Want to make creations as awesome as this one?

Transcript

START

IMPOSTOR!

ESCAPE

Cyber security

ESCAPE

IMPOSTOR!

An alien has entered our ship and is trying to replace the crew. We need to know what body he is in and expel him before he takes control of everyone.We cannot return to Earth until we are sure that he is not one of us!

ALERT! ALERT!

GO!

CLOSE THE DOOR

With your nerves you have forgotten the password to close the main hatch of the ship.Answer the cyber security questions correctly to close it!

CLOSE THE DOOR

Answer correctly

Simply restart your computer, and it should be fine

Utilize Task Manager to terminate the browser process

Surfing the web, BAM! Screaming pop-up, frozen screen. It says your PC's infected & demands action. Panic! What's the safest escape?

CLOSE THE DOOR

Answer correctly

Employ a VPN for encrypted traffic

Implement a firewall to deter unwanted connections

When utilizing a free Wi-Fi hotspot, what's a proactive step to safeguard your connection?

CLOSE THE DOOR

Answer correctly

They're more effective than complex digital attacks

They often exploit human vulnerabilities and lax security protocols

What's the main reason hackers might use seemingly simple tools like USB drives or open doors to attack a system?

CLOSE THE door

Answer correctly

What is the main characteristic of ransomware?

It encrypts files

It self-propagates and blasts itself

next

All right! Gate closed!

CHECK ALL ROOMS

Find the impostors in each room

Room 1

Room 2

Room 3

Room 4

LOCKED ROOM

LOCKED ROOM

LOCKED ROOM

IDENTIFY THE IMPOSTOR!

I keep two backups on the ship's mainframe and one on my personal laptop at home. Redundancy is key!

My backups are encrypted and chilling in the cloud, password-protected

I plugged a hard drive straight into the server. That's has to be safer than those flimsy cloud things, right?

I test my backups every Friday by simulating a meteor strike. Gotta be prepared for the worst!

Emergency meeting! The ship's data core is malfunctioning, and suspicion is spreading like wildfire. Let's identify the backup saboteur before it's too late!

LOOK FOR THE ALIEN!

Drag the light for the suspect

CHECK ALL ROOMS

Find the impostors in each room

Room 2

Room 3

Room 4

LOCKED ROOM

LOCKED ROOM

IDENTIFY THE IMPOSTOR!

We need to tighten access to the engine room. Someone could easily bypass the door with a $2 tool called a 'Carolina roller' and gain control of the entire ship

I'm worried about long-range zoom attacks. Someone could be watching us from another ship and steal sensitive data displayed on our monitors

Master keys are a huge security risk. We should replace all the locks and implement a digital key system to track access

Three crew members are discussing the ship's security vulnerabilities after a recent scare. One of them is the alien imposter, trying to mislead the others. Who is most likely telling a lie?

LOOK FOR THE ALIEN!

Drag the light for the suspect

CHECK ALL ROOMS

Find the impostors in each room

Room 3

Room 4

LOCKED ROOM

IDENTIFY THE IMPOSTOR!

We need to patch the firewall immediately! That public Wi-Fi is open to everyone, it's like a backdoor right into the engine room!

Patching the firewall is risky, we might lose vital comms with the escape shuttle. Let's isolate the compromised systems on a separate network first, then secure them one by one

The ship's network is compromised, impacting Wi-Fi, security cameras, and VoIP. Both crew members assert they can rectify it. Identify the Imposter among them

LOOK FOR THE ALIEN!

Drag the light for the suspect

CHECK ALL ROOMS

Find the impostors in each room

Room 4

IDENTIFY THE IMPOSTOR!

... there is only one person left

EXPEL THE ALIEN

Choose THE TRUTH

What type of internet connection can provide decent speeds for basic tasks in a rural area with limited options?

Cable

DSL

EXPEL THE ALIEN

Choose THE TRUTH

How can one best interpret Scott Shober's suggestion to 'not be too honest on social media'?

Avoiding expressing controversial opinions

Limiting the amount of personal information you share

EXPEL THE ALIEN

Choose THE TRUTH

What's the purpose of STIR/SHAKEN technology?

