Want to create interactive content? It’s easy in Genially!
IMPOSTOR ESCAPE - Cyber security - Level 2
Liliana Upegui
Created on December 16, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
Cyber security
ESCAPE
IMPOSTOR!
START
ALERT! ALERT!
An alien has entered our ship and is trying to replace the crew. We need to know what body he is in and expel him before he takes control of everyone. We cannot return to Earth until we are sure that he is not one of us!
IMPOSTOR!
ESCAPE
With your nerves you have forgotten the password to close the main hatch of the ship. Answer the cyber security questions correctly to close it!
CLOSE THE DOOR
GO!
Surfing the web, BAM! Screaming pop-up, frozen screen. It says your PC's infected & demands action. Panic! What's the safest escape?
Utilize Task Manager to terminate the browser process
Simply restart your computer, and it should be fine
Answer correctly
CLOSE THE DOOR
When utilizing a free Wi-Fi hotspot, what's a proactive step to safeguard your connection?
Implement a firewall to deter unwanted connections
Employ a VPN for encrypted traffic
Answer correctly
CLOSE THE DOOR
What's the main reason hackers might use seemingly simple tools like USB drives or open doors to attack a system?
They often exploit human vulnerabilities and lax security protocols
They're more effective than complex digital attacks
Answer correctly
CLOSE THE DOOR
It self-propagates and blasts itself
It encrypts files
What is the main characteristic of ransomware?
Answer correctly
CLOSE THE door
All right! Gate closed!
next
Room 4
Room 3
Room 2
Room 1
Find the impostors in each room
CHECK ALL ROOMS
Emergency meeting! The ship's data core is malfunctioning, and suspicion is spreading like wildfire. Let's identify the backup saboteur before it's too late!
I test my backups every Friday by simulating a meteor strike. Gotta be prepared for the worst!
I plugged a hard drive straight into the server. That's has to be safer than those flimsy cloud things, right?
My backups are encrypted and chilling in the cloud, password-protected
I keep two backups on the ship's mainframe and one on my personal laptop at home. Redundancy is key!
IDENTIFY THE IMPOSTOR!
Drag the light for the suspect
LOOK FOR THE ALIEN!
Room 4
Room 3
Room 2
Find the impostors in each room
CHECK ALL ROOMS
Three crew members are discussing the ship's security vulnerabilities after a recent scare. One of them is the alien imposter, trying to mislead the others. Who is most likely telling a lie?
Master keys are a huge security risk. We should replace all the locks and implement a digital key system to track access
I'm worried about long-range zoom attacks. Someone could be watching us from another ship and steal sensitive data displayed on our monitors
We need to tighten access to the engine room. Someone could easily bypass the door with a $2 tool called a 'Carolina roller' and gain control of the entire ship
IDENTIFY THE IMPOSTOR!
Drag the light for the suspect
LOOK FOR THE ALIEN!
Room 4
Room 3
Find the impostors in each room
CHECK ALL ROOMS
The ship's network is compromised, impacting Wi-Fi, security cameras, and VoIP. Both crew members assert they can rectify it. Identify the Imposter among them
Patching the firewall is risky, we might lose vital comms with the escape shuttle. Let's isolate the compromised systems on a separate network first, then secure them one by one
We need to patch the firewall immediately! That public Wi-Fi is open to everyone, it's like a backdoor right into the engine room!
IDENTIFY THE IMPOSTOR!
Drag the light for the suspect
LOOK FOR THE ALIEN!
Room 4
Find the impostors in each room
CHECK ALL ROOMS
... there is only one person left
IDENTIFY THE IMPOSTOR!
DSL
Cable
What type of internet connection can provide decent speeds for basic tasks in a rural area with limited options?
Choose THE TRUTH
EXPEL THE ALIEN
Limiting the amount of personal information you share
Avoiding expressing controversial opinions
How can one best interpret Scott Shober's suggestion to 'not be too honest on social media'?
Choose THE TRUTH
EXPEL THE ALIEN
To identify the caller's origin for legal action
To block robocalls automatically
What's the purpose of STIR/SHAKEN technology?
Choose THE TRUTH
EXPEL THE ALIEN
VERY WELL!
