IMPOSTOR ESCAPE - Cyber security
Liliana Upegui
Created on December 9, 2023
More creations to inspire you
HARRY POTTER ESCAPE GAME
Escape games
HARRY POTTER
Escape games
MISSION SANTA: MATH BREAKOUT
Escape games
KINGDOM HEARTS ESCAPE ROOM
Escape games
POKEMON LET'S GO ENGLISH
Escape games
Transcript
START
IMPOSTOR!
ESCAPE
ESCAPE
IMPOSTOR!
An alien has entered our ship and is trying to replace the crew. We need to know what body he is in and expel him before he takes control of everyone. We cannot return to Earth until we are sure that he is not one of us!
ALERT! ALERT!
GO!
CLOSE THE DOOR
With your nerves you have forgotten the password to close the main hatch of the ship.Answer the cyber security questions correctly to close it!
CLOSE THE DOOR
Answer correctly
Click the link and see where it goes
Hover over the link to reveal the actual url
What is the best way to check if a link in an email is legitimate?
CLOSE THE DOOR
Answer correctly
Implement clear policies and provide training
Monitor all employee activity closely
What can organisations do to prevent data leakage caused by employees?
CLOSE THE DOOR
Answer correctly
Installing strong antivirus software
Verify unusual requests
What is the best way to protect yourself from social engineering?
CLOSE THE door
Answer correctly
Which of the following best describes the principle of defense-in-depth?
Implementing multiple layers of security measures
Relying on a perfect security mechanism
next
All right! Gate closed!
CHECK ALL ROOMS
Find the impostors in each room
Room 1
Room 2
Room 3
Room 4
LOCKED ROOM
LOCKED ROOM
LOCKED ROOM
IDENTIFY THE IMPOSTOR!
It adds an extra layer of security beyond username and password
2FA completely prevents account compromise even if your password is leaked
YubiKeys offer superior 2FA security
It is recommended for email accounts and administrative passwords
Point out to the crew member who is NOT telling the truth regarding two-factor authentication
LOOK FOR THE ALIEN!
Drag the light for the suspect
CHECK ALL ROOMS
Find the impostors in each room
Room 2
Room 3
Room 4
LOCKED ROOM
LOCKED ROOM
IDENTIFY THE IMPOSTOR!
Ransomware attackers may request a copy of the cyber liability plan
Companies might receive back their deductible after paying ransom
Cyber liability insurance guarantees complete coverage of the ransom
Point out to the crew member who is NOT telling the truth regarding ransomware incidents
LOOK FOR THE ALIEN!
Drag the light for the suspect
CHECK ALL ROOMS
Find the impostors in each room
Room 3
Room 4
LOCKED ROOM
IDENTIFY THE IMPOSTOR!
Should be memorable
Use a password manager
Point out to the crew member who is NOT telling the truth regarding strong passwords
LOOK FOR THE ALIEN!
Drag the light for the suspect
CHECK ALL ROOMS
Find the impostors in each room
Room 4
IDENTIFY THE IMPOSTOR!
... there is only one person left
EXPEL THE ALIEN
Choose THE TRUTH
Which of the following is true about social engineering?
Uses familiar terms
Requires physical access
EXPEL THE ALIEN
Choose THE TRUTH
Which of the following statements is true about data stored in the cloud?
Cloud data has a level of permanence
Deleted data is always permanently removed
EXPEL THE ALIEN
Choose THE TRUTH
Which of the following is true about clicking the "unsubscribe" button in spam emails?
Clicking it helps reduce spam
Clicking it may lead to more spam
EXPEL THE ALIEN
Choose THE TRUTH
VERY WELL!
CONGRATULATIONS!
All rooms are clean
OH NO!
TRY AGAIN
The alien is in your body
Now you are the impostor ...
But first, you may find useful retaking the lesson: Phishing
THERE ARE NO ALIENS HERE!
Tells the truth
But first, you may find useful retaking the lesson: 2 Factor Protections
TRY AGAIN
OH NO!
The alien is in your body
Now you are the impostor ...
try again
YES!
NO!
Are you sure you want to goback to the beginning?
You will lose all your progress
SEE YOUON EARTH!
"We return home with the certainty that none of us is an imposter ...or so we think.End of transmission."
OH NO!
TRY AGAIN
The alien is in your body
Now you are the impostor ...
But first, you may find useful retaking the lesson: Data Leak Prevention
OH NO!
TRY AGAIN
The alien is in your body
Now you are the impostor ...
But first, you may find useful retaking the lesson: Social Engineering
OH NO!
TRY AGAIN
The alien is in your body
Now you are the impostor ...
But first, you may find useful retaking the lesson: Cyber Security
THERE ARE NO ALIENS HERE!
Tells the truth
But first, you may find useful retaking the lesson: Cyber Security Insurance
TRY AGAIN
THERE ARE NO ALIENS HERE!
Tells the truth
But first, you may find useful retaking the lesson: Strong Passwords
TRY AGAIN
OH NO!
The alien is in your body
Now you are the impostor ...
try again
But first, you may find useful retaking the lesson: Social Engineering
OH NO!
The alien is in your body
Now you are the impostor ...
try again
But first, you may find useful retaking the lesson: The Cloud and Digital Permanence
OH NO!
The alien is in your body
Now you are the impostor ...
try again
But first, you may find useful retaking the lesson: Spam