Want to create interactive content? It’s easy in Genially!
Taken Cybersecurity Adventure
hopkinsa
Created on September 27, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
start.
YOUR IDENTITY HAS BEEN STOLEN. TIME TO TAKE IT BACK.
A Cybersecurity Awareness Month Adventure
Taken
Mission 01:The Cybersecurity Wake Up Call
Introduction:You're an ordinary student, minding your own business, when one day you wake up to a shocking discovery. Your digital life has been turned upside down. Identity thieves have struck, and your personal information has been taken. To get it back, you must infiltrate the cyber-underworld and complete the 4 missions that appear on the map. Make sure you have your notebook handy to write down the clues you get. If you collect all the clues, you will get the combination that opens the briefcase containing your stolen information.
map/missions
Open the card
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Want to get your info back?
Your phone is ringing
Unknown
Incoming Call
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Want to get your info back?
Your phone rings again. You should probably answer it. Just sayin'.
Unknown
Incoming Call
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Want to get your info back?
Yes, but before we start, I have a threatening monologue to deliver. I don't know who you are. I don't know what you want. If you are looking for ransom, I can tell you I don't have money. But what I do have are a very particular set of cybersecurity skills that make me a nightmare for people like you. I will find my data, and I will delete your malware.
YOU
I assume you've received the letter. I know I could have just called you in the first place, but it wouldn't have had nearly the same dramatic effect. Are you ready to play the game?
UNKNOWN CALLER
Unknown
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Want to get your info back?
Reusing the same password for multiple accounts
Combining uppercase and lowercase letters, numbers, and symbols
Using common words or phrases
Using easily guessable information like birthdays
[Choose your response.]
YOU
I'm oddly terrified. Let's begin. What is a recommended practice for creating strong passwords?
UNKNOWN CALLER
Unknown
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Want to get your info back?
It's not important; you can keep all your passwords in your head
It stores your passwords in plain text
It makes your passwords shorter
It helps you remember your passwords
[Choose your response.]
YOU
Correct. Next question. Why is it important to use a password manager?
UNKNOWN CALLER
Unknown
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Want to get your info back?
The option to share your password with others
The need to create longer passwords
A faster login experience
A second layer of security beyond just a password
[Choose your response.]
YOU
Correct. One more. What does turning on multifactor authentication (MFA) add to your login process?
UNKNOWN CALLER
Unknown
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Want to get your info back?
You must wait 10 seconds to try again.
Unknown
Try again?
Unknown
WRONG. Say goodbye to your data!
UNKNOWN CALLER
CALL ENDED
It's stored on a USB drive that has been locked inside a briefcase and hidden in a secret location. Want it? Then you'll have to play our little game.
Want to get your info back?
Correct. Now look in the envelope we sent you. Notice that each letter has a corresponding number. Use the letters to answer this riddle: I am the solution to unlock a secret, A small tool, but incredibly potent. In cryptography, I play a vital role, Without me, your data wouldn't be whole. What am I?
UNKNOWN CALLER
Continue
Drag the letters to this space to form the answer to the riddle.Then, write down the numbers that go with each letter in order to get the secret code.
Form the code
The envelope from the indentity thieves has a return address on it. Either they are very, VERY stupid, or this is where they want you to go next. You arrive at the address to find a locked door in a dark alleyway. They try to hide in the shadows, you think to yourself, but they need to realize - I don't forgive, I don't forget, and I certainly don't allow pop-up ads.
Congratulations!you have successfully completed mission 1. don't lose the code you've just discovered!
map/missions
Mission 2
Mission 02: Phishy Conversations
Knock on the door and enter the secret code.
Password?
"Without a password you can't get in."
Enter the password
Pay careful attention to the conversation to obtain information that will help you answer the questions in mission 3 correctly.
Continue
Pay close attentionto the conversation to get the answers to the questions in the next mission.
(Man) Did you forget who you're talking to? I'm an identity thief. I know I gotta keep all my software up to date so I get the latest security patches. Can't have some other joker stealing my stolen info.
