Inspiration

EDUCATIONAL GAMES + CAREER TRAINING Cybersecurity is one of the most in-demand career fields. According to CyberSeek, from June 2019  through May 2020, there were 171,000 openings for Information Security Analysts, but only 125,000 workers currently employed in those positions – an annual talent shortfall of 46,000 workers. On average, cybersecurity roles take 21% longer to fill than other IT jobs. The U.S. Bureau of Labor Statistics expects 31% hiring growth for Cybersecurity Analysts between 2019 and 2029, growing much faster than average in other careers. There are 400,000 U.S. job openings in IT and a $52,000 median entry-level salary in IT support.

GAME STORY

It's your first day on the job as a software engineer at a cybersecurity company. What could go wrong? Follow a player's journey to become CEO by completing CyberQuests. Using your cybernetic enhanced CIA agent detective skills, you figured out that SkyNet is an indestructible artifical-intelligence killing machine programmed to destroy all human cybersecurity companies.

The year is 2042. In a post apocalyptic galaxy run by competitive cybersecurity companies, millions of employees are plugged into the workplace. A Cyberwar-torn hacker landscape WITH An almost indestructible artifical-intelligence killing machine has been programmed to destroy all human cybersecurity companies. one cybernetic enhanced CIA agent with no memory of their past will save the human race. By day, you are an employee at a large cybersecurity company named "Secureworks” neurally connected to the workplace, unaware that the world you live in is a Cyberwar-torn simulation. By night, You are unplugged as a CIA agent with cybersecurity skills sent from 2042 to 2022 to stop the artifical-intelligence killing machine, sent from the same year. Are you the chosen one foretold by prophecy to solve the CyberQuest?

MAIN OBJECTIVE The year is 2042. In a post apocalyptic galaxy run by competitive cybersecurity companies, millions of employees are plugged into the workplace. A Cyberwar-torn hacker landscape with an almost indestructible artifical-intelligence killing machine has been programmed to destroy all humans. Create JIRA tickets by typing randomly on your keyboard to gain skills. You have one year to complete the Cyberquest where the goal is to get the maximum number of points in one year. One cybernetic enhanced CIA agent with no memory of their past will save the human race.

  • Quest1: Operating systems
  • Quest2: Network security
  • Quest3: DevOps
  • Quest4: Security audits

What it does

Capture The Flag Style Create JIRA tickets by simply typing randomly to gain skills in cybersecurity.

When the player solves the puzzle, an embedded random string “password"or "flag" is revealed. The amount of points rewarded is relative to the perceived difficulty of the challenge (very easy, easy, medium, and hard). Player has one year of in-game time to find 4 passwords by completing cyberquests. Your end game is to get the maxium number of points in 1 year!

Case No: Y24W8-VERY-EASY Classification: Operating systems Quest Operation: TeleWork Social Engineering & phishing for Guarding Online Privacy

Case No: Y24W8-EASY Classification: network security Quest Operation: PowerGrid Hacked by Skynet - security doors are locked becoming a workplace Escape Room

Case No: Y24W8-AVERAGE Classification: devops Quest Operation: red team vs blue team log into purple terminal html/css/js Progamming test

Case No: Y24W8-HARD Classification: security audits Quest Operation: CyberClue: The Mystery of the Insider Threat

QUEST OBJECTIVES

Ancillary to the game's central purpose.

The Marketing department launched a post apocalyptic website without informing the engineers. They got hacked with a whaling attempt that uses an empoyee's personal information to make a believable message to trick people into giving up classified info. This is a complex and targeted attack that appears to come from someone inside the company. Help me defeat the hackers with random guesses, brute force, or a dictionary attack. *Purple Pin Breaker: Password cracking *

There is a new trend at SecureWorks. People putting names on food in the company fridge. Today I had a ham sandwich named Sally. I don't always think about cybersecurity... but when I do, it's always too late. My old account got hacked because my password was my cat's name. Now, I store my smart card in shielded sleeves to avoid chip cloning after using it for building entry. Help me come up with a new, more secure password for 2FA with a CAC/PIN? Create a new password for Trenton

As the newest employee, you remind me of a younger me growing up in the 2030's, I mowed lawns for a living and somehow became the CEO of SecureWorks in the year 2042. The Network Security team is going to be short staffed this week. With the short-staffed team, and the recent breach in our company with a million employees, SecureWorks is at risk. So if you could just go ahead and do the work of 3 Power Grid employees, that would be great. Keep the purple Data Networks online by clicking on them

Using your cybernetic enhanced CIA agent detective skills, you figured out that SkyNet is an indestructible artifical-intelligence killing machine programmed to destroy all human cybersecurity companies. All the doors are locked in the office trapping everyone with no lights... We need to get out!! We need to get to the data servers in the basement before they steal data but they hacked the smart card electronic doors. The fate of the human race is depending on you. Solve the puzzles to get the password to open the electronic door.

After the artifical-intelligence killing machine SkyNet security breach, our stock price has decreased 14.59% and we lost 2.53% of our Fortune 500 company customers. Emergency work meeting at 8:00AM ? But that's when I look at cat pictures on the internet! Corporate from headquarters is making us learn more about cybersecurity RED V.S. BLUE TEAMS and compete a company sponsored certification on programming logic. Complete the programming quiz and read Red v.s. Blue Teams

The company is under attack by a notorious hacker with the name "An0nym0u5" who is causing chaos. According to the I.P. address, he is from inside the office. We need to carry out an internal investigation. Since you are the chosen one foretold by prophecy to solve the CyberQuest, I'm putting you in charge. Read the description of each employee and check for the number of “Insider Threat” indicators displayed by each employee. You need to find the co-worker who is the Insider Threat or else the Insider Threat will escape. Can you stop the insider threat before it's too late? Accuse a co-worker with a crime, weapon, and location

3 PopQuizzes:

To increase productivity and retention in the workplace, secureworks employees can play for a monetary work bonus.

