Uncovering the Hidden Security Of Card Games
By Tom Seest
At CardGameNews, we help people who love card games by collating information and news about card games.
Smart cards have multiple security applications, from personal identification and wireless communications to bank payment cards and computer security. While their cryptographic algorithms and protocols protect their contents from intruders, there are certain vulnerabilities that can be exploited to break their encryption process, including timing analysis, power consumption issues, and electromagnetic radiation (EM) attacks.
The University of Washington developed the Security Cards methodology in order to assist security teams with accounting for novel or less frequent attacks and to increase knowledge about threats and threat modeling practices. A deck of 42 cards serves as a brainstorming platform where analysts answer questions regarding possible attacks, such as who might attack, why they might attack, and how they would execute one. These questions then lead to tabletop gaming which simulates actual scenarios of attacks taking place.
Hybrid Threat Modeling Method hTMM brings together the best security engineering approaches with SQUARE, Security Cards, and PnG activities for an accurate risk-assessment process. It helps businesses understand potential threats as well as devise appropriate countermeasures against them.
Table Of Contents
Monitoring is the practice of collecting and analyzing information about the progress of a program or project to identify areas for improvement, provide feedback on implementation, and help ensure that intended outcomes are realized. Monitoring can include gathering data such as disk space utilization, CPU load, and swap usage from operating systems as well as from applications or web servers themselves (client error rates or unresponsiveness, for instance).
Be sure to read our other related stories at CardGameNews to learn more about card games.