(Woman) By the way, I meant to ask, did you make sure to update the banking software?
(Man) Well I'm glad they don't! I just used one of the credit cards to buy some sweet T-Swift merch.
(Woman) I can't believe people don't just immediately delete your emails and report them like they're supposed to.
(Woman) Done any phishing lately?
(Man) Oh yeah. Got a few suckers to give me their credit card numbers by pretending to be a Nigerian prince. It's amazing what people will fall for these days.
Watching closely
The identity thief mentioned purchasing T-Swift merch. You decide to follow this lead across town to the Hot Topic store. You ask the clerk a couple of questions, but it seems to be a dead end. ...or is it? As you're leaving the store, a shadowy figure approaches. "Stay calm if you know what's good for you. If you ever want to see your data again, you'll answer these questions correctly."
Congratulations!you have successfully completed mission 2. YOU'RE getting closer to recovering your info.
Mission 3
map/misSiONS
Mission 03: Well This Is Convenient...
Answer the question
First question
C An attempt to trick you into revealing personal info
B A method of catching cybercriminals
A A popular social media platform
What is phishing?
Answer the question
Second question
C Click on any links or download attachments to investigate further
B Delete the email and report it as phishing
A Share it on social media for others to see
If you receive an email asking for your personal info or financial details and it seems suspicious, what should you do?
Answer the question
Third question
Why should you regularly update your software and applications?
C Software never needs updating
B Updates add fun new features
A Updates often contain security patches to protect against vulnerabilities
Continue
Well done!
Fine, fine. Here's the second number of the secret code. Now if you don't mind, I have to go approach another stranger and ask random questions about cybersecurity. Odd, but that's what they pay me to do.
New number obtained
Continue
Congratulations! You've got your second secret number to open the briefcase.
"WRONG. Say goodbye to your data." You must stand here and stare awkwardly at this man for 10 seconds before trying again.
Try again!
Days pass, and you hear nothing from the identity thieves. Then, one day, you receive a letter in the mail. It contains a single notecard with an address written on it. Maybe this is where the thieves have hidden the briefcase containing your data! You arrive at an abandoned warehouse (super original, I know) and notice several items scattered on the floor. Take a closer look.
you have successfully completed mission 3. You're so close to recovering your data, you can almost taste it...if data had a taste, that is.
Mission 4
map/miSsions
Mission 04: The Thrilling Conclusion
LEAST Safe and Responsible
MOST Safe and Responsible
Remember the order you form for later.
Arrange the steps below from MOST safe and responsible behavior to LEAST safe and responsible behavior when posting on social media.
Order
CDAB
BCAD
acbd
What secret code have you obtained?
Choose
Not the correct order!Wait 10 seconds, then you can try again.
Try again!
LEAST Responsible
MOST Responsible
Remember the order you form for later.
CORRECT!When it comes to spotting real or fake news online, arrange the following behaviors from the MOST responsible to LEAST responsible.
Order
CBAD
BCAD
acbd
What secret code have you obtained?
Choose
Not the correct order!Wait 10 seconds, then you can try again.
Try again!
LEAST Recommended
MOST Recommended
Remember the order you form for later.
CORRECT!If you suspect your personal data has been compromised or stolen, sort the following actions from the MOST recommended to LEAST recommended.
Order
DCAB
BCAD
DBAC
What secret code have you obtained?
Choose
Not the correct order!Wait 10 seconds, then you can try again.
Try again!
New number obtained
Continue
Congratulations! You've got the last secret number to open the briefcase.
Correct
At the far end of the warehouse is a briefcase. It's time to open it.
The Briefcase
map/miSsions
Final Mission
Password?
What is the code?
Enter the correct numbers
Submit THIS FORM to be entered in a drawing for fabulous prizes!
You have recovered your data! Congratulations!
Mission accomplished!
If you leave, you will have to start all over againAre you sure you want to leave?
Exit
Continue
Are you giving up?You were very close to getting your identity back!