IMPOSTOR ESCAPE - Cyber security - Level 2
Liliana Upegui
Created on December 16, 2023
More creations to inspire you
CEVICHE ESCAPE GAME
Escape games
SPACE INVADERS GAME
Escape games
THUNBERG CASE. TIME SOLDIERS
Escape games
MINERALS AND ROCKS
Escape games
HARRY POTTER ESCAPE GAME
Escape games
HARRY POTTER
Escape games
MISSION SANTA: MATH BREAKOUT
Escape games
Transcript
START
IMPOSTOR!
ESCAPE
Cyber security
ESCAPE
IMPOSTOR!
An alien has entered our ship and is trying to replace the crew. We need to know what body he is in and expel him before he takes control of everyone.We cannot return to Earth until we are sure that he is not one of us!
ALERT! ALERT!
GO!
CLOSE THE DOOR
With your nerves you have forgotten the password to close the main hatch of the ship.Answer the cyber security questions correctly to close it!
CLOSE THE DOOR
Answer correctly
Simply restart your computer, and it should be fine
Utilize Task Manager to terminate the browser process
Surfing the web, BAM! Screaming pop-up, frozen screen. It says your PC's infected & demands action. Panic! What's the safest escape?
CLOSE THE DOOR
Answer correctly
Employ a VPN for encrypted traffic
Implement a firewall to deter unwanted connections
When utilizing a free Wi-Fi hotspot, what's a proactive step to safeguard your connection?
CLOSE THE DOOR
Answer correctly
They're more effective than complex digital attacks
They often exploit human vulnerabilities and lax security protocols
What's the main reason hackers might use seemingly simple tools like USB drives or open doors to attack a system?
CLOSE THE door
Answer correctly
What is the main characteristic of ransomware?
It encrypts files
It self-propagates and blasts itself
next
All right! Gate closed!
CHECK ALL ROOMS
Find the impostors in each room
Room 1
Room 2
Room 3
Room 4
LOCKED ROOM
LOCKED ROOM
LOCKED ROOM
IDENTIFY THE IMPOSTOR!
I keep two backups on the ship's mainframe and one on my personal laptop at home. Redundancy is key!
My backups are encrypted and chilling in the cloud, password-protected
I plugged a hard drive straight into the server. That's has to be safer than those flimsy cloud things, right?
I test my backups every Friday by simulating a meteor strike. Gotta be prepared for the worst!
Emergency meeting! The ship's data core is malfunctioning, and suspicion is spreading like wildfire. Let's identify the backup saboteur before it's too late!
LOOK FOR THE ALIEN!
Drag the light for the suspect
CHECK ALL ROOMS
Find the impostors in each room
Room 2
Room 3
Room 4
LOCKED ROOM
LOCKED ROOM
IDENTIFY THE IMPOSTOR!
We need to tighten access to the engine room. Someone could easily bypass the door with a $2 tool called a 'Carolina roller' and gain control of the entire ship
I'm worried about long-range zoom attacks. Someone could be watching us from another ship and steal sensitive data displayed on our monitors
Master keys are a huge security risk. We should replace all the locks and implement a digital key system to track access
Three crew members are discussing the ship's security vulnerabilities after a recent scare. One of them is the alien imposter, trying to mislead the others. Who is most likely telling a lie?
LOOK FOR THE ALIEN!
Drag the light for the suspect
CHECK ALL ROOMS
Find the impostors in each room
Room 3
Room 4
LOCKED ROOM
IDENTIFY THE IMPOSTOR!
We need to patch the firewall immediately! That public Wi-Fi is open to everyone, it's like a backdoor right into the engine room!
Patching the firewall is risky, we might lose vital comms with the escape shuttle. Let's isolate the compromised systems on a separate network first, then secure them one by one
The ship's network is compromised, impacting Wi-Fi, security cameras, and VoIP. Both crew members assert they can rectify it. Identify the Imposter among them
LOOK FOR THE ALIEN!
Drag the light for the suspect
CHECK ALL ROOMS
Find the impostors in each room
Room 4
IDENTIFY THE IMPOSTOR!
... there is only one person left
EXPEL THE ALIEN
Choose THE TRUTH
What type of internet connection can provide decent speeds for basic tasks in a rural area with limited options?