Escape Room:

  1. Chad's Fill in the Files Words related to Network Security

  2. R2D2'S Acrynom Memory test with pictures

  3. Alcabus Logic Quest Programming Logic Quest Your task is to decide whether a given selector targets all and only the elements marked on the right. Programming Logic Quest footer > div {…} footer div {…} div.widget1 {…} h2 ~ p {…}

  4. CyberQuest learn more about RED team v.s. BLUE team and cybersecurity careers

  5. Office Bulletin Board

  6. Data Networks

Keep the servers online by clicking on them when they turn red

Game Level Map: VERY EASY Operating systems EASY Network security AVERAGE DevOps HARD Security audits

CyberClue: Insider Threat: The Mystery of the Missing Key The company is under attack by a double-agent employee. We need to carry out an internal investigation Read the description of each employee and check for the number of “Insider Threat” indicators displayed by each employee. A security audit is a comprehensive assessment of your organization's information system; typically, this assessment measures your information system's security against an audit checklist of industry best practices, externally established standards, or federal regulations. After learning about Sensitive and Classified Information, and Protecting Classified Data Removable Media, Be sure to guess the right person or else the Insider Threat will escape. Can you stop the threat before it's too late? Correctly identify the Insider Threat to get to the next level.

Suspects

  1. Chief Privacy Officer

Mentioned being anxious about leading a Security awareness training for Fortune 500 companies. Reads Doom and Gloom Headlines about the CyberWar. Clicks Accept on everything.

  1. Boss: Chad

Does 99% of the work in the office. Gets mad at employees who fall for submitting login credentials to recieve free Dell laptop. Budget got cut in half after Covid, just fired the entire Marketing department.

  1. Co-Worker: Trenton Buys all the alcohol for the company fridge. Unusual interest in classified information for the network password for the firewall. Changes password to “incorrect” so it will say ”Your password is incorrect”.

  2. CIA Agent: R2D2

Tan from Cuba vacation for an unreported work foreign contact. Bitcoin millionaire but works at SecureWork for insurance. Patched a security vulnerability with excessive interest in sensitive or classified information.

  1. Co-Worker: Escobar Complained about 2% raise at work and was unhappy with his last pay check. Decision maker who passes Security audits. Leaves his Dell laptop unlocked with cat pictures.

Office Room:

  • bathroom
  • office desk
  • boardroom/ conference room
  • watercooler
  • mobile phone -driving red car -home, not sharing workplace classifiedinfo
  • coffee shop connecting wifi

CyberSecurity Weapons Access control device Access control devices are the physical hardware that an access control system needs to enforce these rules. Examples include locks, card readers, biometric devices and controllers. X-10 Lock Combination lock for GSA Approved Security Containers and Vault Doors to Secure Rooms & Sensitive Compartmented Information Facilities (SCIFs) Motion detection sensor Optical, microwave, or acoustic sensor to detect motion in the workspace to detect intruders within a secure facility and trigger an alarm. Alarm control panel Central hub of a security set up to connect SecureWork devices. There are 4 basic types of panels: coded panels, conventional panels, addressable panels, and multiplex systems. Sound masking device Add sound through hidden speakers to create confidentiality or reduce noise distraction in government buildings or high-security facilities like OSHA, FGI, and ASTM. Emergency Exit bar SALTO XS4 PBF110 device is the emergency exit doors highest standard for security, with enhanced safety performance features certified according to ANSI A156.3. GSA Container Classified documents, components, materials, and small amounts of Risk Category II, III, and IV Arms, Ammunition, and Explosives (AA&E) or to secure funds, valuables, and weapons. 8.Movable USB sticks and CDs Storage device that can be removed from a computer whilst the system is running (virus or malware infection) Examples include: USB memory sticks. External hard drives.

How we built it

Open-Sourced on github:

  • HTML
  • CSS
  • JavaScript

Challenges we ran into

Trying to make an educational game is difficult because you need to balance to plethora of information with gamer experience.

Accomplishments that we're proud of

Investigate a simulated security breach in the workplace identifying the attack, vulnerabilities, costs and prevention recommendations. critical for success in the workplace. The content is highly interactive with a plotline inspired by Matrix, and Terminator and quizes and fill in the blank interactive learning.

What we learned

References include the following: CyberStart: Play fun hacking cyber security games, for free https://www.coursera.org/articles/red-team-vs-blue-team https://play.cyberstart.com/dashboard https://www.cdse.edu/Training/Security-Awareness-Games/ http://targetedattacks.trendmicro.com/cyoa/en/#

What's next for CyberQuest

  • Sounds need improvement (too loud)
  • change red car to tesla add a tesla charging station power grid gets hacked / car gets hacked
  • Come up with better character names Boss name == Chad
  • Roadmap / timeline of completing quest
  • Create a better gameplay video (tried to squish everything into 3 minutes)
  • Leadership Board
  • Toolbar for inventory of weapons, put the 4 levels in the top corner

Built With

Share this project:

Updates