About this game

This game uses attack trees to help you understand the weaknesses of network devices against attacks and the type of preventions needed.

You first select a network object such as an access point, a router, a computer, etc. The system then shows a list of preventions that you can try to prevent attacks. It then shows the possible threats for the object and the causes that lead to each threat.

‘No Threat Found’ indicates that this object is safe.

Now you can go back and try the attack trees for other objects.