Cybersecurity
Maria Aranda
Created on September 27, 2024
Over 30 million people build interactive content in Genially.
Check out what others have designed:
CEVICHE ESCAPE GAME
Escape games
SPACE INVADERS GAME
Escape games
THUNBERG CASE. TIME SOLDIERS
Escape games
MINERALS AND ROCKS
Escape games
HARRY POTTER ESCAPE GAME
Escape games
HARRY POTTER
Escape games
MISSION SANTA: MATH BREAKOUT
Escape games
Transcript
Cybersecurity
Knowledge check
start
Welcome to the Cybersecurity Challenge
Protecting our information online is more crucial than ever in today's digital age. This quiz will test your knowledge on various aspects of cybersecurity, from identifying phishing scams to understanding malware and social engineering tactics. This quiz is designed to test your knowledge on how to prevent and mitigate cyber attacks. Get ready to dive into the world of cyber threats and defenses. Remember, every question is an opportunity to learn something new and enhance your cyber-safety skills. Good luck, and may the best cyber defender win!
Test 1
Test 2
Test 3
Test 4
Test 5
Final Test
Tests
Complete each test to beat the game: there is no other way to escape!
1/3
Icebreaker question:A cyber security threat is any malicious attempt or act that can harm your computer or network, steal information, or disrupt operations.
FALSE
TRUE
Test 1
You're doing great. Next question:Your parent received an email from the school with the SUBJECT: link for Fun Run donationsWhat advice will you give your parent?
2/3
Yes. We do have an upcoming Fun Run. It is okay to click the link to donate.
Ask the school office first before you click the link, to verify if they sent thes link for donations.
Let's check the link to see if this is a legitimate website. We can ask the office if the link does not work.
Test 1
You're almost there.All of these are examples of malware EXCEPT?
3/3
VIRUS
WORMS
BUGS
TROJANS
Test 1
Test 1
Test 2
Test 3
Test 4
Test 5
Final test
Tests
Complete each test to beat the game: there is no other way to escape!
1/3
Watch this video and answer the question below:Which one of these examples is NOT a form of phishing?
An email from paypal was received letting you know that your password needs to be changed because it is compromised.
You installed a software from a website. The software gained access to your files.
A payment request from Venmo for your recent Amazon purchase. You do not remember buying anything.
Test 2
Now play this video and answer:
2/3
Test 2
Last video of the test:What is the primary goal of a DDoS attack?
3/3
To gain unauthorized access to a computer system.
To steal sensitive data
To disrupt the normal traffic of a targeted server, service, or network
Test 2
Test 1
Test 2
Test 3
Test 4
Test 5
Final Test
Tests
Complete each test to beat the game: there is no other way to escape!
Take a good look at this image:Is this a phishing email?
1/3
True
False
Test 3
You found a USB drive at Starbucks and are tempted to check the picture files to identify the owner on Instagram. Is it okay to do this?
2/3
No. USB might contain a computer virus.
Yes. USB only contains pictures.
Test 3
IG Pictures
You are about to get it:Is this an example of a phishing email?
3/3
Test 3
True
False
Test 1
Test 2
Test 3
Test 4
Test 5
Final Test
Tests
Complete each test to beat the game: there is no other way to escape!
2/3
continuE
Drag concepts to the corresponding group
Malware
Phishing
1. Worm
2. Adware
3. Email hacking
Solución
4. Spyware
5. Fraudulent social media account
SOLUTION
6. Fake Wifi network
Test 4
Test 1
Test 2
Test 3
Test 4
Test 5
Final Test
Tests
Complete each test to beat the game: there is no other way to escape!
1/2
A strong password should include a combination of uppercase and lowercase letters, numbers, and special characters.
Test 5
Great idea!
I won't remember the password.
2/3
Test 5
Test 1
Test 2
Test 3
Test 4
Test 5
Final Test
Tests
Complete each test to beat the game: there is no other way to escape!
Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.
In Google docs or a sheet of paper, describe the following cyber attacks and write one prevention or mitigation strategy.
1
EMAIL PHISHING
Test 6
ANGLER PHISHING
TROJANS
WORMS
DDoS
Completed
Congratulations, you have successfully completed your assessment!!
Start over?
back
That answer is not correct...
But don't lose your balance, continue on your way and try again!
Oh oh!
Malware
1. Worm2. Adware4. Spyware
Phishing
3. email hacking5. fraudulent social media account6. Fake Wifi network