Want to create interactive content? It’s easy in Genially!

Get started free

CYBER DETECTIVES: MISSON "SECCURITY"

Natasa Stardelova

Created on July 4, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

CYBER DETECTIVES: MISSON "SECCURITY"

sTART THE MISSON

gAME STRUCTURE

Introduction

I am Lina, a student at "St. Clement of Ohrid" primary school. My best friend, Marko, became a victim of cyberbullying. Someone is spreading false information and inappropriate pictures of him in a group chat. As I engage in a battle with his enemies, I realized that the entire school is at risk of a serious hacker attack. The only way to prevent the attacks is to solve three key challenges and identify the dangers of cyber violence. With each successfully completed collaborative challenge, we get closer to the truth.

Back

Main levels

Level 1: Identifying the problem

Level 2: Research and Strategies

Level 3: Taking Action

Back

1/3

Decrypt the hidden messages in the group chat to find out what type of cyberbullying has been used.

Level 1:

Back

Next

Test 1

1/3

Back

Next

Test 1

1/3

Back

Next

2/3

Test 1

• Challenge 2: "Deleted traces" – Finding inappropriate posts and analyzing digital footprints.

Back

Haha, look at this silly picture of Alex! He will never come to school after this!

This post represents a form of cyberbullying as it humiliates someone in public. The digital footprint remains even if the post is deleted (it can be saved through screenshots).

Such comments can be deleted, so that others cannot share or save them.

Next

Test 1

2/3

Back

👉 "No one wants to work with Lina. She is the biggest loser! #TeamWithoutLina"

Such comments can lead to social exclusion and are a form of online harassment. Even if the tweet is deleted, others can share or save it.

Delete the comment and block the writer

Next

Next

Test 1

2/3

Back

👉 "This is Marko's number, call him to 'thank' him for ruining our match. 😂"

Sharing personal information without permission is a violation of privacy. The digital footprint can be stored in cached versions of websites.

Mark can block unwanted incoming calls.

Next

3/3

• Challenge 3: "Fake Profile" – Identification of a fake profile and its potential risks.

The profile of 'Sara1990' uses images of a famous influencer, but has no other posts and very few friends.

This may be a 'catfish' profile, where a person presents themselves as someone else to deceive users or to collect personal information.

This could be an attempt at phishing – a technique for stealing passwords and personal information.

Back

Next

Test 1

3/3

Profile with too many good offers 👉 "GameMaster99" claims to provide free game vouchers, but asks for your email and password.

This can lead to account theft or the installation of malicious software.

This may be a 'catfish' profile, where a person presents themselves as someone else to deceive users or to collect personal information.

Next

Back

2/3

Test 1

Back

A profile that sends suspicious links 👉 "Jason123" is sending messages with links to websites that ask you to enter personal information...

This could be an attempt of phishing – a technique for stealing passwords and personal information.

This can lead to account theft or installation of malicious software.

Next

Complete each test to beat the game: there is no other way to escape!

Level 1: Identifying the problem

Level 2: Research and Strategies

Level 3: Taking Action

Back

1/3

Level 2

• Challenge 1: "Encrypted Code" - Solve an encoded message that contains information about the attacker.

Encoded message: 🔒 "Uifsf jt b tfdsfu dpejoh jodjefou jo uijt dibu."

Back

Next

2/3

Challenge 2:

"Digital footprint" – Analysis of internet activities to identify the source of the attack.

Lina has a list of IP addresses and login times in a group chat where the offensive messages appeared. Her goal is to identify the source of the attack and uncover who is behind the fake profile.

This is the information about the activities of the suspected profile 'ShadowX99':

• 📍 IP address: 192.168.1.45• 🕒 Login time: 14:32• 📍 IP address: 192.168.1.88• 🕒 Login time: 16:45• 📍 IP address: 192.168.1.45• 🕒 Login time: 18:15

The IP address 192.168.1.45 belongs to a computer in the school.

next

back

3/3

Level 2

• Challenge 3: "Security Check" – Assessment of profile privacy to prevent future attacks.

