Safety Simulations

Practice responding to real-world digital safety scenarios

Email Phishing Scenario

You receive an urgent email claiming to be from your bank. Learn to identify phishing attempts and respond appropriately.

10-15 min Beginner Badge Available

Social Engineering Attack

Experience common social engineering tactics and practice protecting your personal information from manipulation.

15-20 min Intermediate Badge Available

Malware Defense

Navigate through scenarios involving suspicious downloads, pop-ups, and potentially infected files.

12-18 min Intermediate Badge Available

Privacy Settings Challenge

Practice configuring privacy settings across different platforms to protect your digital identity.

15-25 min Advanced Badge Available

Cyberbullying Response

Learn how to recognize, document, and respond to cyberbullying situations effectively and safely.

10-15 min Beginner Badge Available

Digital Footprint Audit

Evaluate and manage your online presence by conducting a comprehensive digital footprint assessment.

20-30 min Advanced Badge Available

Email Phishing Simulation

Scenario:

You just received this email in your inbox:

From: security@paypa1-verification.com

Subject: URGENT: Your Account Will Be Suspended


Dear Valued Customer,

We have detected unusual activity on your PayPal account. Your account will be suspended within 24 hours unless you verify your identity immediately.

Click here to verify your account now: https://paypa1-verify.com/secure

Failure to verify will result in permanent account closure and loss of funds.

Thank you,
PayPal Security Team

What should you do?

Learning Points:

  • Always verify sender email addresses carefully
  • Look for typos in domain names (paypa1 vs paypal)
  • Be suspicious of urgent or threatening language
  • Never click links in unexpected emails
  • Access accounts directly through official websites or apps
  • Report phishing attempts to the real company and your email provider

Social Engineering Attack Simulation

Scenario:

You receive a phone call from someone claiming to be from your IT department:

Caller: "Hello, this is John from IT Support. We've detected suspicious activity on your company account. We need to verify your credentials immediately to prevent a security breach. Can you provide me with your username and password so I can fix this issue right away? This is urgent - your account will be locked in 10 minutes if we don't resolve this."

What should you do?

Learning Points:

  • Never share passwords or credentials over the phone
  • Verify the identity of callers through official channels
  • Be wary of urgent, pressure-filled requests
  • Real IT departments never ask for your password
  • Attackers use fear and urgency to bypass critical thinking
  • Always report suspicious calls to your security team

Malware Defense Simulation

Scenario:

You're browsing the internet when suddenly a pop-up appears:

⚠️ WARNING! ⚠️

Your computer is infected with 5 viruses!

Your system will be damaged if you don't act now!

This message is from Windows Security Center

What should you do?

Learning Points:

  • Never click on suspicious pop-ups or warnings
  • Real security warnings come from your installed antivirus
  • Be skeptical of urgent, fear-inducing messages
  • Close suspicious pop-ups using keyboard shortcuts or taskbar
  • Keep your legitimate antivirus software updated
  • Only download software from official sources

Privacy Settings Challenge Simulation

Scenario:

You just created a new social media account. Before posting, you check the default privacy settings and find:

Current Settings:

  • ✅ Profile is public (anyone can see your posts)
  • ✅ Location sharing is enabled on all posts
  • ✅ Photos can be tagged by anyone
  • ✅ Search engines can find your profile
  • ✅ Your friend list is visible to everyone
  • ✅ Apps can access your data for marketing

What should you do with these settings?

Learning Points:

  • Always review default privacy settings on new accounts
  • Consider each setting's purpose and your comfort level
  • Disable location sharing unless specifically needed
  • Control who can tag you in photos and posts
  • Limit data sharing with third-party apps
  • Review and update privacy settings regularly
  • Different platforms require different privacy approaches

Cyberbullying Response Simulation

Scenario:

Your friend shows you their phone. Someone has been posting mean comments on all their social media posts for the past week:

Examples of comments:

  • "Nobody likes you. Why do you even post?"
  • "You look terrible in every photo"
  • "Everyone thinks you're fake"
  • "You should just delete your account"

Your friend seems upset and says they don't know what to do.

What's the best advice to give your friend?

Learning Points:

  • Document all instances of cyberbullying with screenshots
  • Block users who engage in harassment
  • Report cyberbullying using platform reporting tools
  • Always inform a trusted adult about cyberbullying
  • Don't respond or retaliate against bullies
  • Seek emotional support from friends, family, or counselors
  • Know that cyberbullying is serious and not the victim's fault

Digital Footprint Audit Simulation

Scenario:

You're applying for your first job and the employer mentions they do online background checks. You decide to search for yourself online and find:

What you discovered:

  • Old social media posts from 3 years ago with inappropriate jokes
  • Photos from parties tagged by friends showing risky behavior
  • Comments on controversial topics using strong language
  • Your full name, school, and age visible on multiple platforms
  • A YouTube channel with videos from when you were younger
  • Your email address and phone number on some public profiles

What should you do to manage your digital footprint?

Learning Points:

  • Regularly Google yourself to see what others can find
  • Delete or edit old posts that don't reflect your current values
  • Request removal from inappropriate photos posted by others
  • Keep personal and professional lives separate online
  • Build a positive digital footprint with professional content
  • Think before posting - everything online can be permanent
  • Review privacy settings on all platforms regularly
  • Consider your future self when posting today
Back to Learning Portal Try Quizzes