Want to create interactive content? It’s easy in Genially!

Over 30 million people create interactive content in Genially.

Check out what others have designed:

Transcript

BREAKOUT

malware

PRESS START

MENU

Introduction

characters

missions

© 2024 CCR Computing GAMES

HI-SCORE

232323

INTRODUCTION

Malware is spreading fast, data is corrupting, and the system is on the verge of collapse. Can you fortify your defenses, purge the threats, and restore order in this digital battleground?

© 2024 CCR Computing GAMES

HI-SCORE

232323

CHARACTERS

Complete each level and make a note of the numbers you receive

virushunter

firewallfighter

trojanslayer

wormkiller

MISSIONS

Complete the missions to obtain the password numbers

1 SHIPS

2 PUZZLE

PASSWORD

3 BARS

4 FROG

LEVEL 1/5

Which of the following is a type of malware that disguises itself as a legitimate program to trick users into installing it?

trojan horse

Anti malware

phishing email

LEVEL 2/5

What word meaning 'intending harm' gives us the 'mal' in malware?

malevolent

malicious

malfunction

LEVEL 3/5

Which type of malware encrypts files and demands payment to release them?

ransomware

trojan horse

adware

LEVEL 4/5

What keywords are most associated with encryption?

binary and data

padlock and virus

scramble and key

LEVEL 5/5

Which is a type of malware that displays unwanted pop ups on your computer or device?

spyware

adware

ransomware

CONGRATULATIONS!

THE NUMBER OF THIS MISSION IS 91

GAME OVER

CONTINUE?

yes

NO

PASSWORD

MISSIONS

Complete the missions to obtain thepassword numbers

1 SHIPS

2 PUZZLE

3 BARS

4 FROG

LEVEL 1/5

What is a type of malware that collects your personal information and gathers data about you without your consent?

NEXT

adware

spyware

ransomware

LEVEL 2/5

What is a group of computers which have been infected by malware and have come under the control of a cyber criminal called?

NEXT

zombie army

botnet

evil net

LEVEL 3/5

What type of malware makes copies of itself and spreads WITHOUT human interaction?

NEXT

worm

virus

trojan

LEVEL 4/5

What is gaining unauthorised access to a system called?

NEXT

injecting viruses

spreading malware

hacking

LEVEL 5/5

Which type of hacker finds vulnerabilities and tells the organisation about them?

grey hat

NEXT

black hat

white hat

CONGRATULATIONS!

THE NUMBER OF THIS MISSION IS 74

GAME OVER

CONTINUE?

yes

NO

PASSWORD

MISIONES

Complete the missions to obtain the password numbers

1 SHIPS

2 PUZZLE

3 BARS

4 FROG

LEVEL 1/5

A worm self-replicates but does NOT need humans to activate it.

true

false

i don't know!

LEVEL 2/5

You get an email saying it is from your bank. It says to click a link to verify your account. What is this?

spam email

a phishing email

junk email

LEVEL 3/5

You get a call from fake tech support saying your computer is broken. They want remote access. What is this

pretexting

baiting

scareware

LEVEL 4/5

Pop-up warns of fake errors & pushes a security download. What is it?

ransomware

spyware

scareware

LEVEL 5/5

You see a free download advertised with an amazing feature, but clicking the link takes you to a suspicious website. What is this tactic called?

pretexting

phishing

baiting

CONGRATULATIONS!

THE NUMBER OF THIS MISSION IS 53

GAME OVER

CONTINUE?

yes

NO

PASSWORD

MISIONES

Complete the missions to obtain thenumbers of the password

1 SHIPS

2 PUZZLE

3 BARS

4 FROG

LEVEL 1/3

Your favourite website is slow & not responding for you or anyone else. What type of cyber attack is most likely happening?

ransomware attack

phishing attack

Denial of service attack

LEVEL 2/3

Which types of hacker hack to steal personal information for their own gain?

white hat

black hat

grey hat

LEVEL 3/3

How can an organisation try to prevent hacking?

employ a network manager

install anti malware software

set up a firewall

CONGRATULATIONS!

THE NUMBER OF THIS MISSION IS 62

GAME OVER

CONTINUE?

yes

NO

PASSWORD

MISIONES

Complete the missions to obtain thepassword numbers

1 SHIPS

2 PUZZLE

3 BARS

4 FROG

Enter the password to complete the mission

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

MISIONSHIPS

let's get started!

CONTINUE

wormkiller

I spot those pesky self-replicating worms that avoid human contact & stop them before they start doing damage

Are you sure you want to exit?

You will lose all the progress

yes

NO

firewallfighter

I protect the system from unauthorised access to the system. Beware hackers!

MISSIONpuzzle

Good work so far!

CONTINUE

Missionbars

You're winning against the cyber criminals. Keep it up!

CONTINUE

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

MISSIONfrog

You're nearly at the end. Keep up the good work!

CONTINUE

Are you sure you want to exit?

You will lose all the progress

yes

NO

trojanslayer

I look out for hidden malware and kill it before it can gallop on to the system!

virushunter

i hunt out those self-replicating viruses and quarantine them to stop them doing harm.

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO

Are you sure you want to exit?

You will lose all the progress

yes

NO