Shared personal information (school, city, hobby) cannot be used by unknown individuals.

🔍 Name: Marko Petrovski📸 Profile picture: Real photograph📢 Biography: "I live in Skopje, I go to 'St. Clement' Primary School and play football every Saturday on the field near the school!"📂 Privacy settings: Public profile, everyone can see posts and comments.

An open profile does not allow strangers to comment or steal pictures.

If the profile is private, personal data sharing is restricted.

Back

Next

3/3

Level 2

Profile with inappropriate posts

Sharing a suspicious link cannot be an attempt for phishing or malware.

🔍 Name: Ana_2024📸 Profile picture: Animated face📢 Biography: "Life without rules! 😎🔥"📂 Last post: "Check this out! 🤣 [link to a suspicious website]"📂 Privacy settings: Public profile

The biography does not encourage reckless online behavior.

There is a risky setup of privacy settings and content review. Changes need to be made.

Help

Next

Back

Tests

Complete each test to beat the game: there is no other way to escape!

Level 1: Identifying the problem

Level 2: Research and Strategies

Level 3: Taking action

Back

Ниво 3

1/3

Lina is receiving threatening messages over the internet.

Reporting to the platform

Contacting the parents of the bully

ask for help from a teacher/ parent

Ignoring the problem

Option 1

Report directly on the platform

A quick and easy solution, but with the risk of not following proper protocol.

Option 5

Greater certainty in resolving the problem can sometimes lead to additional conflicts or threats.

Option 4

Option 2

Sometimes the best option, but depending on the situation, may be less effective for the action.

Contacting the parents of the bully

Reporting to security authorities

Risk that the threat will go on

Ignoring the problem

ask for help from a teacher

Option 3

The safest option, but not always suitable for smaller incidents.

Reporting to security authorities

Back

Next

Ниво 3

2/3

"Positive Message" - Create digital kindness campaign

Positive energy = positive results. Be kind online!

Support and respect, because your words can help others!

Be a friend, not a critic

Get involved in good deeds and you will change the internet!

Back

Next

Level 3

3/3

Choose a poster that has a positive message!

Next

Levels

Level 1

Level 2

Level 3

Final test

Final test

• Challenge 3: "Code of Security" - Final test to resolve all threats and unlock main evidence.

A. Lina needs to figure out how to protect the school website from attacks.

Good idea

Conduct a review of the social media approaches on the school page.

Good idea
Good idea

Activate two-factor authentication on administrator accounts.

Applies security protocols to protect passwords

Next

Final test

Лина треба да идентификува фишинг е-маилот.

Next

Final test

Lina must choose the best way to protect her privacy and communicate with her classmates.

Share publicly with a classmate and face the consequences of sharing personal data.

Share the incident with the teacher and ask for help

Ignore the incident and just go on with life

Next

Final test

As a final test, Lina needs to evaluate the 'Security Code': 'Two-factor authentication' is not important!

True

False

Final test

As a final test, Lina needs to evaluate the "Code of Security": "All websites are safe".

True

False

Final Test

As a final test, Lina needs to evaluate 'Code of Security': A phishing email can be dangerous.

True

False

Mission accomplished successfully

Congratulations

Back

Start from the beginning?

Oh, no!

This is not the correct answer!

But don't lose hope, try again!

Back

Game structure The game consists of three levels, each with three challenges

genial.ly

Help

This is a message encoded with the Caesar cipher, where each letter is shifted +1 place forward in the alphabet. The message is in English.

Answer: „There is a secret coding incident in this chat.“

Solution: By comparing the activities, Lina concludes that the attacker most often logs in from a school computer and has time intervals that coincide with the classes of a specific student. This leads her to the next phase of the investigation.

EDUCATIONAL GOALS

• Identifying different forms of violence. • Understanding digital fingerprinting and online privacy • Identifying security risks and avoidance of cyber threats. • Participation in proper reporting of cyberbullying. • Promoting positive digital behavior and kindness online.