Safe Games

Engaging games to teach students about internet safety and security.

Kahoot game.

Games designed to promote safe online behaviors and practices.

Game designed to promote online safety.

Kahoot game

Advanced Games (CTF)

Engage in some advance games.

Fun Game.

Capture the Flag.

fun and challenging game.

Resources

Safe Internet Game

Instructions

Cyber Challenge Game Instructions

Welcome to the Cyber Challenge Game! Test your knowledge of internet safety, phishing detection, password strength, and more by progressing through various levels and then take an optional quiz at the end to solidify your learning.

How to Play the Game:

  1. Start the game by reading the instructions at each level carefully.

  2. Enter your answer in the input box for each challenge.

    • The challenges range from decoding messages, identifying phishing emails, recognizing social engineering tactics, and evaluating password strength.

  3. Submit your answer by pressing the "Submit" button.

    • If you answer correctly, you will move to the next level.

    • If you answer incorrectly, you will be prompted to try again.

  4. Complete all the levels to finish the game.

  5. Once you complete the game, you will see a message congratulating you and be presented with two options:

    • Play Again: Restart the game from the beginning.

    • Take a Quiz: Test your knowledge with a 10-question quiz.

The Quiz:

  1. Start the quiz by clicking the "Take a Quiz" button after completing the game.

  2. Each question will present multiple-choice answers.

    • Select your answer by clicking the checkbox next to the answer you believe is correct.

  3. Submit your answer by clicking "Submit Answer".

    • You will immediately see whether your answer was correct or incorrect.

  4. Progress through all 10 questions. If you answer correctly, you will proceed to the next question. If you answer incorrectly, you will have the chance to try again.

  5. After completing the quiz, you will receive a message saying, "Quiz Completed!"

Important Tips:

  • Pay close attention to details in the questions and answers. Some phishing emails or URLs might look almost legitimate but have small differences that indicate they're unsafe.

  • Use your knowledge of secure connections, passwords, and social engineering to help you identify safe vs. unsafe practices.

Types of Challenges in the Game:

Here are the types of challenges you’ll encounter in the game, along with the correct answers:

  1. Caesar Cipher Decoding:

    • Question: Decode the message using a Caesar Cipher with a shift of 3:
      Message: "Vkrqh lv vdiw!"
      Answer: "safety is safe" (shift of 3)

    • Question: Decode the message using a Caesar Cipher with a shift of 4:
      Message: "Wlsri mw weji!"
      Answer: "sleep is safe" (shift of 4)

  2. Phishing Detection:

    • Question: Identify which email is a phishing scam (Enter 1 or 2):

      1. Dear user, your account is at risk. Please reset your password here: www.fakebank.com/reset

      2. Dear customer, your package is delayed. Track it using your secure link: www.delivery.com/track
        Answer: "1" (The first email is a phishing attempt asking for personal information.)

    • Question: Which email is safe (Enter 1 or 2):

      1. Please verify your account details by clicking here: www.fakestore.com

      2. Your bank statement is ready. Login to your account securely at: www.realbank.com
        Answer: "2" (The second email is safe; the first one is asking for personal details.)

  3. Social Engineering:

    • Question: You get a phone call from someone claiming to be tech support. They ask for your password. Should you give it?
      Answer: "no" (Never give your password over the phone.)

    • Question: A coworker asks for your login credentials because they "forgot theirs." Should you share your credentials?
      Answer: "no" (It’s never safe to share login credentials.)

  4. Password Strength Analysis:

    • Question: Evaluate this password: "P@ssw0rd123". Is it strong or weak?
      Answer: "weak" (This is a common password despite the inclusion of numbers and special characters.)

    • Question: Evaluate this password: "5tR0nG!2023". Is it strong or weak?
      Answer: "strong" (This password is strong because it includes a mix of uppercase, lowercase, numbers, and special characters.)

  5. URL Spoofing:

Types of Quiz Questions:

Here are the types of questions you’ll encounter in the quiz, along with the correct answers:

  1. Question: Which of the following is an example of a phishing scam?
    Answer: An email asking for personal info.

  2. Question: Should you ever give your password over the phone?
    Answer: No, never give passwords over the phone.

  3. Question: Which of the following is the strongest password?
    Answer: 5tr0nG!2023 (Strong because it includes uppercase, lowercase, numbers, and special characters).

  4. Question: Which of the following URLs is legitimate?
    Answer: https://amazon.com (The other URLs are spoofed.)

  5. Question: What should you do if you receive a suspicious email with a link?
    Answer: Report the email and delete it.

  6. Question: What is social engineering?
    Answer: Tricking people into revealing personal info.

  7. Question: Which of the following is a common SQL injection string?
    Answer: ' OR '1'='1' (This is used to trick database queries).

  8. Question: Which of the following indicates a secure connection?
    Answer: HTTPS:// (This shows the connection is secure and encrypted).

  9. Question: How often should you change your password?
    Answer: Regularly, especially for important accounts.

  10. Question: What is the purpose of two-factor authentication?
    Answer: To increase security by adding a second verification step.

Good luck, and enjoy learning how to stay cyber-safe!

Get in touch

6975426243
info@safeinternet.gr

Play Game.

You see a sus mail what do you do?