Want to create interactive content? It’s easy in Genially!
Cybersecurity
Maria Aranda
Created on September 27, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Secret Code
View
Corporate Escape Room: Operation Christmas
View
Reboot Protocol
View
Desert Island Escape
View
Halloween escape
View
Horror Escape Room
View
Witchcraft Escape Room
Transcript
Cybersecurity
Knowledge check
start
Welcome to the Cybersecurity Challenge
Protecting our information online is more crucial than ever in today's digital age. This quiz will test your knowledge on various aspects of cybersecurity, from identifying phishing scams to understanding malware and social engineering tactics. This quiz is designed to test your knowledge on how to prevent and mitigate cyber attacks. Get ready to dive into the world of cyber threats and defenses. Remember, every question is an opportunity to learn something new and enhance your cyber-safety skills. Good luck, and may the best cyber defender win!
Tests
Complete each test to beat the game: there is no other way to escape!
Test 1
Test 2
Test 3
Final Test
Test 4
Test 5
Test 1
1/3
Icebreaker question: A cyber security threat is any malicious attempt or act that can harm your computer or network, steal information, or disrupt operations.
TRUE
FALSE
Test 1
2/3
You're doing great. Next question:Your parent received an email from the school with the SUBJECT: link for Fun Run donations What advice will you give your parent?
Yes. We do have an upcoming Fun Run. It is okay to click the link to donate.
Ask the school office first before you click the link, to verify if they sent thes link for donations.
Let's check the link to see if this is a legitimate website. We can ask the office if the link does not work.
Test 1
3/3
You're almost there.All of these are examples of malware EXCEPT?
VIRUS
WORMS
BUGS
TROJANS
Tests
Complete each test to beat the game: there is no other way to escape!
Test 2
Test 1
Test 3
Test 5
Final test
Test 4
1/3
Test 2
Watch this video and answer the question below:Which one of these examples is NOT a form of phishing?
An email from paypal was received letting you know that your password needs to be changed because it is compromised.
You installed a software from a website. The software gained access to your files.
A payment request from Venmo for your recent Amazon purchase. You do not remember buying anything.
2/3
Test 2
Now play this video and answer:
3/3
Test 2
Last video of the test:What is the primary goal of a DDoS attack?
To gain unauthorized access to a computer system.
To steal sensitive data
To disrupt the normal traffic of a targeted server, service, or network
Tests
Complete each test to beat the game: there is no other way to escape!
Test 1
Test 2
Test 3
Test 4
Test 5
Final Test
1/3
Test 3
Take a good look at this image:Is this a phishing email?
True
False
Test 3
2/3
You found a USB drive at Starbucks and are tempted to check the picture files to identify the owner on Instagram. Is it okay to do this?
IG Pictures
No. USB might contain a computer virus.
Yes. USB only contains pictures.
Test 3
3/3
You are about to get it:Is this an example of a phishing email?
True
False
Tests
Complete each test to beat the game: there is no other way to escape!
Test 1
Test 2
Test 3
Test 4
Test 5
Final Test
Test 4
2/3
Drag concepts to the corresponding group
Malware
Phishing
1. Worm
2. Adware
3. Email hacking
4. Spyware
5. Fraudulent social media account
6. Fake Wifi network
continuE
Solución
SOLUTION
Tests
Complete each test to beat the game: there is no other way to escape!
Test 1
Test 2
Test 3
Test 4
Test 5
Final Test
Test 5
1/2
A strong password should include a combination of uppercase and lowercase letters, numbers, and special characters.
I won't remember the password.
Great idea!
Test 5
2/3
Tests
Complete each test to beat the game: there is no other way to escape!
Test 1
Test 2
Test 3
Final Test
Test 5
Test 4
Test 6
In Google docs or a sheet of paper, describe the following cyber attacks and write one prevention or mitigation strategy.
EMAIL PHISHING
ANGLER PHISHING
TROJANS
WORMS
DDoS
Completed
Congratulations, you have successfully completed your assessment!!
Start over?
Oh oh!
That answer is not correct...
But don't lose your balance, continue on your way and try again!
back
Malware
1. Worm 2. Adware 4. Spyware
Phishing
3. email hacking 5. fraudulent social media account 6. Fake Wifi network