BLUE TEAM DEFENDERS

The Blue Team is the dedicated group of defenders in CyberStrike 24, tasked with protecting Smart Island City from the relentless attacks of the Red Team hackers. Comprised of a diverse set of professionals, each with unique skills and responsibilities, the Blue Team is the city's last line of defense against digital chaos.

Their mission is to maintain public order, secure critical infrastructure, and ensure the continuous operation of the city’s services.

Starting Team
The Blue Team must include the Deputy Mayor and the Police Deputy as core members. Other available defenders can be added to extend the team, ensuring a comprehensive defense strategy for Smart Island City.
Defender Profiles
Compliance Officer
.png)
-
Overview: The Compliance Officer ensures that Smart Island City adheres to all legal and regulatory standards, maintaining integrity and ethical conduct across city operations. They have expertise in encryption and ransomware mitigation, making them crucial in safeguarding sensitive information.
​
-
Job Responsibilities: The Compliance Officer develops and oversees compliance programs, conducts audits, and implements corrective actions to mitigate risks. They ensure robust data protection measures and work closely with various departments to maintain ongoing training and awareness programs. In case of compliance breaches, they lead investigations and coordinate with regulatory bodies.
Crisis Manager
.png)
-
Overview: The Crisis Manager excels in emergency preparedness and response, known for their leadership and strategic thinking. They coordinate all aspects of emergency response, ensuring the safety and stability of Smart Island City during crises.​
​
-
Job Responsibilities: The Crisis Manager develops crisis management plans, conducts risk assessments, and oversees emergency response efforts. They manage communication with the public and media during crises and lead post-crisis evaluations to improve future preparedness.
Cybersecurity Analyst
.png)
-
Overview: The Cybersecurity Analyst is dedicated to protecting the city’s information systems by identifying vulnerabilities, analyzing threats, and implementing security measures. They monitor network activity and respond to security incidents to maintain the city's digital security.
​
-
Job Responsibilities: The Cybersecurity Analyst monitors network traffic, performs vulnerability assessments, and implements security measures. They develop incident response plans and provide detailed reports to inform strategic decisions, ensuring the city’s information systems remain secure.
Police Deputy (Required)
.png)
-
Overview: The Police Deputy is a law enforcement figure with expertise in both digital and physical security. They lead cyber defense operations and use forensic tools to track and apprehend cybercriminals.
​
-
Job Responsibilities: The Police Deputy orchestrates cyber defense strategies, collaborates with cybersecurity professionals, and sets up honeypots to trap adversaries. They are crucial in protecting the city’s infrastructure and citizens from cyber threats.
Deputy Mayor (Required)
.png)
-
Overview: The Deputy Mayor is a dynamic leader with a background in public administration and urban planning. They oversee the city's operations and ensure the integrity and security of its data systems.
​
-
Job Responsibilities: The Deputy Mayor coordinates city initiatives, manages emergency response efforts, and oversees public safety measures. As Chief Data Officer, they ensure robust data governance and security, driving informed decision-making and innovation.
Digital Forensics Expert
.png)
-
Overview: The Digital Forensics Expert excels in uncovering and analyzing digital evidence to support investigations. They are critical in identifying the methods and origins of cyber attacks.
​
-
Job Responsibilities: The Digital Forensics Expert conducts investigations, preserves digital evidence, and provides detailed analysis to inform cybersecurity strategies. They work closely with law enforcement to ensure that findings are used effectively in preventive measures and active investigations.
Network Defense Architect
.png)
-
Overview: The Network Defense Architect designs and fortifies the city’s digital defenses, ensuring resilience against cyber-attacks. They are adept at building robust security systems and quick problem-solving.
​
-
Job Responsibilities: The Architect oversees the deployment and maintenance of security systems, conducts security audits, and collaborates with IT professionals to develop comprehensive security policies. They ensure that the city’s digital infrastructure is secure and capable of withstanding attacks.
Public Relations Specialist
.png)
-
Overview: The Public Relations Specialist manages the city’s communication strategy, crafting messages that foster trust and transparency. They handle both routine communications and crisis situations to maintain a positive city narrative.
​
-
Job Responsibilities: The Specialist drafts press releases, handles media inquiries, and coordinates public announcements. They engage with the community through various platforms to build strong relationships and ensure clear communication of the city’s values and initiatives.
Incident Responder
.png)
-
Overview: The Incident Responder is a frontline defender against cyber threats, known for their quick reflexes and analytical skills. They manage and resolve cybersecurity incidents in real-time.
​
-
Job Responsibilities: The Incident Responder monitors network traffic, analyzes security alerts, and leads efforts to contain and eradicate threats. They document incidents and conduct post-incident analysis to improve the city’s cybersecurity posture.
Threat Assessor
.png)
-
Overview: The Threat Assessor identifies and evaluates potential cyber threats, providing actionable recommendations to fortify the city’s defenses. They stay abreast of the latest cyber threats to ensure the city’s security.
​
-
Job Responsibilities: The Threat Assessor gathers and analyzes threat intelligence, conducts risk assessments, and collaborates with cybersecurity professionals to develop strategies. They ensure that the city’s defenses are always one step ahead of potential attacks.
Tech Skills
The Blue Team defenders have tech skills rated zero to four:
-
Patch: Quickly deploying software updates to fix vulnerabilities and defend against known threats.
​
-
Harden: Strengthening digital infrastructure to make it more resilient against cyber-attacks.
​
-
Assess Damage: Evaluating the impact of a cybersecurity breach to understand the extent of damage.
​
-
Investigate: Searching for the cause, method, and source of a cyber attack to gather evidence.
​
-
Detect Intruder: Identifying unauthorized access or attempts to breach systems in real-time
​
-
Restore: Reinstating services and data integrity after a security breach to minimize downtime.
​
Social Skills
The Blue Team defenders have social skills rated zero to four:
-
Awareness: Maintaining vigilance regarding potential cybersecurity threats.
​
-
Communications: Effectively sharing information about threats, breaches, and defenses.
​
-
Perception: Accurately identifying and understanding cyber threats.
​
-
Charisma: Handling crisis communications with internal stakeholders and the public to prevent panic and foster collaboration.
​
Cyberdefenses
The Blue Team can allocate points during the setup phase for upgrading locations to improve defense, functionality, and resilience:
-
Network Upgrades: Improves defense by enhancing firewalls and anti-virus systems.
​
-
Software Upgrades: Strengthens systems by applying updates that enhance functionality and patch vulnerabilities.
​
-
Hardware Upgrades: Enhances resilience by strengthening physical devices and infrastructure.
​
-
Training: Reduces susceptibility to phishing attacks by training personnel in the latest cybersecurity practices.
Security Tools
The Blue Team uses various tools to enhance security, including:
-
Patches: Updates to fix vulnerabilities and strengthen system security.
​
-
Harden: Enhances system security by increasing resilience against attacks.
​
-
Intrusion Detection Systems (IDS): Monitors network activities for malicious actions, alerting the team to potential threats.
​
-
Honeypots: Decoy systems set up to detect hacking attempts and distract attackers from valuable targets. Only the Police Deputy can set these up.
Lockdowns: Blue Team members can initiate lockdowns to temporarily enhance security at specific locations, making them impervious to physical attacks for up to three hours. Lockdowns disrupt normal operations and increase public panic but are essential for preventing ongoing or new physical attacks.
Threat Intelligence: Smart Island City subscribes to a Threat Intelligence service that monitors the Dark Web and hacker social media for activity. This platform collects and analyzes information about emerging threats, helping the Blue Team prepare effective defenses.