network quickly and protect it from your opponent. While building up a network of assets, each player must also work to defend their network from their opponent’s attempts to disrupt their system from cyber threats. Players quickly learn that for every attack there is a defense, and for every defense there is an attack to get around it. The player with the most complete set of security defenses will be the one to protect their critical systems and emerge victorious.

In CTG, the player with the most asset and defense cards at the end of the game is the winner! However, the rules and game setup vary for three different age groups: Grades K-1, Grades 1-2, and Second Grade and up. Visit the CTG Rules page to help you choose the game option that best fits your needs.

Cyber Threat Guardian Cards

Each Cyber Threat Guardian deck includes 16 Asset Cards, 18 Attack Cards and 16 Defense Cards. The game is designed for two players to share a single deck; the player with the most Asset cards at the end of the game wins!

There are two primary objectives to consider when playing: (1) protect each asset with a defense card and (2) become the winner by obtaining the most asset and defense cards at the end of the game.

Cyber Threat Guardian cards display three types of information: the name of the card, a picture representing the item, and an icon depicting the card’s category.

CTG Asset Cards

These cards represent the things you may have in your home like a desktop computer, cell phone, game console or private information about yourself. These are the cards you need to protect.

CTG Defense Cards

Defense cards represent the systems used to protect devices, such as firewalls, anti-malware, encryption and education. These are the cards used to protect the asset cards. Defense cards will prevent the attack cards from removing asset cards.

CTG Attack Cards

Attack cards are represented by the various ways that hackers, or bad guys, can harm computers, game consoles, mobile phones or steal private personal information. Attack cards will remove unprotected asset cards. Note: Defense cards protect against attack cards.
Order Cards

Teachers can order one complementary classroom box of Cyber Threat Guardian, and anyone can purchase their own personal card deck and/or game accessories, from our Marketplace here.

Complementary Worksheets

The CIAS, in partnership with cybersecurity teachers and UTSA professors, continue to develop turnkey materials for use at home or in the classroom. Below is an initial set of STEM activity sheets that can be used to introduce technology and cybersecurity concepts to complement Cyber Threat Guardian. For instructions on how to play the game, visit our CTG Rules Page.