Staying Safe Online Escape Room
Caroline Steele
Created on October 15, 2024
Over 30 million people build interactive content in Genially.
Check out what others have designed:
MINERALS AND ROCKS
Escape games
NERVOUS SYSTEM ESCAPE ROOM
Escape games
CEVICHE ESCAPE GAME
Escape games
THUNBERG CASE. TIME SOLDIERS
Escape games
SPACE INVADERS GAME
Escape games
A WORLD OF SPORTS
Escape games
HARRY POTTER ESCAPE GAME
Escape games
Transcript
Cyber Safety Escape Room
Who will be the first to unlock all the rooms and escape?!
start
Introduction
Today, you will work to solve a series of puzzles related to staying safe online. Each puzzle will challenge your knowledge about key areas of cyber safety, such as recognizing phishing emails, creating strong passwords, avoiding malware, protecting your social media privacy, and identifying misinformation.The answers to the puzzles will unlock the next clue, and you’ll work your way through the challenges until you’ve completed all the levels. Pay attention to the details in each puzzle because they will help you stay safe in the digital world!
Welcome to the Cyber Safety Escape Room!
+ info
Phishing Emails
Room 2
Room 3
Room 4
Room 5
Final Room
Escape Rooms
Complete each locked room to beat the game: there is no other way to escape!
Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.
1/3
Which of the following email addresses and messages is likely to be from a phishing email?
From: noreply@emails.sainsburys.nectar.comSubject: Join the Count up to Christmas challenge in the Nectar app.
From: mail1853902w12jandtc@natwest.comSubject: Reminder - USD3,850,000.00 compensation payment to you, reply for details. From, Natwest Bank.
Test 1
Which of the following is likely to be seen in a phishing email
2/3
correct grammar
urgent language
from a recognised brand
Test 1
What should you do if you receive an email from an unknown sender asking for your personal information?
3/3
Click the link and fill in your details immediately
Reply to the email asking for more information
Delete the email without clicking any links
Share the email with your friends
Test 1
Phishing emails - done!
Password safety
Room 3
Room 4
Room 5
Final room
Escape Rooms
Complete each locked room to beat the game: there is no other way to escape!
Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.
1/3
Watch this video. Then answer the question:According to the video, which is the safest password to use ?
16thJuly2010
shoewindowdogphone
CarolineSteele2023
Test 2
Which of these would be the safest password according to the video?
2/3
K9@Y9&x3
abcdefg123
oldhabitsdiescreaming
Test 2
Which of the following should you NOT do to keep your passwords safe?
3/3
Use two-factor authentication
Use different passwords for every app and device
Test 2
Write your passwords on a piece of paper and keep it in your bag
Phishing emails - done!
Password Safety - done!
Avoiding Malware
Room 4
Room 5
Final Room
Tests
Complete each test to beat the game: there is no other way to escape!
Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.
Take a good look at this image:T/F? Malware is a type of program that only shows unwanted ads and does not cause serious harm to your files or steal personal information.
1/3
True
False
Test 3
True or False?Random pop-up ads and unexplained crashes might indicate your computer has malware.
2/3
False
True
Test 3
How can you protect your device from malware?
3/3
Test 3
2. Regularly update antivirus software
1. Never install any software
3. Only use public wifi
Phishing emails - done!
Password Safety - done!
Avoiding Malware - done!
Social Media Privacy
Room 5
Final Room
Tests
Complete each test to beat the game: there is no other way to escape!
Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.
Match each statement on the left with the correct action on the right that would help improve your social media privacy.
1/3
1
2
3
4
5
continue
Solución
Solution
Test 4
You want only your friends to see your posts and updates.
You don’t want search engines like Google to link to your profile.
You’re unsure who can see the photos you’re tagged in.
You don’t want strangers to send you friend requests or messages.
You’ve shared your location in several posts and want to remove it.
