Want to create interactive content? It’s easy in Genially!

Get started free

Cyber Security Awareness Escape Game

Heaven Clacken

Created on September 24, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Adventure Breakout

Team Building Mission Escape Game

Onboarding Escape Game

Christmas Escape Room

Flags Challenge

Museum Escape Room

Education Escape Room

Transcript

Cyber security Awareness ESCAPE GAME

start

Brought to you by SWH Cyber Security Team

THE MISSION

As a cyber detective, you have been tasked with solving a series of puzzles to protect Summit Wash Holdings from a Cyber Threat.

Find the clue you need to keep moving forward

QUESTION 1/3

What kind of phishing attempt is this?

Smishing

Quishing

QUESTION 2/3

What should you do when receiving an email similar to the one below?

Click on the link to login and/or contact using one of the provided links.

Call the company using a known and reputable number.

QUESTION 3/3

Based on looking at this example, what indicates that it may be a phishing attempt?

The Teams logos being blocked

The email is info@axispointe.com

THE base

Find the clue you need to keep moving forward

QUESTION 1/3

Investigate the emails contents and report it using the PhishAlarm button.

What should you do when receiving an email similar to the one below?

Investigate the emails contents and click the button and reset/keep my password.

Reply to the sender to verify.

QUESTION 2/3

Russelspeeders123

Which password is the strongest out of the ones provided?

Ru$$elsp3eders!45

R$CW

QUESTION 3/3

No one

If asked for your password, who should you share it with?

IT

Your Supervisor

the base

Find the clue you need to keep moving forward

QUESTION 1/3

A communication that seems urgent and asks you to bypass standard procedures.

Which of the following is most likely not an example of social engineering?

An email from microsoft asking you to change your password.

A coworker shouldersurfing while you work.

QUESTION 2/3

An attack aimed at disrupting service availability.

Which of the following is an accurate description of social engineering?

A cyber crime that exploits software vulnerabilities.

An attack that exploits human psychology rather than technical vulnerabilities.

QUESTION 3/3

cyber terrorism

Which of the following would be classified as a social engineering attempt?

Quishing

Malware hidden in an app

the base

Find the clue you need to keep moving forward

QUESTION 1/3

Option to accept all cookies

Ads

What should you look for when browsing the internet?

HTTP

HTTPS

QUESTION 2/3

Close the browser, log off your device, and contact IT.

What should you do if you encounter the below pop up?

Click allow

Click deny

Ignore and continue scrolling

QUESTION 3/3

Using different passwords for several sites

Connecting to public Wi-Fi

Which action should you try your hardest to avoid?

Utilizing a VPN.

Hovering over links and attachments to see where they might take you.

Mission Complete

You've saved Summit Wash Holdings!

START OVER?

Are you sure you want to go out?

You will lose progress

exit

back

MISSION FAILED

try again