Want to create interactive content? It’s easy in Genially!
IMPOSTOR ESCAPE - Cyber security - Level 2
Liliana Upegui
Created on December 16, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
Cyber security
ESCAPE
IMPOSTOR!
START
ESCAPE
IMPOSTOR!
ALERT! ALERT!
An alien has entered our ship and is trying to replace the crew. We need to know what body he is in and expel him before he takes control of everyone. We cannot return to Earth until we are sure that he is not one of us!
CLOSE THE DOOR
With your nerves you have forgotten the password to close the main hatch of the ship. Answer the cyber security questions correctly to close it!
GO!
CLOSE THE DOOR
Answer correctly
Surfing the web, BAM! Screaming pop-up, frozen screen. It says your PC's infected & demands action. Panic! What's the safest escape?
Utilize Task Manager to terminate the browser process
Simply restart your computer, and it should be fine
CLOSE THE DOOR
Answer correctly
When utilizing a free Wi-Fi hotspot, what's a proactive step to safeguard your connection?
Employ a VPN for encrypted traffic
Implement a firewall to deter unwanted connections
CLOSE THE DOOR
Answer correctly
What's the main reason hackers might use seemingly simple tools like USB drives or open doors to attack a system?
They're more effective than complex digital attacks
They often exploit human vulnerabilities and lax security protocols
CLOSE THE door
Answer correctly
What is the main characteristic of ransomware?
It self-propagates and blasts itself
It encrypts files
All right! Gate closed!
next
CHECK ALL ROOMS
Find the impostors in each room
Room 3
Room 1
Room 4
Room 2
IDENTIFY THE IMPOSTOR!
Emergency meeting! The ship's data core is malfunctioning, and suspicion is spreading like wildfire. Let's identify the backup saboteur before it's too late!
I keep two backups on the ship's mainframe and one on my personal laptop at home. Redundancy is key!
I plugged a hard drive straight into the server. That's has to be safer than those flimsy cloud things, right?
I test my backups every Friday by simulating a meteor strike. Gotta be prepared for the worst!
My backups are encrypted and chilling in the cloud, password-protected
LOOK FOR THE ALIEN!
Drag the light for the suspect
CHECK ALL ROOMS
Find the impostors in each room
Room 3
Room 4
Room 2
IDENTIFY THE IMPOSTOR!
Three crew members are discussing the ship's security vulnerabilities after a recent scare. One of them is the alien imposter, trying to mislead the others. Who is most likely telling a lie?
I'm worried about long-range zoom attacks. Someone could be watching us from another ship and steal sensitive data displayed on our monitors
We need to tighten access to the engine room. Someone could easily bypass the door with a $2 tool called a 'Carolina roller' and gain control of the entire ship
Master keys are a huge security risk. We should replace all the locks and implement a digital key system to track access
LOOK FOR THE ALIEN!
Drag the light for the suspect
CHECK ALL ROOMS
Find the impostors in each room
Room 3
Room 4
IDENTIFY THE IMPOSTOR!
The ship's network is compromised, impacting Wi-Fi, security cameras, and VoIP. Both crew members assert they can rectify it. Identify the Imposter among them
Patching the firewall is risky, we might lose vital comms with the escape shuttle. Let's isolate the compromised systems on a separate network first, then secure them one by one
We need to patch the firewall immediately! That public Wi-Fi is open to everyone, it's like a backdoor right into the engine room!
LOOK FOR THE ALIEN!
Drag the light for the suspect
CHECK ALL ROOMS
Find the impostors in each room
Room 4
IDENTIFY THE IMPOSTOR!
... there is only one person left
EXPEL THE ALIEN
Choose THE TRUTH
What type of internet connection can provide decent speeds for basic tasks in a rural area with limited options?
Cable
DSL
EXPEL THE ALIEN
Choose THE TRUTH
How can one best interpret Scott Shober's suggestion to 'not be too honest on social media'?
