Want to create interactive content? It’s easy in Genially!
VIBRANT BREAKOUT
Azmiya Cassim
Created on November 23, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
GO!
Solve an IT-related problem by using modal verbs appropriately to progress through each stage.
IT Escape Room Challenge
Stage 04
Stage 03
Stage 02
Stage 01
Reward
Introduction
Collect all the numbers by completing each of the challenges, and enter them in order in the final section to finish the game.
Index
Your company’s servers are locked by ransomware just hours before a big product launch. Your team must solve a series of challenges to restore the system before time runs out!
IT Department: Ransomware Recovery Challenge
INTRODUCTION
Complete the following quiz, and getthe first number towards your reward!
Stage 1
start
Next Stage
Try Again
The ransomware message reads: "Pay 10 BTC to unlock your data!' What should you do next? Discuss whether to:1. Pay the ransom. 2. Investigate further. 3. Shut down the servers."
question 1/5
Stage 1: Understanding the Threat
Explanation:We must not pay the ransom until we investigate further.We should isolate the infected server first. We could try contacting the cybersecurity team for advice. We might need to shut down all non-essential systems temporarily.
Stage 1
RIGHT!
next
Stage 1
TRY AGAIN
ERROR!
Wrong!We must pay the ransom immediately.(This ignores professional cybersecurity guidelines.)We will shut down everything permanently. (This overreacts without analyzing the situation.) We can ignore the message and hope the problem resolves itself. (Unrealistic and careless response.)
Stage 2:Stage 2: Identifying the Source of the Attack
Wrong answer
Rightanswer
After isolating the server, you need to find the root cause of the ransomware. Should you:1. Run a malware scan. 2. Check recent emails for phishing links. 3. Restore data from the backup.
question 2/5
Explanation:We should run a malware scan to identify the ransomware.We might need to check emails for phishing attempts to see how the attack happened. We must confirm the integrity of our backups before restoring data. We could also review system logs to track unusual activity.
Stage 2
RIGHT!
NEXT
Stage 2
TRY AGAIN
ERROR!
Wrong!We must restore from the backup immediately without checking the issue. (This might lead to reinfection.)We should not investigate emails because they’re irrelevant. (Phishing is often the source.) We can just unplug the server and restart it. (This doesn’t address the root cause.)
Stage 3: Restoring Operations
Wronganswer
Rightanswer
You’ve identified the source of the ransomware and removed it. Now, you need to restore operations. What should you prioritize?1. Test backups before restoring. 2. Restore critical services first. 3. Communicate with stakeholders.
QUESTION 3/5
Explanation:We must test the backups for corruption before restoring."We should prioritize restoring critical services like the company website. We might need to communicate with stakeholders about a delayed launch. We could implement temporary measures to ensure minimal downtime.
stage 3
RIGHT!
NEXT
Stage 3
TRY AGAIN
ERROR!
Wrong!We must restore everything at once without testing backups.(Risky and careless approach.)We will delay stakeholder communication because it’s unnecessary. (Bad communication practice.) We might ignore the critical services and focus on minor tasks. (Poor prioritization.)
Stage 4: Preventing Future Attacks
Wronganswer
Rightanswer
Now that you’ve restored the system, how will you prevent future attacks? Should you:Train staff on phishing awareness. Invest in better cybersecurity tools. Create a backup strategy.
QUESTION 4/5
Explanation: We should conduct regular staff training on identifying phishing emails. We must invest in robust cybersecurity software to monitor threats. We could create an automated backup system for daily updates. We might need to audit our current infrastructure for vulnerabilities.
Satge 4
RIGHT!
NEXT
Stage 4
TRY AGAIN
ERROR!
Wrong!We can ignore training because staff are already knowledgeable.(This assumes too much.)We will not invest in new tools because they’re expensive. (Short-sighted approach.) We must only focus on backups and ignore other measures. (Single-layer protection is not enough.)
Final Stage: Summary and Escape
Wronganswer
Rightanswer
To escape, summarize the best solution to prevent future ransomware attacks using at least two modal verbs.
QUESTION 5/5
Explanation:We must invest in cybersecurity software and should conduct staff training on phishing awareness to minimize future risks.
Final Stage
RIGHT!
NEXT
QUIZ
TRY AGAIN
ERROR!
Wrong!We might ignore backups and hope this doesn’t happen again.(Neglectful approach.)
Choose the correct shape in the series
serieS
START
Option 06
Option 05
Option 04
Option 03
Option 02
Option 01
Choose the correct shape:
WHAT SHAPE GOES NEXT?
RIGHT!
Option 06
Option 05
Option 04
Option 03
Option 02
Option 01
Choose the correct shape:
WHAT SHAPE GOES NEXT?
You have reached the last step... Enter the password!
Enter password