Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

YOUR IDENTITY HAS BEEN STOLEN. TIME TO TAKE IT BACK.

start.

map/missions

Introduction:You're an ordinary student, minding your own business, when one day you wake up to a shocking discovery. Your digital life has been turned upside down. Identity thieves have struck, and your personal information has been taken.To get it back, you must infiltrate the cyber-underworld and complete the 4 missions that appear on the map. Make sure you have your notebook handy to write down the clues you get.If you collect all the clues, you will get the combination that opens the briefcase containing your stolen information.

Mission 01:The Cybersecurity Wake Up Call

Taken

A Cybersecurity Awareness Month Adventure

Open the card

Want to get your info back?

It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.

Want to get your info back?

It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.

Incoming Call

Unknown

Your phone is ringing

Want to get your info back?

It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.

Incoming Call

Unknown

Your phone rings again. You should probably answer it. Just sayin'.

Want to get your info back?

It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.

Unknown

UNKNOWN CALLER

I assume you've received the letter. I know I could have just called you in the first place, but it wouldn't have had nearly the same dramatic effect.Are you ready to play the game?

YOU

Yes, but before we start, I have a threatening monologue to deliver.I don't know who you are. I don't know what you want. If you are looking for ransom, I can tell you I don't have money. But what I do have are a very particular set of cybersecurity skills that make me a nightmare for people like you. I will find my data, and I will delete your malware.

Want to get your info back?

It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.

Unknown

UNKNOWN CALLER

I'm oddly terrified. Let's begin.What is a recommended practice for creating strong passwords?

YOU

[Choose your response.]

Using easily guessable information like birthdays

Using common words or phrases

Combining uppercase and lowercase letters, numbers, and symbols

Reusing the same password for multiple accounts

Want to get your info back?

It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.

Unknown

UNKNOWN CALLER

Correct. Next question.Why is it important to use a password manager?

YOU

[Choose your response.]

It helps you remember your passwords

It makes your passwords shorter

It stores your passwords in plain text

It's not important; you can keep all your passwords in your head

Want to get your info back?

It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.

Unknown

UNKNOWN CALLER

Correct. One more.What does turning on multifactor authentication (MFA) add to your login process?

YOU

[Choose your response.]

A second layer of security beyond just a password

A faster login experience

The need to create longer passwords

The option to share your password with others

Want to get your info back?

It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.

CALL ENDED

UNKNOWN CALLER

WRONG.Say goodbye to your data!

Unknown

Try again?

Unknown

You must wait 10 seconds to try again.

3

3

2

2

1

1

0

0

1

1

5

5

9

9

2

2

6

6

8

8

8

8

4

4

2

2

2

2

4

4

2

2

5

5

2

2

2

2

3

3

2

2

7

7

0

0

9

9

2

2

2

2

7

7

3

3

3

3

2

2

2

2

1

1

1

1

0

0

0

0

1

1

1

1

5

5

5

5

9

9

9

9

2

2

2

2

6

6

6

6

8

8

8

8

8

8

8

8

4

4

4

4

2

2

2

2

2

2

2

2

4

4

4

4

2

2

2

2

5

5

5

5

2

2

2

2

2

2

2

2

3

3

3

3

2

2

2

2

7

7

7

7

0

0

0

0

9

9

9

9

2

2

2

2

2

2

2

2

7

7

7

7

Form the code

Drag the letters to this space to form the answer to the riddle.Then, write down the numbers that go with each letter in order to get the secret code.

Continue

UNKNOWN CALLER

Correct. Now look in the envelope we sent you. Notice that each letter has a corresponding number.Use the letters to answer this riddle:I am the solution to unlock a secret, A small tool, but incredibly potent. In cryptography, I play a vital role, Without me, your data wouldn't be whole. What am I?

Mission 02: Phishy Conversations

Mission 2

map/missions

Congratulations!you have successfully completed mission 1.don't lose the code you've just discovered!

The envelope from the indentity thieves has a return address on it. Either they are very, VERY stupid, or this is where they want you to go next.You arrive at the address to find a locked door in a dark alleyway.They try to hide in the shadows, you think to yourself, but they need to realize - I don't forgive, I don't forget, and I certainly don't allow pop-up ads.

Password?

Knock on the door and enter the secret code.

Correct

9

Congratulations! You've got your first secret number to open the briefcase.

