Skip to content

Takaman/Godot-Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

287 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

This README contains instructions on how to set up and deploy the project. Project is OLD and Deprecated. You have to setup your own servers and security.

About The Project

Cyber Defenders: Office Edition is a 2D Role-playing game that is created using Godot 4.0.2. This game puts you in the shoes of dedicated Cybersecurity auditor in an organisation. The project is crafted to be fun and engaging for learners and provide and educational experience for those who want to learn the best practices in Cybersecurity and common pitfalls to avoid. The learner's mission is to look through an assigned building and discover all the bad practices and common mistakes the employees are making with regards to their cyber hygiene. Navigate your way through different levels and uncover the cybersecurity lapses lurking in the shadows.

Who is this for?

For IT departments or Administrators seeking to teach employees or anyone the basics of Cybersecurity. If you are interested in having a live leaderboard, you are required to setup your own servers and mysql database.

System Architecture Diagram

ITP System Architecture Diagram (1)

Features

  • Live leaderboard
  • Generate CSV files on company's statistics

Screenshots

Start of the Game

NPC Interactions Guide

NPC Interaction

Progress Checker

Online Leaderboard

Built With

  • Godot Engine
  • Python
  • Flask
  • MySQL
  • Docker

License

This project is licensed under the Apache-2 License.

Credits

Sprites by: Johannes Sjölund (wulax), Michael Whitlock (bigbeargames), Matthew Krohn (makrohn), Nila122, David Conway Jr. (JaidynReiman), Carlo Enrico Victoria (Nemisys), Thane Brimhall (pennomi), bluecarrot16, Luke Mehl, Benjamin K. Smith (BenCreating), ElizaWy, MuffinElZangano, Durrani, kheftel, Stephen Challener (Redshrike), TheraHedwig, Evert, Pierre Vigier (pvigier), Eliza Wyatt (ElizaWy), Johannes Sj?lund (wulax), Sander Frenken (castelonia), dalonedrau, Lanea Zimmerman (Sharm), laetissima, kirts, Mark Weyer, Joe White, Mandi Paugh, William.Thompsonj, Manuel Riecke (MrBeast), Barbara Riviera, thecilekli, Yamilian, Fabzy, Skorpio, Radomir Dopieralski, Emilio J. Sanchez-Sierra, kcilds/Rocetti/Eredah, Cobra Hubbard (BlueVortexGames), DCSS authors, Marcel van de Steeg (MadMarcel), DarkwallLKE, Charles Sanchez (CharlesGabriel), Shaun Williams, Tuomo Untinen (reemax), Stafford McIntyre, PlatForge project, Tracy, Daniel Eddeland (daneeklu), William.Thomsponj, Joshua Taylor, Zi Ye, AntumDeluge, drjamgo@hotmail.com, Lori Angela Nagel (jastiv), gr3yh47, pswerlang, XOR, tskaufma, Inboxninja, Dr. Jamgo, LordNeo Sprites contributed as part of the Liberated Pixel Cup project from OpenGameArt.org: http://opengameart.org/content/lpc-collection License: Creative Commons Attribution-ShareAlike 3.0 (CC-BY-SA 3.0) http://creativecommons.org/licenses/by-sa/3.0/

References Section for external content

Title: "USB Drop Attacks: The Danger of Lost and Found Thumb Drives" Source: RedTeam Secure URL: https://www.redteamsecure.com/blog/usb-drop-attacks-the-danger-of-lost-and-found-thumb-drives Software Update

Title: "The Importance of General Software Updates and Patches" Source: Norton Blog URL: https://us.norton.com/blog/how-to/the-importance-of-general-software-updates-and-patches Ransomware

Title: "What is Ransomware?" Source: Microsoft Security URL: https://www.microsoft.com/en-us/security/business/security-101/what-is-ransomware Adware

Title: "Adware" Source: Kaspersky Resource Center URL: https://www.kaspersky.com/resource-center/threats/adware Weak Password Policy

Title: "Password Policy Recommendations" Source: Microsoft 365 Admin Center URL: https://learn.microsoft.com/en-us/microsoft-365/admin/misc/password-policy-recommendations?view=o365-worldwide Messy Desk

Title: "What is a Clean Desk Policy and Should My Company Have It?" Source: usecure Blog URL: https://blog.usecure.io/what-is-a-clean-desk-policy-and-should-my-company-have-it Insider Threat

Title: "Defining Insider Threats" Source: Cybersecurity & Infrastructure Security Agency (CISA) URL: https://www.cisa.gov/topics/physical-security/insider-threat-mitigation/defining-insider-threats Report Suspected Activity in Singapore

Title: SGSecure Source: SGSecure Official Website URL: https://www.sgsecure.gov.sg/#:~:text=If%20you%20have%20seen%20or%20heard%20any%20suspicious,or%20submit%20the%20information%20via%20the%20SGSecure%20app

About

2D Interactive Educational Game

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors