Want to create interactive content? It’s easy in Genially!

Get started free

American Revolution Escape Room

Darren Bonafede

Created on November 25, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

Next

Next

You and your friends find yourselves trapped in a mysterious digital world. To escape, you must solve a series of challenges scattered throughout the virtual environment. Time to put your Cybersecurity skills to the test.

Next

Start

Learning Objectives

Instructions

Teacher Instructions

Hints & Tips

This page is password protected

Enter the password

This page is password protected

Enter the password

This page is password protected

Enter the password

This page is password protected

Enter the password

This page is password protected

Enter the password

Pay special attention to the placement of the correct answers.

Introduction

don't share Your pAssword
change your password regularly
use a mnemonic device

Think before you click

Introduction

Verify Identies

This page is password protected

Enter the password

Introduction

Password-Protected. Use a Caesar cipher with a forward shift of 7.

Enter the password

Introduction

Think before you share

This page is password protected

Enter the password

Are you ready to escape?

Previous Passwords matter (4 letters)

You come face-to-face with a digital marketplace where personal information is bought and sold. Learn about the importance of protecting your privacy and keeping your Personally Identifiable Information (PII) safe from prying eyes. Navigate through various scenarios and make choices that will safeguard your identity.

Instructions

Welcome to the Cybersecurity Escape Room!

  • Choose a room to get started.
  • Start by reading the introduction. Hints are also available.
  • Each room has clues, activities, and advice based on its theme. Not all activities will give you a clue but are important to the learning.
  • Once you think you have collected all of the clues, click on the lock to try and escape.
  • The only way to move on is by escaping the room that you are in.
Good luck!

Click on a room to learn everything you need to help your students. Get answers to puzzles and learn more about specific activites. The teacher instructions are password protected. You should have received this information in your email. If you didn't and would like to request a password, click HERE. All rooms can be completed without this information but it may be more difficult.

It's a Cipher

Let's Go Phishing

Password Protection

Privacy Patrol

Teacher Instructions

  • You are looking for green letters and symbols
  • Have a piece of paper and a pencil nearby to keep track of clues. Once you solve a puzzle, make sure you keep track of the password, you'll need it for the final lock
  • Not all activities will provide clues but they are necessary for learning
  • You may have to come back to an activity as it may not make sense. Gaining knowledge from another activity can help you
  • Not all clues are visible right away. Make sure you check the learning environment
  • Read ALL Introductions before starting
  • There is a hint available in each room that will provide more information about the password
  • All passwords are case-sensitive, have no spaces, and have to do with the theme of the room

Hints & Tips

You stumble upon a simulated email inbox filled with messages. Some are legitimate, but others are suspicious and could be phishing attempts. Your task is to identify the phishing attempts and avoid falling into the traps set by cybercriminals.

Privacy Patrol:

  • Define Personally Identifiable Information (PII) and examples of PII.
  • Identify potential risks associated with sharing PII online.
  • Demonstrate strategies for protecting privacy and minimizing the exposure of PII on the internet.

It's A Cipher:

  • Describe the purpose of encryption and decryption in cybersecurity.
  • Explore the Caesar cipher technique
  • Apply encryption and decryption techniques to encode and decode messages.

Let's Go Phishing:

  • Define phishing and recognize common phishing tactics.
  • Identify suspicious emails or messages
  • Demonstrate the ability to verify the authenticity of emails and websites

Password Protected:

NYS CS/DF Learning Standards

Learning Objectives

  • Identify the characteristics of a strong password
  • Demonstrate the ability to create and remember secure passwords
  • Explain the importance of keeping passwords confidential and not sharing them with others

- You Find yourselves trapped in a virtual vault filled with treasure, but the only way to escape is by cracking the password. In thIs room, you'll learn about the importance of strong passwords and how to create them. Solve puzzles and answer questIons to uncover clues that will help you unlock the vault and escape safely. When you think you have all of your clues try cracking the code by clicking on the lock icon.

You encounter a mysterious message written in code. To decipher it and proceed further, you must learn the art of encryption and decryption. Explore the Ceasar cipher technique and use your problem-solving skills to unlock the secrets hidden within.