Want to create interactive content? It’s easy in Genially!

Get started free

CYBERSECURITY BREAKOUT

Sergio Martín

Created on April 25, 2022

Start designing with a free template

Discover more than 1500 professional designs like these:

Adventure Breakout

Team Building Mission Escape Game

Onboarding Escape Game

Christmas Escape Room

Flags Challenge

Museum Escape Room

Education Escape Room

Transcript

industrial CYBERSECURITY BREAKOUT

START

Incident in the Connected Industry

THE misSIOn

The entry of connectivity in the Industry has generated great advances, but it has also generated new dangers. In the company UNED Inc. there has been a cyberattack that has put the company in check, all doors have been closed so no one can enter or leave until the cyberattack is solved. You, as the cybersecurity expert of the company, must solve the situation.

THE FACTORY

Find the clue you need to keep moving forward

QUESTION

Equipment failure

Please indicate which one of the following IoT security threats is not intentional:

Hackers

Former employees

ThE FACTORY

Find the clue you need to keep moving forward

QUESTION 1/2

It Is an identity theft with malicious intentions

Spoofing is...

It consists of flooding a server with massive requests until it is no longer available

It is a malicious software and encompasses any type of program or computer code whose function is to damage a system or cause its malfunction

QUESTION 2/2

Scanning

What is the name of the method to find vulnerable points (communication ports) in the system susceptible to be attacked?

Denial of Service

ARP spoofing

THE FACTORY

Find the clue you need to keep moving forward

QUESTION 1/2

Push-buttons to detect an attempt of opening the container

Please indicate which of the following methods is not a way of avoiding hardware manipulation of an IoT device

The use of steel cases

Memory or sensitive data contained at that moment deletion

QUESTION 2/2

Hundreds of thousands (even millions) of requests directed at the same time to a single machine causes it to "crash".

Which of the following statements about denial of service (DoS) attacks is false?

Such an action may cause hardware and/or software malfunction. As a result, the device may not be available or accessible on the network.

It's easy to prevent DoS attacks simply by installing a firewall on your network.

THE FACTORY

Find the clue you need to keep moving forward

QUESTION 1/2

Disconnect device peripherals or replace them by others

Antenna manipulation

Please indicate which of the following vulnerabilities is not a hardware vulnerability:

Open device container

Intercept device communications

QUESTION 2/2

Connectivity

Confidenciality

Indicate which of the following is not one of the 3 main cybersecurity concepts:

Integrity

Availability

THE FACTORY

Find the clue you need to keep moving forward

FINAL QUESTION

Use of an effective encryption

IInstall firewalls in the network

What would be an effective measure to prevent packet sniffing in IoT environments

Avoid using commercial routers

MisSIOn ACCOMPLISHED!

You saved the company!

START AGAIN

Do you really want to exit?

You will lose your progress

Exit

back

Mission failed

start again