Want to create interactive content? It’s easy in Genially!
CYBER DETECTIVES: MISSON "SECCURITY"
Natasa Stardelova
Created on July 4, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
CYBER DETECTIVES: MISSON "SECCURITY"
sTART THE MISSON
gAME STRUCTURE
Introduction
I am Lina, a student at "St. Clement of Ohrid" primary school. My best friend, Marko, became a victim of cyberbullying. Someone is spreading false information and inappropriate pictures of him in a group chat. As I engage in a battle with his enemies, I realized that the entire school is at risk of a serious hacker attack. The only way to prevent the attacks is to solve three key challenges and identify the dangers of cyber violence. With each successfully completed collaborative challenge, we get closer to the truth.
Back
Main levels
Level 1: Identifying the problem
Level 2: Research and Strategies
Level 3: Taking Action
Back
1/3
Decrypt the hidden messages in the group chat to find out what type of cyberbullying has been used.
Level 1:
Back
Next
Test 1
1/3
Back
Next
Test 1
1/3
Back
Next
2/3
Test 1
• Challenge 2: "Deleted traces" – Finding inappropriate posts and analyzing digital footprints.
Back
Haha, look at this silly picture of Alex! He will never come to school after this!
This post represents a form of cyberbullying as it humiliates someone in public. The digital footprint remains even if the post is deleted (it can be saved through screenshots).
Such comments can be deleted, so that others cannot share or save them.
Next
Test 1
2/3
Back
👉 "No one wants to work with Lina. She is the biggest loser! #TeamWithoutLina"
Such comments can lead to social exclusion and are a form of online harassment. Even if the tweet is deleted, others can share or save it.
Delete the comment and block the writer
Next
Next
Test 1
2/3
Back
👉 "This is Marko's number, call him to 'thank' him for ruining our match. 😂"
Sharing personal information without permission is a violation of privacy. The digital footprint can be stored in cached versions of websites.
Mark can block unwanted incoming calls.
Next
3/3
• Challenge 3: "Fake Profile" – Identification of a fake profile and its potential risks.
The profile of 'Sara1990' uses images of a famous influencer, but has no other posts and very few friends.
This may be a 'catfish' profile, where a person presents themselves as someone else to deceive users or to collect personal information.
This could be an attempt at phishing – a technique for stealing passwords and personal information.
Back
Next
Test 1
3/3
Profile with too many good offers 👉 "GameMaster99" claims to provide free game vouchers, but asks for your email and password.
This can lead to account theft or the installation of malicious software.
This may be a 'catfish' profile, where a person presents themselves as someone else to deceive users or to collect personal information.
Next
Back
2/3
Test 1
Back
A profile that sends suspicious links 👉 "Jason123" is sending messages with links to websites that ask you to enter personal information...
This could be an attempt of phishing – a technique for stealing passwords and personal information.
This can lead to account theft or installation of malicious software.
Next
Complete each test to beat the game: there is no other way to escape!
Level 1: Identifying the problem
Level 2: Research and Strategies
Level 3: Taking Action
Back
1/3
Level 2
• Challenge 1: "Encrypted Code" - Solve an encoded message that contains information about the attacker.
Encoded message: 🔒 "Uifsf jt b tfdsfu dpejoh jodjefou jo uijt dibu."
Back
Next
2/3
Challenge 2:
"Digital footprint" – Analysis of internet activities to identify the source of the attack.
Lina has a list of IP addresses and login times in a group chat where the offensive messages appeared. Her goal is to identify the source of the attack and uncover who is behind the fake profile.
This is the information about the activities of the suspected profile 'ShadowX99':
• 📍 IP address: 192.168.1.45• 🕒 Login time: 14:32• 📍 IP address: 192.168.1.88• 🕒 Login time: 16:45• 📍 IP address: 192.168.1.45• 🕒 Login time: 18:15
The IP address 192.168.1.45 belongs to a computer in the school.
next
back
3/3
Level 2
• Challenge 3: "Security Check" – Assessment of profile privacy to prevent future attacks.
