About
Cyber Threat Protector (CTP) is a multi-player card game, targeting grades 3-5, that introduces players to technology and cybersecurity terms and concepts.
With an average game lasting 20 minutes, players will learn basic cybersecurity terminology, be introduced to a network infrastructure, learn about the relationships between cyber-attacks and defense counter measures, real-world challenges connected to this STEM field, and much more.
In CTP, the goal is to build a network quickly and reach 20 points before your opponent. While building up a network of assets, each player must also work to defend their network from their opponent’s attempts to disrupt system from cyber threats. Players quickly learn that for every attack there is a defense, and for every defense there is an attack to get around it. The player with the most complete set of security defenses will be the one to protect their critical systems and emerge victorious.
Because CTP is designed to be fun first, players will learn basic and complex cybersecurity concepts and strategies through repetitive play. CTP is made available, at no cost, to K-5 educators nationwide thanks to the generous support of sponsors.
About the Cards
Cyber Threat Protector Cards
With Cyber Threat Protector, players learn how to defend a computer network against malicious cyber threats! With these cards, you will protect your network’s assets from disruptive tactics, like IP Spoofing and Phishing scams, from infiltrating your systems.
CTP cards include four distinct card types: Asset, Defense, Event and Attack. The card types are quickly identified by their color, and each clearly explains whether a card adds or subtracts points, specific cards it can defend against or remove from play, how long a card may remain in the game and other essential rules needed for each individual card.
Cyber Threat Protector cards vary in the information that they display. For instance, a card may list the names of specific cards that it can remove from play, while others can block specific cards from being played or have unique effects that can be used for only one round. Each card clearly identifies how it can be used in the game and what cards, if any, it can interact with during a turn. Make sure to read each card’s abilities!
The Cyber Threat Protector cards are available to view below by type. Note: There may be more than one of each card in the deck.
Asset Cards
Defense Cards
Event Cards
Attack Cards
Teachers can order one complementary classroom box of Cyber Threat Protector, and anyone can purchase their own personal card deck and/or game accessories, from our CIAS.store.
Complementary Worksheets
The CIAS, in partnership with cybersecurity teachers and UTSA professors, continue to develop turnkey materials for use at home or in the classroom. Below is an initial set of STEM activity sheets that can be used to introduce technology and cybersecurity concepts to complement Cyber Threat Protector. For instructions on how to play the game, visit our CTP Rules Page.
Additional Resources & Curricula
not endorsed or affiliated with the CIAS
CyberSeek is an interactive tool that provides detailed, actionable data about supply and demand in the cybersecurity job market.
SafetyKay provides Safety Curriculum through their digital platform to teach children how to protect their information, avoid online strangers and prevent cyberbullying, among other topics. You’ll also find our CyBear family on their SafetyKay Freebies page!
Funded by a grant, CYBER.ORG provides cybersecurity curricula at no cost to K-12 educators within the United States and territories. Their curricula includes an introduction to cybersecurity, cybersecurity basics, cyber literacy, IT fundamentals, computational thinking and coding fundamentals. Sign up today!