Cyber Threat Protector (CTP) is a multi-player card game, targeting grades 3-5, that introduces players to technology and cybersecurity terms and concepts.

With an average game lasting 20 minutes, players will learn basic cybersecurity terminology, be introduced to a network infrastructure, learn about the relationships between cyber-attacks and defense counter measures, real-world challenges connected to this STEM field, and much more.

In CTP, the goal is to build a network quickly and reach 20 points before your opponent. While building up a network of assets, each player must also work to defend their network from their opponent’s attempts to disrupt system from cyber threats. Players quickly learn that for every attack there is a defense, and for every defense there is an attack to get around it. The player with the most complete set of security defenses will be the one to protect their critical systems and emerge victorious.

Because CTP is designed to be fun first, players will learn basic and complex cybersecurity concepts and strategies through repetitive play. CTP is made available, at no cost, to K-5 educators nationwide thanks to the generous support of sponsors.

About the Cards

Cyber Threat Protector Cards

With Cyber Threat Protector, players learn how to defend a computer network against malicious cyber threats! With these cards, you will protect your network’s assets from disruptive tactics, like IP Spoofing and Phishing scams, from infiltrating your systems.

CTP cards include four distinct card types: Asset, Defense, Event and Attack. The card types are quickly identified by their color, and each clearly explains whether a card adds or subtracts points, specific cards it can defend against or remove from play, how long a card may remain in the game and other essential rules needed for each individual card.

Cyber Threat Protector cards vary in the information that they display. For instance, a card may list the names of specific cards that it can remove from play, while others can block specific cards from being played or have unique effects that can be used for only one round. Each card clearly identifies how it can be used in the game and what cards, if any, it can interact with during a turn. Make sure to read each card’s abilities!

The Cyber Threat Protector cards are available to view below by type. Note: There may be more than one of each card in the deck.

Asset Cards

These are the primary cards needed to build a network and how points are gained. These cards represent the assets found in a business, organization or at home.

Defense Cards

These cards are used to defend a network and mirror the same actions that would be taken at home or work. Defenses must be kept up to date; failure to do so could have significant consequences for your network. Defense Cards prevent different types of attacks from harming a system.

Event Cards

These cards represent various forces that can happen to a network and not the player using the card. These Event Cards are the only cards removed immediately after being played, which is signified by their bright yellow color.

Attack Cards

These cards represent the various evil forces that exist on the Internet today. Attack Cards will reduce an opponent’s points.
Order Cards

Teachers can order one complementary classroom box of Cyber Threat Protector, and anyone can purchase their own personal card deck and/or game accessories, from our Marketplace here.

Complementary Worksheets

The CIAS, in partnership with cybersecurity teachers and UTSA professors, continue to develop turnkey materials for use at home or in the classroom. Below is an initial set of STEM activity sheets that can be used to introduce technology and cybersecurity concepts to complement Cyber Threat Protector. For instructions on how to play the game, visit our CTP Rules Page.