The Siege of a Thousand Arrows
Distributed Denial of Service Attack
An unrelenting barrage of dark energy hammers against your fortress gates. Wave after wave of phantom warriors assault your realm's defences, seeking not to breach the walls but to ensure no one may pass through them. As the siege intensifies, your subjects are locked out and the enemy's true purpose may be more sinister than it appears.
Compliance Frameworks
🛡️ Roles & Party Members
War Chief Required
Incident CommanderLeads the response team, coordinates technical and business response
Arcane Engineer Required
IT Operations LeadManages network infrastructure, coordinates with ISP and DDoS mitigation provider
Shadow Watcher Required
SOC AnalystAnalyses attack traffic patterns, monitors for secondary attacks masked by the DDoS
Keeper of the Contingency Required
Business Continuity ManagerManages service degradation, activates fallback channels for client services
Town Crier Optional
Communications LeadManages external communications, social media response, client notifications
Herald of the Realm Optional
Client RelationsHandles client escalations, manages relationship impact assessment
High Council Elder Optional
Senior ManagementProvides executive decision authority, manages regulatory communication
⚡ Inject Timeline
The First Volley — Walls Under Siege
T+0 MinutesIt is 10:30 UTC on a Thursday — the bank's busiest day for online transactions. The Network Operations Centre (NOC) detects a sudden and massive spike in inbound traffic to the bank's internet-facin...
The Hidden Dagger — A Second Front Opens
T+20 MinutesTwo hours into the DDoS attack, the SOC identifies something deeply concerning. While the entire security team has been focused on the volumetric attack and service restoration, a separate alert from ...
The Reckoning — Counting the Cost
T+35 MinutesThe DDoS attack has subsided after 8 hours. The network intrusion has been contained. The immediate crisis is over, but the bank must now deal with the consequences. Key issues requiring resolution: ...
📋 Debrief Questions
Post-Battle Assessment
- Was the DDoS mitigation strategy adequate? Should protection be always-on?
- How effectively did the team identify the secondary intrusion behind the DDoS smokescreen?
- Were vulnerability management processes and patching timelines adequate?
- How was the decision made regarding the ransom demand? Was the process clear?
- Were client communication and service recovery handled effectively?
- What architectural changes would improve resilience against multi-vector attacks?