Puzzle List Across Living Security Products
This is a list of all of the puzzles across Living Security products. This will include our Teams: CyberEscape Online and Training Platforms. Some of the puzzles may be shared among the Teams and Training platform or have different versions of the same puzzle. Information about our standalone puzzles can be found at the bottom of the page.
We are going to start off with Living Security Teams: CyberEscape Online. Below is a list of the available storylines on the Teams platform as well as the puzzles within each storyline. Please note, some storylines on our Teams platform have condensed versions with less puzzles that can be found in the 'Shorter Versions' section below and is labeled by puzzle count.
Teams: CyberEscape Online
Full Version (45-60 Minute Gameplay)
Born Secure: Entrance Exam - 8 Puzzles
- Correct the Security Violations - Aims at looking for physical security red flags while in an Office setting
- Go Vish - Uses social engineering tactics to extract information from a victim
- Building Business Email Compromise - Teaches Business Email Compromise techniques and craft your own Phish
- The Weakest Link - Riskiness of security habits
- Emoji Passphrase - Teaches the difference between passwords and passphrases with the use of riddles and emojis
- Online Presence Protection - Teaches data classification techniques
- Attack Mapping - Learn about Cybersecurity threats happening in the real world to learn about the tactics used and better protect yourself from them
- Incident Response Management - Teaches how to handle rapid incident response scenarios
Born Secure: Webb of Lies - 5 Puzzles
- Secure Webb's Cabin - Search Jacob Webb's cabin and find security weaknesses
- Webb of Lies: Mobile Security - Determine which mobile security actions are secure or insecure
- Searching Hannah's Social Media - Scroll through Hannah's social media to find red flags that may have led The Group to find Jacob
- Webb of Lies: Physical Security - Test your knowledge in completing sentences about physical security
- Debrief - Open ended questions about the entire experience
Critical Mass - 8 Puzzles
- Arrest Warrant - Takes a look at insider threats through police report evidence
- Olivia's Phishy Emails - This puzzle has participants create a Phish email to learn about Business Email Compromise techniques
- Data Classification at Gizmo - Designated to help classify items whether public or confidential
- Avoiding Accidental Insider Threats - Review 10 Security Awareness Policy Fundamentals
- Investigate Olivia's Apartment - Aims at looking for physical security violations while working from home
- Cracking the Code - Teaches the importance of a clean desk policy.
- Olivia's Vishing Calls - Covers social engineering techniques that were used to Vish the targeted information
- Camera Feed - Teaches the risk of not changing default credentials on a (IoT) device
Cybersecurity Tonight - 7 Puzzles
- Rings of Privacy - Rank personal data from most to least private
- Password Management Mastery - Complete the sentences on good password management practices
- Panicking Pal: Ransomware - Choose the best advice for a friend that has fallen victim to a ransomware scheme
- Phishing from a Cybercriminal's Perspective - Take on the role of a cybercriminal and craft the strongest phish
- Most Secure Mobile Device - Determine who is the most secure individual out of a lineup by asking them questions about their cyber hygiene
- Secure the Office - Search around a office space to flag security issues
- Debrief - Open ended questions about the entire experience
Cyber Race - 5 Puzzles
- Exploring Biometric Data - Determine which types of biometric data can be collected
- Hot & Cold: Your Crypto Wallet - Test your knowledge of hot and cold wallet defining characteristics
- Deepening Your Deepfake Knowledge - Complete the sentences about deepfakes
- Whose the Crypto Master? - Select which crypto buyer knows the most about crypto
- Getting Meta: What's the Metaverse? - Complete sentences about the Metaverse
Secure My Life Now! - 8 Puzzles
- Johan's Ransomware Message - Learning ransomware elements
- How'd the Ransomware Spread? - Riskiness of security habits
- News Feed, Profile Page and Private Message Red Flags - Red Flags of Ransomware
- Consult an Expert: Ransomware - Ransomware solution options
- To Pay or Not to Pay - Ransomware solution decision tree
- Bitcoin & Botnets - Unscramble facts
- Work Device vs Personal Device - Personal vs work computer
- Debrief - Answer Fill In
Shorter Versions (20-30 Minute Gameplay):
Born Secure Entrance Exam - 5 Puzzles
