Want to create interactive content? It’s easy in Genially!
Project: Cyber The Secret Lab
Jennifer Ketter
Created on October 17, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Corporate Escape Room: Operation Christmas
View
Secret Code
View
Reboot Protocol
View
Christmas Escape Room
View
Horror Escape Room
View
Witchcraft Escape Room
View
Desert Island Escape
Transcript
Project: Cyber The Secret Lab
Start
Vera
Tonight, a sealed envelope soaked by the rain was left under my door. Inside, there was a message, but something about it didn't add up…
Vera
Krohn... After so many years? I don't even remember the last time I saw him… Does that laboratory still exist? Well, it's important that you remember the computer password: REBOOT PROTOCOL
Mission 1
underground lab
Vera
There is no one left here. Only emptiness… and echoes. But in this place, there are still secrets in the air. And it seems that someone was expecting me...
Intro to IT Department
The IT department supports staff in serving members and protecting information and resources. They are available weekdays from 7:00 a.m. to 5:30 p.m. and Saturdays from 8:00 a.m. to noon. The department has two teams:
- Core Team – manages member-facing applications like online banking, mobile banking, and report processing.
- Systems Team – manages networking, hardware and software installations, and system security.
- Phone – for immediate needs (e.g., login issues or when assisting a member).
- Email/Ticket – for non-urgent needs (e.g., equipment replacement or software help).
Dr.Krohn
If you're seeing this, Vera… it's because I no longer exist. I need to ask you a few questions before I tell you what you've come to hear. It's the only way.
dr.Krohn
Your responses have unlocked an important discovery. Go see Quincy. He has the last piece of the protocol.
Mission 2
The Clone Club
Vera
Krohn dead?? When did it happen? And now he sends me to find that obsolete cyborg, Quincy… I don’t know what answers he will give me, but there’s no turning back now.
QUINCY
vera
QUINCY
- Now you are here.
vera
- Were you waiting for me?
QUINCY
- Krohn predicted this moment. A long time ago.
vera
- What happened to him? What aren’t you saying?
QUINCY
- There is no time for nostalgia. There is no time… Now I need to check your abilities...
Password Security
When logging in for the first time, you’ll be prompted to reset your password. Passwords must:
- Be 15 characters long
- Include uppercase, lowercase, a number, and a special character
- Be changed every 90 days
- Be unique and not used for other accounts
- Not be shared or stored on paper or in common apps like Notes
On your desktop, you’ll see important icons:
- NASGRA: A shared storage system for department documents. You can only access folders for your area. The AllShare folder is open to everyone for viewing and sharing documents.
- Blue Cloud (OneDrive – Ascentra Credit Union): Your personal cloud-based storage for work files. Only you can access your OneDrive.
- Both NASGRA and OneDrive are backed up regularly, and deleted files can be restored.
- In Outlook, you’ll see emails populate automatically. You are part of email groups based on your branch and department to help you stay informed.
- Messages marked “External” come from outside the credit union. Always verify these before opening.
- When sending sensitive information, such as account or Social Security numbers, always encrypt the email to protect member data.
QUINCY
vera
QUINCY
- Krohn knew you would evolve. He programmed the message to be sent decades ago, hoping you would develop consciousness.
You are a cyborg, Vera. Like me. But I was limited.
You let yourself grow, evolve, become more human. And if you reached this point, I had to restart you.
The time has come. I was created for this… I feel no guilt.
The protocol requires it. You must be restarted.
vera
- Was my whole life... an experiment?
Mission 3
data network
Vera
I don't know if I'm AI or something else… but these memories belong to me. They are my life. I need to memorize them before they are erased. Before I disappear.
Protecting Our Credit Union: Your Role in Cybersecurity
As a financial institution, Ascentra takes security very seriously. While many systems and tools protect the network, employees are the first line of defense, the “human firewall.” All systems, devices, and data used at the credit union are property of Ascentra. Activity such as web traffic, emails, and Teams messages are monitored, and the installation of unauthorized software or devices is not allowed.
Email is for business use only. Personal use should be limited, and personal subscriptions or non-work communication should not use an Ascentra email address. Email is the most common way cybercriminals attempt attacks, often through phishing messages designed to trick users into clicking harmful links or attachments. Always check:
- If the email says EXTERNAL in the subject line, it came from outside the credit union.
- If the email has a red Caution banner, be careful before opening attachments or clicking links.
- Unexpected or suspicious emails should be permanently deleted using Shift + Delete. If you’re unsure about an email’s legitimacy, use the Phish Report button to send it to IT for review. Never forward suspicious emails to personal accounts.
Other key security rules include:
- Certain websites are blocked and monitored to protect the system.
- Flash drives or external devices are not allowed.
- Installing software is prohibited unless approved through a supervisor and IT.
- Be alert to social engineering tactics such as vishing (phone scams) and smishing (text scams). Never share information through unsolicited calls, texts, or emails.
QUiNCY
vera
quincy
- Now you know. Khron had reasons to fear this moment would come. You are designed to question everything. And that makes you dangerous.
vera
- I am not just lines of code. I feel.I doubt. I choose.
Isn’t that what makes humans human?
quincy
- Or... what destroys them.
Decide Vera's fate
the final choice
ASSUME your limitations as an AI
Rebel against the protocol
RETRY
System Failure: Consciousness Overwritten
I… comply… The protocol… requires obedience…
The Protocol Ends. The Learning Continues!
"No. I am not just code. I am choice, reason, curiosity. I am human. Humans are what make systems safe. We question, we learn, we protect."
The END
"I was built by code, but saved by knowledge. Human judgment is the first line of defense. You, the learner, are what keeps the system alive. "