Taken Cybersecurity Adventure
hopkinsa
Created on September 27, 2023
More creations to inspire you
NERVOUS SYSTEM ESCAPE ROOM
Escape games
CEVICHE ESCAPE GAME
Escape games
THUNBERG CASE. TIME SOLDIERS
Escape games
SPACE INVADERS GAME
Escape games
A WORLD OF SPORTS
Escape games
HARRY POTTER ESCAPE GAME
Escape games
MISSION SANTA: MATH BREAKOUT
Escape games
Transcript
YOUR IDENTITY HAS BEEN STOLEN. TIME TO TAKE IT BACK.
start.
map/missions
Introduction:You're an ordinary student, minding your own business, when one day you wake up to a shocking discovery. Your digital life has been turned upside down. Identity thieves have struck, and your personal information has been taken.To get it back, you must infiltrate the cyber-underworld and complete the 4 missions that appear on the map. Make sure you have your notebook handy to write down the clues you get.If you collect all the clues, you will get the combination that opens the briefcase containing your stolen information.
Mission 01:The Cybersecurity Wake Up Call
Taken
A Cybersecurity Awareness Month Adventure
Open the card
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Incoming Call
Unknown
Your phone is ringing
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Incoming Call
Unknown
Your phone rings again. You should probably answer it. Just sayin'.
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Unknown
UNKNOWN CALLER
I assume you've received the letter. I know I could have just called you in the first place, but it wouldn't have had nearly the same dramatic effect.Are you ready to play the game?
YOU
Yes, but before we start, I have a threatening monologue to deliver.I don't know who you are. I don't know what you want. If you are looking for ransom, I can tell you I don't have money. But what I do have are a very particular set of cybersecurity skills that make me a nightmare for people like you. I will find my data, and I will delete your malware.
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Unknown
UNKNOWN CALLER
I'm oddly terrified. Let's begin.What is a recommended practice for creating strong passwords?
YOU
[Choose your response.]
Using easily guessable information like birthdays
Using common words or phrases
Combining uppercase and lowercase letters, numbers, and symbols
Reusing the same password for multiple accounts
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Unknown
UNKNOWN CALLER
Correct. Next question.Why is it important to use a password manager?
YOU
[Choose your response.]
It helps you remember your passwords
It makes your passwords shorter
It stores your passwords in plain text
It's not important; you can keep all your passwords in your head
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Unknown
UNKNOWN CALLER
Correct. One more.What does turning on multifactor authentication (MFA) add to your login process?
YOU
[Choose your response.]
A second layer of security beyond just a password
A faster login experience
The need to create longer passwords
The option to share your password with others
Want to get your info back?
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
CALL ENDED
UNKNOWN CALLER
WRONG.Say goodbye to your data!
Unknown
Try again?
Unknown
You must wait 10 seconds to try again.
3
3
2
2
1
1
0
0
1
1
5
5
9
9
2
2
6
6
8
8
8
8
4
4
2
2
2
2
4
4
2
2
5
5
2
2
2
2
3
3
2
2
7
7
0
0
9
9
2
2
2
2
7
7
3
3
3
3
2
2
2
2
1
1
1
1
0
0
0
0
1
1
1
1
5
5
5
5
9
9
9
9
2
2
2
2
6
6
6
6
8
8
8
8
8
8
8
8
4
4
4
4
2
2
2
2
2
2
2
2
4
4
4
4
2
2
2
2
5
5
5
5
2
2
2
2
2
2
2
2
3
3
3
3
2
2
2
2
7
7
7
7
0
0
0
0
9
9
9
9
2
2
2
2
2
2
2
2
7
7
7
7
Form the code
Drag the letters to this space to form the answer to the riddle.Then, write down the numbers that go with each letter in order to get the secret code.
Continue
UNKNOWN CALLER
Correct. Now look in the envelope we sent you. Notice that each letter has a corresponding number.Use the letters to answer this riddle:I am the solution to unlock a secret, A small tool, but incredibly potent. In cryptography, I play a vital role, Without me, your data wouldn't be whole. What am I?
Mission 02: Phishy Conversations
Mission 2
map/missions
Congratulations!you have successfully completed mission 1.don't lose the code you've just discovered!
The envelope from the indentity thieves has a return address on it. Either they are very, VERY stupid, or this is where they want you to go next.You arrive at the address to find a locked door in a dark alleyway.They try to hide in the shadows, you think to yourself, but they need to realize - I don't forgive, I don't forget, and I certainly don't allow pop-up ads.
Password?