- Correct the Security Violations - Aims at looking for physical security red flags while in an Office setting
- Building Business Email Compromise - Teaches Business Email Compromise techniques and craft your own Phish
- The Weakest Link - Riskiness of security habits
- Online Presence Protection - Teaches data classification techniques
- Incident Response Management - Teaches how to handle rapid incident response scenarios
Born Secure Entrance Exam - 4 Puzzles
- Correct the Security Violations - Aims at looking for physical security red flags while in an Office setting
- Go Vish - Uses social engineering tactics to extract information from a victim
- Building Business Email Compromise - Teaches Business Email Compromise techniques and craft your own Phish
- Online Presence Protection - Teaches data classification techniques
Born Secure Entrance Exam - 3 Puzzles
- Correct the Security Violations - Aims at looking for physical security red flags while in an Office setting
- Building Business Email Compromise - Teaches Business Email Compromise techniques and craft your own Phish
- Online Presence Protection - Teaches data classification techniques
Born Secure: Webb of Lies - 3 Puzzles
- Secure Webb's Cabin - Search Jacob Webb's cabin and find security weaknesses
- Webb of Lies: Mobile Security - Determine which mobile security actions are secure or insecure
- Webb of Lies: Physical Security - Test your knowledge in completing sentences about physical security
Cybersecurity Tonight - 1 Puzzle
- Password Management Mastery - Complete the sentences on good password management practices
Secure My Life Now! - 5 Puzzles
- Johan's Ransomware Message - Learning ransomware elements
- News Feed, Profile Page and Private Message Red Flags - Red Flags of Ransomware
- Consult an Expert: Ransomware - Ransomware solution options
- Bitcoin & Botnets - Unscramble facts
- Debrief - Answer Fill In
Healthcare: Cyber Checkup (Hospital and Clinical versions available)- 4 Puzzles
- Physical Security in the Hospital OR Clinic (Depending on Experience) - Aims at looking for physical security red flags while in a healthcare setting
- Phishing for PHI - This puzzle has participants create a Phish email to learn about Business Email Compromise techniques
- Password Protecting PHI - Teaches strong password techniques
- What's Protected by HIPAA? - Teaches data classification associated with HIPAA and PHI
Healthcare: Cyber Checkup (Hospital and Clinical versions available) - 2 Puzzles
- Physical Security in the Hospital OR Clinic (Depending on Experience) - Aims at looking for physical security red flags while in a healthcare setting
- Phishing for PHI - This puzzle has participants create a Phish email to learn about Business Email Compromise techniques
The following are puzzles associated with the Series available on our Training Platform.
Training Platform:
True Eye
Episode 1 - In-Office Policy Violations - Physical Security violations
Episode 2 - Public or Private? - Teaches data classification techniques
Episode 3 - Calling Co-Worker Together - Social Engineering techniques used in Vishing
Episode 4 - Jennifer's Hidden Message - Deciphering messages from a bank of words
Phishing IRL
Episode 1 - Catching the Big Phish - Teaches how to spot Phishing emails by comparing two emails side by side
Episode 2 - Spoil The Vish: Data Dojo - Teaches social engineering techniques
Episode 3 - Phishing Red Flags - Analyze suspicious emails and identify red flags
Born Secure: Training Grounds
Episode 1 - Crafting Convincing Phish -Teaches Business Email Compromise techniques and craft your own Phish
Episode 2 - 7 Violations - Teaches Physical Security concepts
Episode 3 - Cyber Criminal Mapping - Learn about Cybersecurity threats happening in the real world to learn about the tactics used and better protect yourself from them
Episode 4 - The Biggest Target - Teaches data classification techniques
Born Secure: Webb of Lies - 5 Puzzles
Episode 1 - Secure Webb's Cabin - Search Jacob Webb's cabin and find security weaknesses
Episode 2 - Webb of Lies: Mobile Security - Determine which mobile security actions are secure or insecure
Episode 3 - Searching Hannah's Social Media - Scroll through Hannah's social media to find red flags that may have led The Group to find Jacob
Episode 4 - Webb of Lies: Physical Security - Test your knowledge in completing sentences about physical security
Standalone Puzzles:
Please view our Content Catalog which provides a comprehensive list of all content pieces available, along with our standalone puzzle offerings.
For any additional questions, please feel free to reach us at help@livingsecurity.com.