{"id":15,"date":"2021-09-07T13:14:28","date_gmt":"2021-09-07T13:14:28","guid":{"rendered":"http:\/\/caterinhuang.com\/dataheist\/?page_id=15"},"modified":"2021-09-12T09:21:30","modified_gmt":"2021-09-12T09:21:30","slug":"what","status":"publish","type":"page","link":"http:\/\/caterinhuang.com\/dataheist\/what\/","title":{"rendered":"What is Data Heist?"},"content":{"rendered":"\n<h2>What is Data Heist?<\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 29%\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" width=\"640\" height=\"849\" src=\"https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?resize=640%2C849\" alt=\"\" class=\"wp-image-89 size-full\" srcset=\"https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?resize=772%2C1024 772w, https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?resize=226%2C300 226w, https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?resize=768%2C1019 768w, https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?resize=1158%2C1536 1158w, https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?w=1417 1417w, https:\/\/i2.wp.com\/caterinhuang.com\/dataheist\/wp-content\/uploads\/sites\/2\/2021\/09\/Data-Heist-Box.jpg?w=1280 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Data Heist is the first card game in the world created to educate players on topics related to Data Protection and Personal Cyber Hygiene. It was created with simple game play so that even an 8-year-old can play, yet it has additional features that will engage a more matured players like employees, general public or anyone who uses the Internet.&nbsp;&nbsp;<\/p>\n\n\n\n<p id=\"play\">The game is a bit of an anti-thesis where players play the role of an amateur hacker. The aim of the game is for players to \u201csteal\u201d as much data as they can from unsuspecting victims in the marketplace (and there are many even in real life) using three of the most common forms of attacks that usually result in data loss.&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<h2>Game Play<\/h2>\n\n\n\n<p><strong>SYNOPSIS<\/strong><\/p>\n\n\n\n<p>In the game Data Heist, players play a rookie hacker who want to be admitted into the inner circle of the hacking fraternity. To win the game players have to prove their ability by stealing as much data from the marketplace of victims and prevent your competitors from stealing as well. In advance scenarios, players can even level up their attacks and thwart attacks of other players.&nbsp;<\/p>\n\n\n\n<p><strong>NUMBER OF PLAYERS<\/strong><\/p>\n\n\n\n<p id=\"why\">The game can be played by 2 to 6 players.<br>Recommended age for players is from 8 to 80 years old or anyone who knows how to count.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":""},"jetpack-related-posts":[{"id":244,"url":"http:\/\/caterinhuang.com\/dataheist\/","url_meta":{"origin":15,"position":0},"title":"About Data Heist","date":"September 12, 2021","format":false,"excerpt":"Why Data Heist? Order Now Get one for you here!","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36,"url":"http:\/\/caterinhuang.com\/dataheist\/why-data-heist\/","url_meta":{"origin":15,"position":1},"title":"Why Data Heist?","date":"September 7, 2021","format":false,"excerpt":"","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":180,"url":"http:\/\/caterinhuang.com\/dataheist\/privacy\/","url_meta":{"origin":15,"position":2},"title":"Privacy Notice","date":"September 8, 2021","format":false,"excerpt":"This Data Protection Notice (\u201cNotice\u201d) sets out the basis which Hotspot Explorer Pte Ltd (\u201cwe\u201d, \u201cus\u201d, or \u201cour\u201d) may collect, use, disclose or otherwise process personal data of our customers in accordance with the Personal Data Protection Act (\u201cPDPA\u201d). This Notice applies to personal data in our possession or under\u2026","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":38,"url":"http:\/\/caterinhuang.com\/dataheist\/about-us\/","url_meta":{"origin":15,"position":3},"title":"About Us","date":"September 7, 2021","format":false,"excerpt":"Meet The Creator Mark Barnabas Lee was an educator in school and now a Data Protection and Privacy Practitioner who provides advisory and training on Personal Data Protection, Risk Management and Operational Excellence. He is currently based in Singapore and has lived in China, India, Malaysia and Philippines in his\u2026","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":67,"url":"http:\/\/caterinhuang.com\/dataheist\/using-praesidium\/","url_meta":{"origin":15,"position":4},"title":"Using Praesidium","date":"September 7, 2021","format":false,"excerpt":"For privacy and data protection practitioners who would like to know how to use Praesidium as a consulting tool please contact us here","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages\/15"}],"collection":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":10,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages\/15\/revisions"}],"predecessor-version":[{"id":243,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages\/15\/revisions\/243"}],"wp:attachment":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/media?parent=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}