To block robocalls automatically

To identify the caller's origin for legal action

EXPEL THE ALIEN

Choose THE TRUTH

VERY WELL!

CONGRATULATIONS!

All rooms are clean

OH NO!

The alien is in your body

Now you are the impostor ...

Restarting might not actually close the pop-up: Depending on how the malware is designed, a reboot could simply reload the same pop-up or even worse, trap you in a restart loop

You may find useful retaking the lesson: Your Computer is Infected

TRY AGAIN

THERE ARE NO ALIENS HERE!

Tells the truth

TRY AGAIN

This crewmate follows the recommended 3-2-1 backup strategy: three copies, two local (onboard), and one off-site (home laptop). This minimizes the risk of losing data due to local disasters or hardware failures

You may find useful retaking the lesson: Backups

OH NO!

The alien is in your body

Now you are the impostor ...

try again

In rural areas with limited options, DSL is often a more accessible choice than cable for basic internet needs. Utilizing existing telephone lines, DSL can provide decent speeds where cable infrastructure is scarce

You may find useful retaking the lesson: ISP Types

YES!

NO!

Are you sure you want to goback to the beginning?

You will lose all your progress

SEE YOUON EARTH!

"We return home with the certainty that none of us is an imposter ...or so we think.End of transmission."

OH NO!

The alien is in your body

Now you are the impostor ...

Firewalls block unwanted programs from internet access but don't directly secure data flow. While essential for security, they're insufficient for public Wi-Fi

You may find useful retaking the lesson: Free WiFi

TRY AGAIN

OH NO!

The alien is in your body

Now you are the impostor ...

Exploiting human vulnerabilities—curiosity, trust, and fear—proves easier than tackling complex digital systems. Tools like USB drives or open doors leverage these to bypass security and gain access

You may find useful retaking the lesson: Physical Security

TRY AGAIN

OH NO!

The alien is in your body

Now you are the impostor ...

Describing behavior, 'self-propagating and blasting itself' fits worms. Worms rapidly replicate, causing disruptions. Ransomware, while possibly having worm-like features, focuses on data encryption, not self-replication

You may find useful retaking the lesson: Malware

TRY AGAIN

THERE ARE NO ALIENS HERE!

Tells the truth

TRY AGAIN

This crewmate values data encryption and secure storage. Cloud backups provide accessibility and scalability, while password protection enhances defense against unauthorized access

You may find useful retaking the lesson: Backups

THERE ARE NO ALIENS HERE!

Tells the truth

TRY AGAIN

This crewmate is proactive! Testing backups regularly ensures they're functional and ready for real-world disasters. Simulating meteor strikes emphasizes the importance of preparedness.

You may find useful retaking the lesson: Backups

THERE ARE NO ALIENS HERE!

Tells the truth

TRY AGAIN

A ‘Carolina roller’ is a real tool that can be used to open some types of locks. It is also known as a ‘Travelers Hook’ or a ‘Shrum tool’. The concern is valid, as someone could use this tool to access the engine room and sabotage the ship

You may find useful retaking the lesson: Physical Security Threats

THERE ARE NO ALIENS HERE!

Tells the truth

TRY AGAIN

Master keys are indeed a huge security risk, as they can be lost, stolen, or duplicated, allowing unauthorized access to multiple areas of the ship. A suggestion to implement a digital key system is reasonable

You may find useful retaking the lesson: Physical Security Threats

THERE ARE NO ALIENS HERE!

Tells the truth

TRY AGAIN

Prioritizing network isolation before patching the firewall ensures damage control and minimizes risk

You may find useful retaking the lesson: WiFi, NVR, VoIP, Static IP

OH NO!

The alien is in your body

Now you are the impostor ...

try again

Scott Shober's advice to "not be too honest on social media" primarily means limiting the sharing of personal information. It emphasizes safeguarding privacy and minimizing the risks associated with oversharing online

You may find useful retaking the lesson: Social Media

OH NO!

The alien is in your body

Now you are the impostor ...

try again

While STIR/SHAKEN technology doesn’t directly block robocalls, it helps in reducing fraudulent robocalls by verifying the information displayed on your Caller ID.

You may find useful retaking the lesson: Phishing