Want to make interactive content? It’s easy in Genially!

Over 30 million people build interactive content in Genially.

Check out what others have designed:

Transcript

Cyber Safety Escape Room

Who will be the first to unlock all the rooms and escape?!

start

Introduction

Today, you will work to solve a series of puzzles related to staying safe online. Each puzzle will challenge your knowledge about key areas of cyber safety, such as recognizing phishing emails, creating strong passwords, avoiding malware, protecting your social media privacy, and identifying misinformation.The answers to the puzzles will unlock the next clue, and you’ll work your way through the challenges until you’ve completed all the levels. Pay attention to the details in each puzzle because they will help you stay safe in the digital world!

Welcome to the Cyber Safety Escape Room!

+ info

Phishing Emails

Room 2

Room 3

Room 4

Room 5

Final Room

Escape Rooms

Complete each locked room to beat the game: there is no other way to escape!

Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.

1/3

Which of the following email addresses and messages is likely to be from a phishing email?

From: noreply@emails.sainsburys.nectar.comSubject: Join the Count up to Christmas challenge in the Nectar app.

From: mail1853902w12jandtc@natwest.comSubject: Reminder - USD3,850,000.00 compensation payment to you, reply for details. From, Natwest Bank.

Test 1

Which of the following is likely to be seen in a phishing email

2/3

correct grammar

urgent language

from a recognised brand

Test 1

What should you do if you receive an email from an unknown sender asking for your personal information?

3/3

Click the link and fill in your details immediately

Reply to the email asking for more information

Delete the email without clicking any links

Share the email with your friends

Test 1

Phishing emails - done!

Password safety

Room 3

Room 4

Room 5

Final room

Escape Rooms

Complete each locked room to beat the game: there is no other way to escape!

Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.

1/3

Watch this video. Then answer the question:According to the video, which is the safest password to use ?

16thJuly2010

shoewindowdogphone

CarolineSteele2023

Test 2

Which of these would be the safest password according to the video?

2/3

K9@Y9&x3

abcdefg123

oldhabitsdiescreaming

Test 2

Which of the following should you NOT do to keep your passwords safe?

3/3

Use two-factor authentication

Use different passwords for every app and device

Test 2

Write your passwords on a piece of paper and keep it in your bag

Phishing emails - done!

Password Safety - done!

Avoiding Malware

Room 4

Room 5

Final Room

Tests

Complete each test to beat the game: there is no other way to escape!

Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.

Take a good look at this image:T/F? Malware is a type of program that only shows unwanted ads and does not cause serious harm to your files or steal personal information.

1/3

True

False

Test 3

True or False?Random pop-up ads and unexplained crashes might indicate your computer has malware.

2/3

False

True

Test 3

How can you protect your device from malware?

3/3

Test 3

2. Regularly update antivirus software

1. Never install any software

3. Only use public wifi

Phishing emails - done!

Password Safety - done!

Avoiding Malware - done!

Social Media Privacy

Room 5

Final Room

Tests

Complete each test to beat the game: there is no other way to escape!

Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.

Match each statement on the left with the correct action on the right that would help improve your social media privacy.

1/3

1

2

3

4

5

continue

Solución

Solution

Test 4

You want only your friends to see your posts and updates.

You don’t want search engines like Google to link to your profile.

You’re unsure who can see the photos you’re tagged in.

You don’t want strangers to send you friend requests or messages.

You’ve shared your location in several posts and want to remove it.

A. Adjust your privacy settings to "Friends Only."

B. Change your tagging settings to control who can see photos you're tagged in.

C. Edit or delete past posts to remove location information.

D. Disable the option to allow search engines outside of the platform to link to your profile.

E. Limit who can send you friend requests and message you to "Friends of Friends" or "Friends Only."

2/3

continuE

Drag concepts to the corresponding group

Safe Privacy Settings

Risky Privacy Settings

1. Allowing only friends to see your posts

2. Turning off location tagging

3. Making your profile public to everyone

Solución

4. Restricting who can tag you in photos

5. Accepting friend requests from strangers

SOLUTION

6. Posting personal details like your home address

Test 4

What should you avoid sharing on social media to stay safe online?

4/3

Your pet's name

A picture of your favourite food

Your home address and phone number

Your favourite movie title

Room 4

Phishing emails - done!

Password Safety - done!

Avoiding Malware - done!

Social Media Privacy - done!

Identifying Misinformation

Final Room

Tests

Complete each test to beat the game: there is no other way to escape!

Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.

1/3

Fake news Which of these do you think is fake news?

TikTok Disney Story

BBC news IG

Test 5

2/3

Well done!Which of the following is a red flag that a news story might be false?

The story asks you to urgently share it with others

The story appears on a well-known news website

The story has factual evidence with sources

Test 5

3/3

3/3

3/3

3/3

You're almost there!How can you verify if an online news article is true or false?

Respuesta correcta

Respuesta incorrecta

Respuesta incorrecta

Respuesta incorrecta

Research the information using trusted sources

Share it with friends to see if they've heard of it.

Check is the webiste looks colourful

Only read the headline and decide

Test 5

Phishing emails - done!

Password Security - done!

Avoiding Malware - done!

Social Media Privacy - done!

Identifying Misinformation - done!

Final Room

Tests

Complete each test to beat the game: there is no other way to escape!

Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.

Surely you know the answer to this question:What is the best overall strategy for staying safe online?

1/5

Share personal information only with people you trust, even if it's through public posts

Always use strong passwords, enable two-factor authentication, and avoid clicking on suspicious links

Disable privacy settings to make it easier for people to find you online

Test 6

2/5

True

False

True or FalseSpyware is a type of malware that can monitor all forms of communication and interaction on a device without the user’s knowledge.

Test 6

3/5

1

2

3

4

5

continuE

A. A deceptive practice to trick individuals into revealing personal information, often via email.

B. A strong combination of letters, numbers, and symbols used to protect accounts.

SOLUTION

C. These settings determine who can see your posts and personal information on social media.

D. a method used to verify a user's identity by requiring a second piece of information.

E. This tool helps to block harmful websites and prevents malware infections.

Drag and sort correctlyMatch each statement on the left with the correct online safety concept on the right.

Test 6

Two-Factor Authentication

Phishing

Antivirus software

Strong Password

Privacy Settings

4/5

You're almost there!Which of the following images represents a strong password?

Test 6

#SafeSelfieChallenge

If you could create a social media trend to promote online safety, what would it be called, and how would you encourage others to join?

5/5

#NoMorePhishing

#CyberSisters

Test 6

Post a selfie with your best online safety tip!

Tag your friends and share a story of how you helped each other stay safe online!

Post a meme or funny story about spotting a phishing scam!

#PrivacyPrincess

Share your favorite privacy setting and why it’s important!

Completed

Congratulations, you have successfully completed the escape room!

Start over?

back

That answer is not correct...

But don't lose your balance, continue on your way and try again!

Oh oh!

If you get stuck, remember you can search online to help you to find the answers, but remember to think critically about what the puzzle is asking. Each challenge you solve will bring you closer to completing the escape room. You’ll have a limited time to finish, so work efficiently but make sure you double-check your answers!Once you’ve completed all the levels, we’ll come back together as a group to reflect on what you’ve learned. We’ll talk about the strategies you used to stay “safe” during the game and discuss how you can apply these skills to real life.Good luck, and remember—cyber safety is all about making smart, informed choices online! Let’s get started!

genial.ly

1 - D

2- A

3 - E

4 - B

5 - C

1 - A

2- D

3 - B

4 - E

5 - C

Safe Privacy Settings

124

Risky Privacy Settings

356