Choose THE TRUTH
EXPEL THE ALIEN
All rooms are clean
CONGRATULATIONS!
TRY AGAIN
You may find useful retaking the lesson: Your Computer is Infected
Restarting might not actually close the pop-up: Depending on how the malware is designed, a reboot could simply reload the same pop-up or even worse, trap you in a restart loop
Now you are the impostor ...
The alien is in your body
OH NO!
You may find useful retaking the lesson: Backups
This crewmate follows the recommended 3-2-1 backup strategy: three copies, two local (onboard), and one off-site (home laptop). This minimizes the risk of losing data due to local disasters or hardware failures
TRY AGAIN
Tells the truth
THERE ARE NO ALIENS HERE!
You may find useful retaking the lesson: ISP Types
In rural areas with limited options, DSL is often a more accessible choice than cable for basic internet needs. Utilizing existing telephone lines, DSL can provide decent speeds where cable infrastructure is scarce
try again
Now you are the impostor ...
The alien is in your body
OH NO!
You will lose all your progress
Are you sure you want to go back to the beginning?
NO!
YES!
"We return home with the certainty that none of us is an imposter ... or so we think. End of transmission."
SEE YOU ON EARTH!
TRY AGAIN
You may find useful retaking the lesson: Free WiFi
Firewalls block unwanted programs from internet access but don't directly secure data flow. While essential for security, they're insufficient for public Wi-Fi
Now you are the impostor ...
The alien is in your body
OH NO!
TRY AGAIN
You may find useful retaking the lesson: Physical Security
Exploiting human vulnerabilities—curiosity, trust, and fear—proves easier than tackling complex digital systems. Tools like USB drives or open doors leverage these to bypass security and gain access
Now you are the impostor ...
The alien is in your body
OH NO!
TRY AGAIN
You may find useful retaking the lesson: Malware
Describing behavior, 'self-propagating and blasting itself' fits worms. Worms rapidly replicate, causing disruptions. Ransomware, while possibly having worm-like features, focuses on data encryption, not self-replication
Now you are the impostor ...
The alien is in your body
OH NO!
You may find useful retaking the lesson: Backups
This crewmate values data encryption and secure storage. Cloud backups provide accessibility and scalability, while password protection enhances defense against unauthorized access
TRY AGAIN
Tells the truth
THERE ARE NO ALIENS HERE!
You may find useful retaking the lesson: Backups
This crewmate is proactive! Testing backups regularly ensures they're functional and ready for real-world disasters. Simulating meteor strikes emphasizes the importance of preparedness.
TRY AGAIN
Tells the truth
THERE ARE NO ALIENS HERE!
You may find useful retaking the lesson: Physical Security Threats
A ‘Carolina roller’ is a real tool that can be used to open some types of locks. It is also known as a ‘Travelers Hook’ or a ‘Shrum tool’. The concern is valid, as someone could use this tool to access the engine room and sabotage the ship
TRY AGAIN
Tells the truth
THERE ARE NO ALIENS HERE!
You may find useful retaking the lesson: Physical Security Threats
Master keys are indeed a huge security risk, as they can be lost, stolen, or duplicated, allowing unauthorized access to multiple areas of the ship. A suggestion to implement a digital key system is reasonable
TRY AGAIN
Tells the truth
THERE ARE NO ALIENS HERE!
You may find useful retaking the lesson: WiFi, NVR, VoIP, Static IP
Prioritizing network isolation before patching the firewall ensures damage control and minimizes risk
TRY AGAIN
Tells the truth
THERE ARE NO ALIENS HERE!
You may find useful retaking the lesson: Social Media
Scott Shober's advice to "not be too honest on social media" primarily means limiting the sharing of personal information. It emphasizes safeguarding privacy and minimizing the risks associated with oversharing online
try again
Now you are the impostor ...
The alien is in your body
OH NO!
You may find useful retaking the lesson: Phishing
While STIR/SHAKEN technology doesn’t directly block robocalls, it helps in reducing fraudulent robocalls by verifying the information displayed on your Caller ID.
try again
Now you are the impostor ...
The alien is in your body
OH NO!