Knock on the door and enter the secret code.
Correct
9
Congratulations! You've got your first secret number to open the briefcase.
Continue
New number obtained
Pay careful attention to the conversation to obtain information that will help you answer the questions in mission 3 correctly.
Watching closely
(Man) Oh yeah. Got a few suckers to give me their credit card numbers by pretending to be a Nigerian prince. It's amazing what people will fall for these days.
(Woman) Done any phishing lately?
(Woman) I can't believe people don't just immediately delete your emails and report them like they're supposed to.
(Man) Well I'm glad they don't! I just used one of the credit cards to buy some sweet T-Swift merch.
(Woman) By the way, I meant to ask, did you make sure to update the banking software?
(Man) Did you forget who you're talking to? I'm an identity thief. I know I gotta keep all my software up to date so I get the latest security patches. Can't have some other joker stealing my stolen info.
Pay close attentionto the conversation to get the answers to the questions in the next mission.
Continue
Mission 03: Well This Is Convenient...
map/misSiONS
Mission 3
Congratulations!you have successfully completed mission 2.YOU'RE getting closer to recovering your info.
The identity thief mentioned purchasing T-Swift merch. You decide to follow this lead across town to the Hot Topic store. You ask the clerk a couple of questions, but it seems to be a dead end....or is it? As you're leaving the store, a shadowy figure approaches."Stay calm if you know what's good for you. If you ever want to see your data again, you'll answer these questions correctly."
What is phishing?
A A popular social media platform
B A method of catching cybercriminals
C An attempt to trick you into revealing personal info
First question
Answer the question
If you receive an email asking for your personal info or financial details and it seems suspicious, what should you do?
A Share it on social media for others to see
B Delete the email and report it as phishing
C Click on any links or download attachments to investigate further
Second question
Answer the question
A Updates often contain security patches to protect against vulnerabilities
B Updates add fun new features
C Software never needs updating
Why should you regularly update your software and applications?
Third question
Answer the question
Fine, fine. Here's the second number of the secret code.Now if you don't mind, I have to go approach another stranger and ask random questions about cybersecurity. Odd, but that's what they pay me to do.
Well done!
Continue
9
Congratulations! You've got your second secret number to open the briefcase.
Continue
3
New number obtained
Try again!
"WRONG. Say goodbye to your data."You must stand here and stare awkwardly at this man for 10 seconds before trying again.
Mission 04: The Thrilling Conclusion
map/miSsions
Mission 4
you have successfully completed mission 3.You're so close to recovering your data, you can almost taste it...if data had a taste, that is.
Days pass, and you hear nothing from the identity thieves.Then, one day, you receive a letter in the mail. It contains a single notecard with an address written on it.Maybe this is where the thieves have hidden the briefcase containing your data!You arrive at an abandoned warehouse (super original, I know) and notice several items scattered on the floor. Take a closer look.
Order
Arrange the steps below from MOST safe and responsible behavior to LEAST safe and responsible behavior when posting on social media.
A
C
B
D
1
2
3
4
Remember the order you form for later.
MOST Safe and Responsible
LEAST Safe and Responsible
Choose
What secret code have you obtained?
acbd
BCAD
CDAB
Try again!
Not the correct order!Wait 10 seconds, then you cantry again.
Order
CORRECT!When it comes to spotting real or fake news online, arrange the following behaviors from the MOST responsible to LEAST responsible.
A
C
B
D
1
2
3
4
Remember the order you form for later.
MOST Responsible
LEAST Responsible
Choose
What secret code have you obtained?
acbd
BCAD
CBAD
Try again!
Not the correct order!Wait 10 seconds, then you cantry again.
Order
CORRECT!If you suspect your personal data has been compromised or stolen, sort the following actions from the MOST recommended to LEAST recommended.
A
C
B
D
1
2
3
4
Remember the order you form for later.
MOST Recommended
LEAST Recommended
Choose
What secret code have you obtained?
DBAC
BCAD
DCAB
Try again!
Not the correct order!Wait 10 seconds, then you cantry again.
Correct
9
Congratulations! You've got the last secret number to open the briefcase.
Continue
3
4
New number obtained
Final Mission
map/miSsions
The Briefcase
At the far end of the warehouse is a briefcase. It's time to open it.
Password?
Open the briefcase
Mission accomplished!
You have recovered your data! Congratulations!
Submit THIS FORM to be entered in a drawing for fabulous prizes!
Are you giving up?You were very close to getting your identity back!
Continue
Exit
If you leave, you will have to start all over againAre you sure you want to leave?