Cable
DSL
EXPEL THE ALIEN
Choose THE TRUTH
How can one best interpret Scott Shober's suggestion to 'not be too honest on social media'?
Avoiding expressing controversial opinions
Limiting the amount of personal information you share
EXPEL THE ALIEN
Choose THE TRUTH
What's the purpose of STIR/SHAKEN technology?
To block robocalls automatically
To identify the caller's origin for legal action
EXPEL THE ALIEN
Choose THE TRUTH
VERY WELL!
CONGRATULATIONS!
All rooms are clean
OH NO!
The alien is in your body
Now you are the impostor ...
Restarting might not actually close the pop-up: Depending on how the malware is designed, a reboot could simply reload the same pop-up or even worse, trap you in a restart loop
You may find useful retaking the lesson: Your Computer is Infected
TRY AGAIN
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
This crewmate follows the recommended 3-2-1 backup strategy: three copies, two local (onboard), and one off-site (home laptop). This minimizes the risk of losing data due to local disasters or hardware failures
You may find useful retaking the lesson: Backups
OH NO!
The alien is in your body
Now you are the impostor ...
try again
In rural areas with limited options, DSL is often a more accessible choice than cable for basic internet needs. Utilizing existing telephone lines, DSL can provide decent speeds where cable infrastructure is scarce
You may find useful retaking the lesson: ISP Types
YES!
NO!
Are you sure you want to goback to the beginning?
You will lose all your progress
SEE YOUON EARTH!
"We return home with the certainty that none of us is an imposter ...or so we think.End of transmission."
OH NO!
The alien is in your body
Now you are the impostor ...
Firewalls block unwanted programs from internet access but don't directly secure data flow. While essential for security, they're insufficient for public Wi-Fi
You may find useful retaking the lesson: Free WiFi
TRY AGAIN
OH NO!
The alien is in your body
Now you are the impostor ...
Exploiting human vulnerabilities—curiosity, trust, and fear—proves easier than tackling complex digital systems. Tools like USB drives or open doors leverage these to bypass security and gain access
You may find useful retaking the lesson: Physical Security
TRY AGAIN
OH NO!
The alien is in your body
Now you are the impostor ...
Describing behavior, 'self-propagating and blasting itself' fits worms. Worms rapidly replicate, causing disruptions. Ransomware, while possibly having worm-like features, focuses on data encryption, not self-replication
You may find useful retaking the lesson: Malware
TRY AGAIN
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
This crewmate values data encryption and secure storage. Cloud backups provide accessibility and scalability, while password protection enhances defense against unauthorized access
You may find useful retaking the lesson: Backups
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
This crewmate is proactive! Testing backups regularly ensures they're functional and ready for real-world disasters. Simulating meteor strikes emphasizes the importance of preparedness.
You may find useful retaking the lesson: Backups
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
A ‘Carolina roller’ is a real tool that can be used to open some types of locks. It is also known as a ‘Travelers Hook’ or a ‘Shrum tool’. The concern is valid, as someone could use this tool to access the engine room and sabotage the ship
You may find useful retaking the lesson: Physical Security Threats
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
Master keys are indeed a huge security risk, as they can be lost, stolen, or duplicated, allowing unauthorized access to multiple areas of the ship. A suggestion to implement a digital key system is reasonable
You may find useful retaking the lesson: Physical Security Threats
THERE ARE NO ALIENS HERE!
Tells the truth
TRY AGAIN
Prioritizing network isolation before patching the firewall ensures damage control and minimizes risk
You may find useful retaking the lesson: WiFi, NVR, VoIP, Static IP
OH NO!
The alien is in your body
Now you are the impostor ...
try again
Scott Shober's advice to "not be too honest on social media" primarily means limiting the sharing of personal information. It emphasizes safeguarding privacy and minimizing the risks associated with oversharing online
You may find useful retaking the lesson: Social Media
OH NO!
The alien is in your body
Now you are the impostor ...
try again
While STIR/SHAKEN technology doesn’t directly block robocalls, it helps in reducing fraudulent robocalls by verifying the information displayed on your Caller ID.
You may find useful retaking the lesson: Phishing