Shared personal information (school, city, hobby) cannot be used by unknown individuals.
🔍 Name: Marko Petrovski📸 Profile picture: Real photograph📢 Biography: "I live in Skopje, I go to 'St. Clement' Primary School and play football every Saturday on the field near the school!"📂 Privacy settings: Public profile, everyone can see posts and comments.
An open profile does not allow strangers to comment or steal pictures.
If the profile is private, personal data sharing is restricted.
Back
Next
3/3
Level 2
Profile with inappropriate posts
Sharing a suspicious link cannot be an attempt for phishing or malware.
🔍 Name: Ana_2024📸 Profile picture: Animated face📢 Biography: "Life without rules! 😎🔥"📂 Last post: "Check this out! 🤣 [link to a suspicious website]"📂 Privacy settings: Public profile
The biography does not encourage reckless online behavior.
There is a risky setup of privacy settings and content review. Changes need to be made.
Help
Next
Back
Tests
Complete each test to beat the game: there is no other way to escape!
Level 1: Identifying the problem
Level 2: Research and Strategies
Level 3: Taking action
Back
Ниво 3
1/3
Lina is receiving threatening messages over the internet.
Reporting to the platform
Contacting the parents of the bully
ask for help from a teacher/ parent
Ignoring the problem
Option 1
Report directly on the platform
A quick and easy solution, but with the risk of not following proper protocol.
Option 5
Greater certainty in resolving the problem can sometimes lead to additional conflicts or threats.
Option 4
Option 2
Sometimes the best option, but depending on the situation, may be less effective for the action.
Contacting the parents of the bully
Reporting to security authorities
Risk that the threat will go on
Ignoring the problem
ask for help from a teacher
Option 3
The safest option, but not always suitable for smaller incidents.
Reporting to security authorities
Back
Next
Ниво 3
2/3
"Positive Message" - Create digital kindness campaign
Positive energy = positive results. Be kind online!
Support and respect, because your words can help others!
Be a friend, not a critic
Get involved in good deeds and you will change the internet!
Back
Next
Level 3
3/3
Choose a poster that has a positive message!
Next
Levels
Level 1
Level 2
Level 3
Final test
Final test
• Challenge 3: "Code of Security" - Final test to resolve all threats and unlock main evidence.
A. Lina needs to figure out how to protect the school website from attacks.
Good idea
Conduct a review of the social media approaches on the school page.
Good idea
Good idea
Activate two-factor authentication on administrator accounts.
Applies security protocols to protect passwords
Next
Final test
Лина треба да идентификува фишинг е-маилот.
Next
Final test
Lina must choose the best way to protect her privacy and communicate with her classmates.
Share publicly with a classmate and face the consequences of sharing personal data.
Share the incident with the teacher and ask for help
Ignore the incident and just go on with life
Next
Final test
As a final test, Lina needs to evaluate the 'Security Code': 'Two-factor authentication' is not important!
True
False
Final test
As a final test, Lina needs to evaluate the "Code of Security": "All websites are safe".
True
False
Final Test
As a final test, Lina needs to evaluate 'Code of Security': A phishing email can be dangerous.
True
False
Mission accomplished successfully
Congratulations
Back
Start from the beginning?
Oh, no!
This is not the correct answer!
But don't lose hope, try again!
Back
Game structure The game consists of three levels, each with three challenges
genial.ly
Help
This is a message encoded with the Caesar cipher, where each letter is shifted +1 place forward in the alphabet. The message is in English.
Answer: „There is a secret coding incident in this chat.“
Solution: By comparing the activities, Lina concludes that the attacker most often logs in from a school computer and has time intervals that coincide with the classes of a specific student. This leads her to the next phase of the investigation.
EDUCATIONAL GOALS
• Identifying different forms of violence. • Understanding digital fingerprinting and online privacy • Identifying security risks and avoidance of cyber threats. • Participation in proper reporting of cyberbullying. • Promoting positive digital behavior and kindness online.