The G.A.M.E: Governance Assessment Mitigation Enforcement

The G.A.M.E.: Cybersecurity Game of Survival

You awaken to find yourself in an empty room with only a ceiling light and a computer kiosk embedded into the wall. Upon looking at the screen, you see 5 of your friends and family have been taken and held hostage in separate similar rooms. A simple cybersecurity question is on the screen, answer it correctly and they live, answer incorrectly, and someone might die. How many will make it out alive?

Get a hint

Before applying a software update to production systems, it is most important that:

The patching is documented
The systems are backed up
Full information about the threat that the patch addresses is available
An independent third-party attests the validity of the patch

30 seconds remaining

Prisoner 1   Prisoner 2   Prisoner 2   Prisoner 4   Prisoner 5