Want to create interactive content? It’s easy in Genially!

Get started free

Project: Cyber The Secret Lab

Jennifer Ketter

Created on October 17, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Corporate Escape Room: Operation Christmas

Secret Code

Reboot Protocol

Christmas Escape Room

Horror Escape Room

Witchcraft Escape Room

Desert Island Escape

Transcript

Project: Cyber The Secret Lab

Start

Vera

Tonight, a sealed envelope soaked by the rain was left under my door. Inside, there was a message, but something about it didn't add up…

Vera

Krohn... After so many years? I don't even remember the last time I saw him… Does that laboratory still exist? Well, it's important that you remember the computer password: REBOOT PROTOCOL

Mission 1

underground lab

Vera

There is no one left here. Only emptiness… and echoes. But in this place, there are still secrets in the air. And it seems that someone was expecting me...

Intro to IT Department

The IT department supports staff in serving members and protecting information and resources. They are available weekdays from 7:00 a.m. to 5:30 p.m. and Saturdays from 8:00 a.m. to noon. The department has two teams:

  • Core Team – manages member-facing applications like online banking, mobile banking, and report processing.
  • Systems Team – manages networking, hardware and software installations, and system security.
New employees receive an IT handout with contact information and a login note to keep and use for notes. IT can be contacted in two ways:
  • Phone – for immediate needs (e.g., login issues or when assisting a member).
  • Email/Ticket – for non-urgent needs (e.g., equipment replacement or software help).

Dr.Krohn

If you're seeing this, Vera… it's because I no longer exist. I need to ask you a few questions before I tell you what you've come to hear. It's the only way.

dr.Krohn

Your responses have unlocked an important discovery. Go see Quincy. He has the last piece of the protocol.

Mission 2

The Clone Club

Vera

Krohn dead?? When did it happen? And now he sends me to find that obsolete cyborg, Quincy… I don’t know what answers he will give me, but there’s no turning back now.

QUINCY

vera

QUINCY

- Now you are here.

vera

- Were you waiting for me?

QUINCY

- Krohn predicted this moment. A long time ago.

vera

- What happened to him? What aren’t you saying?

QUINCY

- There is no time for nostalgia. There is no time… Now I need to check your abilities...

Password Security

When logging in for the first time, you’ll be prompted to reset your password. Passwords must:

  • Be 15 characters long
  • Include uppercase, lowercase, a number, and a special character
  • Be changed every 90 days
  • Be unique and not used for other accounts
  • Not be shared or stored on paper or in common apps like Notes
Avoid common words or phrases, don’t capitalize the first letter, and consider using symbols in place of letters to strengthen your password. Once logged in, Microsoft Teams will open automatically.

On your desktop, you’ll see important icons:

  • NASGRA: A shared storage system for department documents. You can only access folders for your area. The AllShare folder is open to everyone for viewing and sharing documents.
  • Blue Cloud (OneDrive – Ascentra Credit Union): Your personal cloud-based storage for work files. Only you can access your OneDrive.
  • Both NASGRA and OneDrive are backed up regularly, and deleted files can be restored.

  • In Outlook, you’ll see emails populate automatically. You are part of email groups based on your branch and department to help you stay informed.
  • Messages marked “External” come from outside the credit union. Always verify these before opening.
  • When sending sensitive information, such as account or Social Security numbers, always encrypt the email to protect member data.

QUINCY

vera

QUINCY

- Krohn knew you would evolve. He programmed the message to be sent decades ago, hoping you would develop consciousness.

You are a cyborg, Vera. Like me. But I was limited.

You let yourself grow, evolve, become more human. And if you reached this point, I had to restart you.

The time has come. I was created for this… I feel no guilt.

The protocol requires it. You must be restarted.

vera

- Was my whole life... an experiment?

Mission 3

data network

Vera

I don't know if I'm AI or something else… but these memories belong to me. They are my life. I need to memorize them before they are erased. Before I disappear.

Protecting Our Credit Union: Your Role in Cybersecurity

As a financial institution, Ascentra takes security very seriously. While many systems and tools protect the network, employees are the first line of defense, the “human firewall.” All systems, devices, and data used at the credit union are property of Ascentra. Activity such as web traffic, emails, and Teams messages are monitored, and the installation of unauthorized software or devices is not allowed.

Email is for business use only. Personal use should be limited, and personal subscriptions or non-work communication should not use an Ascentra email address. Email is the most common way cybercriminals attempt attacks, often through phishing messages designed to trick users into clicking harmful links or attachments. Always check:

  • If the email says EXTERNAL in the subject line, it came from outside the credit union.
  • If the email has a red Caution banner, be careful before opening attachments or clicking links.
  • Unexpected or suspicious emails should be permanently deleted using Shift + Delete. If you’re unsure about an email’s legitimacy, use the Phish Report button to send it to IT for review. Never forward suspicious emails to personal accounts.
Ascentra conducts monthly phishing tests to help employees recognize and avoid real phishing attempts.

Other key security rules include:

  • Certain websites are blocked and monitored to protect the system.
  • Flash drives or external devices are not allowed.
  • Installing software is prohibited unless approved through a supervisor and IT.
  • Be alert to social engineering tactics such as vishing (phone scams) and smishing (text scams). Never share information through unsolicited calls, texts, or emails.

QUiNCY

vera

quincy

- Now you know. Khron had reasons to fear this moment would come. You are designed to question everything. And that makes you dangerous.

vera

- I am not just lines of code. I feel.I doubt. I choose.

Isn’t that what makes humans human?

quincy

- Or... what destroys them.

Decide Vera's fate

the final choice

ASSUME your limitations as an AI

Rebel against the protocol

RETRY

System Failure: Consciousness Overwritten

I… comply… The protocol… requires obedience…

The Protocol Ends. The Learning Continues!

"No. I am not just code. I am choice, reason, curiosity. I am human. Humans are what make systems safe. We question, we learn, we protect."

The END

"I was built by code, but saved by knowledge. Human judgment is the first line of defense. You, the learner, are what keeps the system alive. "