Want to create interactive content? It’s easy in Genially!

Reuse this genially

VIBRANT BREAKOUT

Azmiya Cassim

Created on November 23, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

GO!

Solve an IT-related problem by using modal verbs appropriately to progress through each stage.

IT Escape Room Challenge

Stage 04

Stage 03

Stage 02

Stage 01

Reward

Introduction

Collect all the numbers by completing each of the challenges, and enter them in order in the final section to finish the game.

Index

Your company’s servers are locked by ransomware just hours before a big product launch. Your team must solve a series of challenges to restore the system before time runs out!

IT Department: Ransomware Recovery Challenge

INTRODUCTION

Complete the following quiz, and getthe first number towards your reward!

Stage 1

start

Next Stage

Try Again

The ransomware message reads: "Pay 10 BTC to unlock your data!' What should you do next? Discuss whether to:1. Pay the ransom. 2. Investigate further. 3. Shut down the servers."

question 1/5

Stage 1: Understanding the Threat

Explanation:We must not pay the ransom until we investigate further.We should isolate the infected server first. We could try contacting the cybersecurity team for advice. We might need to shut down all non-essential systems temporarily.

Stage 1

RIGHT!

next

Stage 1

TRY AGAIN

ERROR!

Wrong!We must pay the ransom immediately.(This ignores professional cybersecurity guidelines.)We will shut down everything permanently. (This overreacts without analyzing the situation.) We can ignore the message and hope the problem resolves itself. (Unrealistic and careless response.)

Stage 2:Stage 2: Identifying the Source of the Attack

Wrong answer

Rightanswer

After isolating the server, you need to find the root cause of the ransomware. Should you:1. Run a malware scan. 2. Check recent emails for phishing links. 3. Restore data from the backup.

question 2/5

Explanation:We should run a malware scan to identify the ransomware.We might need to check emails for phishing attempts to see how the attack happened. We must confirm the integrity of our backups before restoring data. We could also review system logs to track unusual activity.

Stage 2

RIGHT!

NEXT

Stage 2

TRY AGAIN

ERROR!

Wrong!We must restore from the backup immediately without checking the issue. (This might lead to reinfection.)We should not investigate emails because they’re irrelevant. (Phishing is often the source.) We can just unplug the server and restart it. (This doesn’t address the root cause.)

Stage 3: Restoring Operations

Wronganswer

Rightanswer

You’ve identified the source of the ransomware and removed it. Now, you need to restore operations. What should you prioritize?1. Test backups before restoring. 2. Restore critical services first. 3. Communicate with stakeholders.

QUESTION 3/5

Explanation:We must test the backups for corruption before restoring."We should prioritize restoring critical services like the company website. We might need to communicate with stakeholders about a delayed launch. We could implement temporary measures to ensure minimal downtime.

stage 3

RIGHT!

NEXT

Stage 3

TRY AGAIN

ERROR!

Wrong!We must restore everything at once without testing backups.(Risky and careless approach.)We will delay stakeholder communication because it’s unnecessary. (Bad communication practice.) We might ignore the critical services and focus on minor tasks. (Poor prioritization.)

Stage 4: Preventing Future Attacks

Wronganswer

Rightanswer

Now that you’ve restored the system, how will you prevent future attacks? Should you:Train staff on phishing awareness. Invest in better cybersecurity tools. Create a backup strategy.

QUESTION 4/5

Explanation: We should conduct regular staff training on identifying phishing emails. We must invest in robust cybersecurity software to monitor threats. We could create an automated backup system for daily updates. We might need to audit our current infrastructure for vulnerabilities.

Satge 4

RIGHT!

NEXT

Stage 4

TRY AGAIN

ERROR!

Wrong!We can ignore training because staff are already knowledgeable.(This assumes too much.)We will not invest in new tools because they’re expensive. (Short-sighted approach.) We must only focus on backups and ignore other measures. (Single-layer protection is not enough.)

Final Stage: Summary and Escape

Wronganswer

Rightanswer

To escape, summarize the best solution to prevent future ransomware attacks using at least two modal verbs.

QUESTION 5/5

Explanation:We must invest in cybersecurity software and should conduct staff training on phishing awareness to minimize future risks.

Final Stage

RIGHT!

NEXT

QUIZ

TRY AGAIN

ERROR!

Wrong!We might ignore backups and hope this doesn’t happen again.(Neglectful approach.)

Choose the correct shape in the series

serieS

START

Option 06

Option 05

Option 04

Option 03

Option 02

Option 01

Choose the correct shape:

WHAT SHAPE GOES NEXT?

RIGHT!

Option 06

Option 05

Option 04

Option 03

Option 02

Option 01

Choose the correct shape:

WHAT SHAPE GOES NEXT?

You have reached the last step... Enter the password!

Enter password