Continue

New number obtained

Pay careful attention to the conversation to obtain information that will help you answer the questions in mission 3 correctly.

Watching closely

(Man) Oh yeah. Got a few suckers to give me their credit card numbers by pretending to be a Nigerian prince. It's amazing what people will fall for these days.

(Woman) Done any phishing lately?

(Woman) I can't believe people don't just immediately delete your emails and report them like they're supposed to.

(Man) Well I'm glad they don't! I just used one of the credit cards to buy some sweet T-Swift merch.

(Woman) By the way, I meant to ask, did you make sure to update the banking software?

(Man) Did you forget who you're talking to? I'm an identity thief. I know I gotta keep all my software up to date so I get the latest security patches. Can't have some other joker stealing my stolen info.

Pay close attentionto the conversation to get the answers to the questions in the next mission.

Continue

Mission 03: Well This Is Convenient...

map/misSiONS

Mission 3

Congratulations!you have successfully completed mission 2.YOU'RE getting closer to recovering your info.

The identity thief mentioned purchasing T-Swift merch. You decide to follow this lead across town to the Hot Topic store. You ask the clerk a couple of questions, but it seems to be a dead end....or is it? As you're leaving the store, a shadowy figure approaches."Stay calm if you know what's good for you. If you ever want to see your data again, you'll answer these questions correctly."

What is phishing?

A A popular social media platform

B A method of catching cybercriminals

C An attempt to trick you into revealing personal info

First question

Answer the question

If you receive an email asking for your personal info or financial details and it seems suspicious, what should you do?

A Share it on social media for others to see

B Delete the email and report it as phishing

C Click on any links or download attachments to investigate further

Second question

Answer the question

A Updates often contain security patches to protect against vulnerabilities

B Updates add fun new features

C Software never needs updating

Why should you regularly update your software and applications?

Third question

Answer the question

Fine, fine. Here's the second number of the secret code.Now if you don't mind, I have to go approach another stranger and ask random questions about cybersecurity. Odd, but that's what they pay me to do.

Well done!

Continue

9

Congratulations! You've got your second secret number to open the briefcase.

Continue

3

New number obtained

Try again!

"WRONG. Say goodbye to your data."You must stand here and stare awkwardly at this man for 10 seconds before trying again.

Mission 04: The Thrilling Conclusion

map/miSsions

Mission 4

you have successfully completed mission 3.You're so close to recovering your data, you can almost taste it...if data had a taste, that is.

Days pass, and you hear nothing from the identity thieves.Then, one day, you receive a letter in the mail. It contains a single notecard with an address written on it.Maybe this is where the thieves have hidden the briefcase containing your data!You arrive at an abandoned warehouse (super original, I know) and notice several items scattered on the floor. Take a closer look.

Order

Arrange the steps below from MOST safe and responsible behavior to LEAST safe and responsible behavior when posting on social media.

A

C

B

D

1

2

3

4

Remember the order you form for later.

MOST Safe and Responsible

LEAST Safe and Responsible

Choose

What secret code have you obtained?

acbd

BCAD

CDAB

Try again!

Not the correct order!Wait 10 seconds, then you cantry again.

Order

CORRECT!When it comes to spotting real or fake news online, arrange the following behaviors from the MOST responsible to LEAST responsible.

A

C

B

D

1

2

3

4

Remember the order you form for later.

MOST Responsible

LEAST Responsible

Choose

What secret code have you obtained?

acbd

BCAD

CBAD

Try again!

Not the correct order!Wait 10 seconds, then you cantry again.

Order

CORRECT!If you suspect your personal data has been compromised or stolen, sort the following actions from the MOST recommended to LEAST recommended.

A

C

B

D

1

2

3

4

Remember the order you form for later.

MOST Recommended

LEAST Recommended

Choose

What secret code have you obtained?

DBAC

BCAD

DCAB

Try again!

Not the correct order!Wait 10 seconds, then you cantry again.

Correct

9

Congratulations! You've got the last secret number to open the briefcase.

Continue

3

4

New number obtained

Final Mission

map/miSsions

The Briefcase

At the far end of the warehouse is a briefcase. It's time to open it.

Password?

Open the briefcase

Mission accomplished!

You have recovered your data! Congratulations!

Submit THIS FORM to be entered in a drawing for fabulous prizes!

Are you giving up?You were very close to getting your identity back!

Continue

Exit

If you leave, you will have to start all over againAre you sure you want to leave?