Want to create interactive content? It’s easy in Genially!

Over 30 million people create interactive content in Genially

Check out what others have designed:

Transcript

We're coming!

Hi,Updated all the passwords to keep my data safe but can't remember them! Need your help. Pls come to our classroom, asap.

Safer Things...

Millie

Enter Password

Group challenges

Recover e-mail password

Recover computer password

Get the revision!

Introduction

Help your teacher access her computer and files. Collect all the numbers by completing each of the challenges, and enter them in order in the final section to finish the game.

  • folder password (use the numbers collected in group challenges)
  • her e-mail password (look for clues in the picture)
  • her computer password (look for clues in the picture)

You'll need to recover:

Your absent-minded teacher can't remember her new passwords... Use your hacking skills and help her access the files for your revision. The test is tomorrow!

INTRODUCTION

Computer password hint: favourite colour

Enter the password

Millie

Enter Password

E-mail password hint: pet's name

Enter the password

Next

Time for group challenges! Scan the codes or click the tiles, read the texts and answer the questions. Collect your parts of the code!
GROUP 4
GROUP 3
GROUP 2
GROUP 1

You have reached the last step... Enter the password!

Enter password

False
True

In case of spoofing you must be very careful as every single letter matters.

Spoofing

Spoofing is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are interacting with a trusted source. For example, you might receive an email that looks like it’s from your boss, a company you’ve done business with, or even from someone in your family—but it actually isn’t. Criminals count on being able to manipulate you into believing that these spoofed communications are real, which can lead you to download malicious software, send money, or disclose personal, financial, or other sensitive information.

RIGHT!

next

Next

Your part of the code:7

False
True

Phishing victims share their personal data with criminals being fully aware of it.

Phishing

Phishing schemes often use spoofing techniques to lure you in and get you to take the bait. These scams are designed to trick you into giving information to criminals that they shouldn’t have access to. In a phishing scam, you might receive an email that appears to be from a legitimate business and is asking you to update or verify your personal information by replying to the email or visiting a website. The web address might look similar to one you’ve used before. The email may be convincing enough to get you to take the action requested. But once you click on that link, you’re sent to a spoofed website that might look nearly identical to the real thing—like your bank or credit card site—and asked to enter sensitive information like passwords, credit card numbers, banking PINs, etc. These fake websites are used solely to steal your information.

RIGHT!

next

Next

Your part of the code:0

False
True

In the most famous ransomeware attack computers in over 100 countries were infected and their users lost access to their files.

Malware attacks

A malware attack is where a computer system or network is infected with a computer virus or other type of malware. A computer compromised by malware could be used by cybercriminals for several purposes. These include stealing confidential data, using the computer to carry out other criminal acts, or causing damage to data. A famous example of a malware attack was the WannaCry ransomware attack, a global cybercrime committed in May 2017. WannaCry is a type of ransomware, malware used to extort money by holding the victim’s data or device to ransom. The ransomware targeted a vulnerability in computers running Microsoft Windows. When the WannaCry ransomware attack hit, 230,000 computers were affected across 150 countries. Users were locked out of their files and sent a message demanding that they pay a Bitcoin ransom to regain access. Worldwide, the WannaCry cybercrime is estimated to have caused $4 billion in financial losses. To this day, the attack stands out for its sheer size and impact.

RIGHT!

next

Next

Your part of the code:9

False
True

DDoS attacks don't use standard communication protocols.

DDoS

Distributed DoS attacks (DDoS) are a type of cybercrime attack that cybercriminals use to bring down a system or network. Sometimes connected IoT (Internet of Things) devices are used to launch DDoS attacks. A DDoS attack overwhelms a system by using one of the standard communication protocols it uses to spam the system with connection requests. Cybercriminals who are carrying out cyberextortion may use the threat of a DDoS attack to demand money. Alternatively, a DDoS may be used as a distraction tactic while another type of cybercrime takes place. A famous example of this type of attack is the 2017 DDoS attack on the UK National Lottery website. This brought the lottery’s website and mobile app offline, preventing UK citizens from playing. The reason behind the attack remains unknown, however, it is suspected that the attack was an attempt to blackmail the National Lottery.

RIGHT!

next

Next

Your part of the code:2