Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

Cybersecurity

Knowledge check

start

Welcome to the Cybersecurity Challenge

Protecting our information online is more crucial than ever in today's digital age. This quiz will test your knowledge on various aspects of cybersecurity, from identifying phishing scams to understanding malware and social engineering tactics. This quiz is designed to test your knowledge on how to prevent and mitigate cyber attacks. Get ready to dive into the world of cyber threats and defenses. Remember, every question is an opportunity to learn something new and enhance your cyber-safety skills. Good luck, and may the best cyber defender win!

Test 1

Test 2

Test 3

Test 4

Test 5

Final Test

Tests

Complete each test to beat the game: there is no other way to escape!

1/3

Icebreaker question:A cyber security threat is any malicious attempt or act that can harm your computer or network, steal information, or disrupt operations.

FALSE

TRUE

Test 1

You're doing great. Next question:Your parent received an email from the school with the SUBJECT: link for Fun Run donationsWhat advice will you give your parent?

2/3

Yes. We do have an upcoming Fun Run. It is okay to click the link to donate.

Ask the school office first before you click the link, to verify if they sent thes link for donations.

Let's check the link to see if this is a legitimate website. We can ask the office if the link does not work.

Test 1

You're almost there.All of these are examples of malware EXCEPT?

3/3

VIRUS

WORMS

BUGS

TROJANS

Test 1

Test 1

Test 2

Test 3

Test 4

Test 5

Final test

Tests

Complete each test to beat the game: there is no other way to escape!

1/3

Watch this video and answer the question below:Which one of these examples is NOT a form of phishing?

An email from paypal was received letting you know that your password needs to be changed because it is compromised.

You installed a software from a website. The software gained access to your files.

A payment request from Venmo for your recent Amazon purchase. You do not remember buying anything.

Test 2

Now play this video and answer:

2/3

Test 2

Last video of the test:What is the primary goal of a DDoS attack?

3/3

To gain unauthorized access to a computer system.

To steal sensitive data

To disrupt the normal traffic of a targeted server, service, or network

Test 2

Test 1

Test 2

Test 3

Test 4

Test 5

Final Test

Tests

Complete each test to beat the game: there is no other way to escape!

Take a good look at this image:Is this a phishing email?

1/3

True

False

Test 3

You found a USB drive at Starbucks and are tempted to check the picture files to identify the owner on Instagram. Is it okay to do this?

2/3

No. USB might contain a computer virus.

Yes. USB only contains pictures.

Test 3

IG Pictures

You are about to get it:Is this an example of a phishing email?

3/3

Test 3

True

False

Test 1

Test 2

Test 3

Test 4

Test 5

Final Test

Tests

Complete each test to beat the game: there is no other way to escape!

2/3

continuE

Drag concepts to the corresponding group

Malware

Phishing

1. Worm

2. Adware

3. Email hacking

Solución

4. Spyware

5. Fraudulent social media account

SOLUTION

6. Fake Wifi network

Test 4

Test 1

Test 2

Test 3

Test 4

Test 5

Final Test

Tests

Complete each test to beat the game: there is no other way to escape!

1/2

A strong password should include a combination of uppercase and lowercase letters, numbers, and special characters.

Test 5

Great idea!

I won't remember the password.

2/3

Test 5

Test 1

Test 2

Test 3

Test 4

Test 5

Final Test

Tests

Complete each test to beat the game: there is no other way to escape!

Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.

In Google docs or a sheet of paper, describe the following cyber attacks and write one prevention or mitigation strategy.

1

EMAIL PHISHING

Test 6

ANGLER PHISHING

TROJANS

WORMS

DDoS

Completed

Congratulations, you have successfully completed your assessment!!

Start over?

back

That answer is not correct...

But don't lose your balance, continue on your way and try again!

Oh oh!

Malware

1. Worm2. Adware4. Spyware

Phishing

3. email hacking5. fraudulent social media account6. Fake Wifi network