A. Adjust your privacy settings to "Friends Only."
B. Change your tagging settings to control who can see photos you're tagged in.
C. Edit or delete past posts to remove location information.
D. Disable the option to allow search engines outside of the platform to link to your profile.
E. Limit who can send you friend requests and message you to "Friends of Friends" or "Friends Only."
2/3
continuE
Drag concepts to the corresponding group
Safe Privacy Settings
Risky Privacy Settings
1. Allowing only friends to see your posts
2. Turning off location tagging
3. Making your profile public to everyone
Solución
4. Restricting who can tag you in photos
5. Accepting friend requests from strangers
SOLUTION
6. Posting personal details like your home address
Test 4
What should you avoid sharing on social media to stay safe online?
4/3
Your pet's name
A picture of your favourite food
Your home address and phone number
Your favourite movie title
Room 4
Phishing emails - done!
Password Safety - done!
Avoiding Malware - done!
Social Media Privacy - done!
Identifying Misinformation
Final Room
Tests
Complete each test to beat the game: there is no other way to escape!
Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.
1/3
Fake news Which of these do you think is fake news?
TikTok Disney Story
BBC news IG
Test 5
2/3
Well done!Which of the following is a red flag that a news story might be false?
The story asks you to urgently share it with others
The story appears on a well-known news website
The story has factual evidence with sources
Test 5
3/3
3/3
3/3
3/3
You're almost there!How can you verify if an online news article is true or false?
Respuesta correcta
Respuesta incorrecta
Respuesta incorrecta
Respuesta incorrecta
Research the information using trusted sources
Share it with friends to see if they've heard of it.
Check is the webiste looks colourful
Only read the headline and decide
Test 5
Phishing emails - done!
Password Security - done!
Avoiding Malware - done!
Social Media Privacy - done!
Identifying Misinformation - done!
Final Room
Tests
Complete each test to beat the game: there is no other way to escape!
Lorem ipsum dolor sit amet consectetur adipiscing elit, mauris suspendisse praesent nascetur massa molestie est magna, luctus lacinia nunc ridiculus netus nostra. Dictum accumsan sollicitudin praesent morbi sem mollis quis neque volutpat.
Surely you know the answer to this question:What is the best overall strategy for staying safe online?
1/5
Share personal information only with people you trust, even if it's through public posts
Always use strong passwords, enable two-factor authentication, and avoid clicking on suspicious links
Disable privacy settings to make it easier for people to find you online
Test 6
2/5
True
False
True or FalseSpyware is a type of malware that can monitor all forms of communication and interaction on a device without the user’s knowledge.
Test 6
3/5
1
2
3
4
5
continuE
A. A deceptive practice to trick individuals into revealing personal information, often via email.
B. A strong combination of letters, numbers, and symbols used to protect accounts.
SOLUTION
C. These settings determine who can see your posts and personal information on social media.
D. a method used to verify a user's identity by requiring a second piece of information.
E. This tool helps to block harmful websites and prevents malware infections.
Drag and sort correctlyMatch each statement on the left with the correct online safety concept on the right.
Test 6
Two-Factor Authentication
Phishing
Antivirus software
Strong Password
Privacy Settings
4/5
You're almost there!Which of the following images represents a strong password?
Test 6
#SafeSelfieChallenge
If you could create a social media trend to promote online safety, what would it be called, and how would you encourage others to join?
5/5
#NoMorePhishing
#CyberSisters
Test 6
Post a selfie with your best online safety tip!
Tag your friends and share a story of how you helped each other stay safe online!
Post a meme or funny story about spotting a phishing scam!
#PrivacyPrincess
Share your favorite privacy setting and why it’s important!
Completed
Congratulations, you have successfully completed the escape room!
Start over?
back
That answer is not correct...
But don't lose your balance, continue on your way and try again!
Oh oh!
If you get stuck, remember you can search online to help you to find the answers, but remember to think critically about what the puzzle is asking. Each challenge you solve will bring you closer to completing the escape room. You’ll have a limited time to finish, so work efficiently but make sure you double-check your answers!Once you’ve completed all the levels, we’ll come back together as a group to reflect on what you’ve learned. We’ll talk about the strategies you used to stay “safe” during the game and discuss how you can apply these skills to real life.Good luck, and remember—cyber safety is all about making smart, informed choices online! Let’s get started!
genial.ly
1 - D
2- A
3 - E
4 - B
5 - C
1 - A
2- D
3 - B
4 - E
5 - C
Safe Privacy Settings
124
Risky Privacy Settings
356