Limiting the amount of personal information you share
Avoiding expressing controversial opinions
EXPEL THE ALIEN
Choose THE TRUTH
What's the purpose of STIR/SHAKEN technology?
To identify the caller's origin for legal action
To block robocalls automatically
EXPEL THE ALIEN
Choose THE TRUTH
VERY WELL!
CONGRATULATIONS!
All rooms are clean
OH NO!
The alien is in your body
Now you are the impostor ...
Restarting might not actually close the pop-up: Depending on how the malware is designed, a reboot could simply reload the same pop-up or even worse, trap you in a restart loop
TRY AGAIN
You may find useful retaking the lesson: Your Computer is Infected
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
This crewmate follows the recommended 3-2-1 backup strategy: three copies, two local (onboard), and one off-site (home laptop). This minimizes the risk of losing data due to local disasters or hardware failures
You may find useful retaking the lesson: Backups
OH NO!
The alien is in your body
Now you are the impostor ...
try again
In rural areas with limited options, DSL is often a more accessible choice than cable for basic internet needs. Utilizing existing telephone lines, DSL can provide decent speeds where cable infrastructure is scarce
You may find useful retaking the lesson: ISP Types
Are you sure you want to go back to the beginning?
You will lose all your progress
YES!
NO!
SEE YOU ON EARTH!
"We return home with the certainty that none of us is an imposter ... or so we think. End of transmission."
OH NO!
The alien is in your body
Now you are the impostor ...
TRY AGAIN
Firewalls block unwanted programs from internet access but don't directly secure data flow. While essential for security, they're insufficient for public Wi-Fi
You may find useful retaking the lesson: Free WiFi
OH NO!
The alien is in your body
Now you are the impostor ...
TRY AGAIN
Exploiting human vulnerabilities—curiosity, trust, and fear—proves easier than tackling complex digital systems. Tools like USB drives or open doors leverage these to bypass security and gain access
You may find useful retaking the lesson: Physical Security
OH NO!
The alien is in your body
Now you are the impostor ...
TRY AGAIN
Describing behavior, 'self-propagating and blasting itself' fits worms. Worms rapidly replicate, causing disruptions. Ransomware, while possibly having worm-like features, focuses on data encryption, not self-replication
You may find useful retaking the lesson: Malware
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
This crewmate values data encryption and secure storage. Cloud backups provide accessibility and scalability, while password protection enhances defense against unauthorized access
You may find useful retaking the lesson: Backups
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
This crewmate is proactive! Testing backups regularly ensures they're functional and ready for real-world disasters. Simulating meteor strikes emphasizes the importance of preparedness.
You may find useful retaking the lesson: Backups
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
A ‘Carolina roller’ is a real tool that can be used to open some types of locks. It is also known as a ‘Travelers Hook’ or a ‘Shrum tool’. The concern is valid, as someone could use this tool to access the engine room and sabotage the ship
You may find useful retaking the lesson: Physical Security Threats
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
Master keys are indeed a huge security risk, as they can be lost, stolen, or duplicated, allowing unauthorized access to multiple areas of the ship. A suggestion to implement a digital key system is reasonable
You may find useful retaking the lesson: Physical Security Threats
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
Prioritizing network isolation before patching the firewall ensures damage control and minimizes risk
You may find useful retaking the lesson: WiFi, NVR, VoIP, Static IP
OH NO!
The alien is in your body
Now you are the impostor ...
try again
Scott Shober's advice to "not be too honest on social media" primarily means limiting the sharing of personal information. It emphasizes safeguarding privacy and minimizing the risks associated with oversharing online
You may find useful retaking the lesson: Social Media
OH NO!
The alien is in your body
Now you are the impostor ...
try again
While STIR/SHAKEN technology doesn’t directly block robocalls, it helps in reducing fraudulent robocalls by verifying the information displayed on your Caller ID.
You may find useful retaking the lesson: Phishing