Want to create interactive content? It’s easy in Genially!
Taken Cybersecurity Adventure
hopkinsa
Created on September 27, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
YOUR IDENTITY HAS BEEN STOLEN. TIME TO TAKE IT BACK.
start.
Taken
map/missions
A Cybersecurity Awareness Month Adventure
Mission 01:The Cybersecurity Wake Up Call
Introduction:You're an ordinary student, minding your own business, when one day you wake up to a shocking discovery. Your digital life has been turned upside down. Identity thieves have struck, and your personal information has been taken. To get it back, you must infiltrate the cyber-underworld and complete the 4 missions that appear on the map. Make sure you have your notebook handy to write down the clues you get. If you collect all the clues, you will get the combination that opens the briefcase containing your stolen information.
Open the card
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Your phone is ringing
Incoming Call
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Unknown
Your phone rings again. You should probably answer it. Just sayin'.
Incoming Call
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Unknown
UNKNOWN CALLER
YOU
I assume you've received the letter. I know I could have just called you in the first place, but it wouldn't have had nearly the same dramatic effect. Are you ready to play the game?
Yes, but before we start, I have a threatening monologue to deliver. I don't know who you are. I don't know what you want. If you are looking for ransom, I can tell you I don't have money. But what I do have are a very particular set of cybersecurity skills that make me a nightmare for people like you. I will find my data, and I will delete your malware.
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Unknown
UNKNOWN CALLER
YOU
I'm oddly terrified. Let's begin. What is a recommended practice for creating strong passwords?
[Choose your response.]
Using easily guessable information like birthdays
Want to get your info back?
Using common words or phrases
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Combining uppercase and lowercase letters, numbers, and symbols
Unknown
Reusing the same password for multiple accounts
UNKNOWN CALLER
YOU
Correct. Next question. Why is it important to use a password manager?
[Choose your response.]
It helps you remember your passwords
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
It makes your passwords shorter
Unknown
It stores your passwords in plain text
It's not important; you can keep all your passwords in your head
UNKNOWN CALLER
YOU
Correct. One more. What does turning on multifactor authentication (MFA) add to your login process?
[Choose your response.]
A second layer of security beyond just a password
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
A faster login experience
Unknown
The need to create longer passwords
The option to share your password with others
Unknown
UNKNOWN CALLER
WRONG. Say goodbye to your data!
CALL ENDED
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Unknown
Try again?
You must wait 10 seconds to try again.
Form the code
Drag the letters to this space to form the answer to the riddle.Then, write down the numbers that go with each letter in order to get the secret code.
Continue
UNKNOWN CALLER
Correct. Now look in the envelope we sent you. Notice that each letter has a corresponding number. Use the letters to answer this riddle: I am the solution to unlock a secret, A small tool, but incredibly potent. In cryptography, I play a vital role, Without me, your data wouldn't be whole. What am I?
Congratulations!you have successfully completed mission 1. don't lose the code you've just discovered!
map/missions
Mission 02: Phishy Conversations
Mission 2
The envelope from the indentity thieves has a return address on it. Either they are very, VERY stupid, or this is where they want you to go next. You arrive at the address to find a locked door in a dark alleyway. They try to hide in the shadows, you think to yourself, but they need to realize - I don't forgive, I don't forget, and I certainly don't allow pop-up ads.
Password?
Knock on the door and enter the secret code.
"Without a password you can't get in."
Enter the password
Pay careful attention to the conversation to obtain information that will help you answer the questions in mission 3 correctly.
Watching closely
(Man) Oh yeah. Got a few suckers to give me their credit card numbers by pretending to be a Nigerian prince. It's amazing what people will fall for these days.
(Woman) I can't believe people don't just immediately delete your emails and report them like they're supposed to.
(Man) Well I'm glad they don't! I just used one of the credit cards to buy some sweet T-Swift merch.
(Man) Did you forget who you're talking to? I'm an identity thief. I know I gotta keep all my software up to date so I get the latest security patches. Can't have some other joker stealing my stolen info.
(Woman) By the way, I meant to ask, did you make sure to update the banking software?
(Woman) Done any phishing lately?
Continue
Pay close attentionto the conversation to get the answers to the questions in the next mission.
Congratulations!you have successfully completed mission 2. YOU'RE getting closer to recovering your info.
map/misSiONS
Mission 3
Mission 03: Well This Is Convenient...
The identity thief mentioned purchasing T-Swift merch. You decide to follow this lead across town to the Hot Topic store. You ask the clerk a couple of questions, but it seems to be a dead end. ...or is it? As you're leaving the store, a shadowy figure approaches. "Stay calm if you know what's good for you. If you ever want to see your data again, you'll answer these questions correctly."
Answer the question
First question
What is phishing?
A A popular social media platform
B A method of catching cybercriminals
C An attempt to trick you into revealing personal info
Answer the question
Second question
If you receive an email asking for your personal info or financial details and it seems suspicious, what should you do?
A Share it on social media for others to see
B Delete the email and report it as phishing
C Click on any links or download attachments to investigate further
Answer the question
Third question
Why should you regularly update your software and applications?
C Software never needs updating
A Updates often contain security patches to protect against vulnerabilities
B Updates add fun new features
Well done!
Fine, fine. Here's the second number of the secret code. Now if you don't mind, I have to go approach another stranger and ask random questions about cybersecurity. Odd, but that's what they pay me to do.
Continue
Congratulations! You've got your second secret number to open the briefcase.
Continue
New number obtained
Try again!
"WRONG. Say goodbye to your data." You must stand here and stare awkwardly at this man for 10 seconds before trying again.
you have successfully completed mission 3. You're so close to recovering your data, you can almost taste it...if data had a taste, that is.
map/miSsions
Mission 4
Days pass, and you hear nothing from the identity thieves. Then, one day, you receive a letter in the mail. It contains a single notecard with an address written on it. Maybe this is where the thieves have hidden the briefcase containing your data! You arrive at an abandoned warehouse (super original, I know) and notice several items scattered on the floor. Take a closer look.
Mission 04: The Thrilling Conclusion
Order
Arrange the steps below from MOST safe and responsible behavior to LEAST safe and responsible behavior when posting on social media.
Remember the order you form for later.
MOST Safe and Responsible
LEAST Safe and Responsible
Choose
What secret code have you obtained?
CDAB
BCAD
acbd
Try again!
Not the correct order!Wait 10 seconds, then you can try again.
Order
CORRECT!When it comes to spotting real or fake news online, arrange the following behaviors from the MOST responsible to LEAST responsible.
Remember the order you form for later.
MOST Responsible
LEAST Responsible
Choose
What secret code have you obtained?
CBAD
BCAD
acbd
Try again!
Not the correct order!Wait 10 seconds, then you can try again.
Order
CORRECT!If you suspect your personal data has been compromised or stolen, sort the following actions from the MOST recommended to LEAST recommended.
Remember the order you form for later.
MOST Recommended
LEAST Recommended
Choose
What secret code have you obtained?
DCAB
BCAD
DBAC
Try again!
Not the correct order!Wait 10 seconds, then you can try again.
Correct
Congratulations! You've got the last secret number to open the briefcase.
Continue
New number obtained
map/miSsions
The Briefcase
At the far end of the warehouse is a briefcase. It's time to open it.
Final Mission
Password?
What is the code?
Enter the correct numbers
Mission accomplished!
You have recovered your data! Congratulations!
Submit THIS FORM to be entered in a drawing for fabulous prizes!
Are you giving up?You were very close to getting your identity back!
If you leave, you will have to start all over againAre you sure you want to leave?
Continue
Exit