Want to create interactive content? It’s easy in Genially!
CYBERSECURITY BREAKOUT
Sergio Martín
Created on April 25, 2022
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Adventure Breakout
View
Team Building Mission Escape Game
View
Onboarding Escape Game
View
Christmas Escape Room
View
Flags Challenge
View
Museum Escape Room
View
Education Escape Room
Transcript
industrial CYBERSECURITY BREAKOUT
START
Incident in the Connected Industry
THE misSIOn
The entry of connectivity in the Industry has generated great advances, but it has also generated new dangers. In the company UNED Inc. there has been a cyberattack that has put the company in check, all doors have been closed so no one can enter or leave until the cyberattack is solved. You, as the cybersecurity expert of the company, must solve the situation.
THE FACTORY
Find the clue you need to keep moving forward
QUESTION
Equipment failure
Please indicate which one of the following IoT security threats is not intentional:
Hackers
Former employees
ThE FACTORY
Find the clue you need to keep moving forward
QUESTION 1/2
It Is an identity theft with malicious intentions
Spoofing is...
It consists of flooding a server with massive requests until it is no longer available
It is a malicious software and encompasses any type of program or computer code whose function is to damage a system or cause its malfunction
QUESTION 2/2
Scanning
What is the name of the method to find vulnerable points (communication ports) in the system susceptible to be attacked?
Denial of Service
ARP spoofing
THE FACTORY
Find the clue you need to keep moving forward
QUESTION 1/2
Push-buttons to detect an attempt of opening the container
Please indicate which of the following methods is not a way of avoiding hardware manipulation of an IoT device
The use of steel cases
Memory or sensitive data contained at that moment deletion
QUESTION 2/2
Hundreds of thousands (even millions) of requests directed at the same time to a single machine causes it to "crash".
Which of the following statements about denial of service (DoS) attacks is false?
Such an action may cause hardware and/or software malfunction. As a result, the device may not be available or accessible on the network.
It's easy to prevent DoS attacks simply by installing a firewall on your network.
THE FACTORY
Find the clue you need to keep moving forward
QUESTION 1/2
Disconnect device peripherals or replace them by others
Antenna manipulation
Please indicate which of the following vulnerabilities is not a hardware vulnerability:
Open device container
Intercept device communications
QUESTION 2/2
Connectivity
Confidenciality
Indicate which of the following is not one of the 3 main cybersecurity concepts:
Integrity
Availability
THE FACTORY
Find the clue you need to keep moving forward
FINAL QUESTION
Use of an effective encryption
IInstall firewalls in the network
What would be an effective measure to prevent packet sniffing in IoT environments
Avoid using commercial routers
MisSIOn ACCOMPLISHED!
You saved the company!
START AGAIN
Do you really want to exit?
You will lose your progress
Exit
back
Mission failed
start again