Q4 Cyber Spy Game

6. Cyber Safety Protect Your Identity

Some new Cybersecurity Games have been found! Just a little more patience in September so we can get this shared below.




In this Quest you and classmates will design your own Cyber Security Game. Your goal is to have the most points, game-money, or awards.

Please be patient while this is created.

I Can Statements

  • understand risks to online security
  • know strategies to deal with difficult situations
  • be a good digital citizen, kind and caring
  • demonstrate empathy and thoughtful behaviors
  • ‚Äčknow how to be cyber-smart


Hacker: A hacker is a person who uses computers to gain unauthorized access to data.

Spyware: Spyware is software that secretly lets someone else get information from your computing device without permission.

Settings: Settings are an option that enables users to set document properties such as privacy, sharing, and access.

Security Patch: A security patch is an update, generally to the operating system, that adds new or improved security measures.

Virus: A virus is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Password recommendation: A password recommendation is eight characters in combinations of letters, numbers, and symbols.

Pop-up ad: A pop-up ad is an advertisement that appears on the screen while a web page loads or after it has loaded.

Personal information: Personal information is information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information.

Play the Vocabulary Game below to practice the Key Vocabulary

You can change the Quiz mode to Match, Test, Learn, Flash Cards, Spell using the selection list at the bottom right of the activity that says "Choose a Study Mode".


1. Start by taking the interactive Media Smarts "How cyber-savvy are you? " challenge. Click on the Start Cyber Security Quiz link that looks like this imagecybersecurityquizicon.

2. Together create or select a game-board.

3. Create your own token or character:

  • Create your character: digital (meme, avatar, superhero) or a real physical one (drawing, clay, objects you glue together, 3D printed). Make up a name for your character.

4. Coming shortly. - game cards with risks, tools, and scenarios.

This is a very animated and interactive game that is noisy, so we recommend you use headphones when playing it. The game does not require a login nor account.

It was developed in the United Kingdom by for students between the ages of 8-10.

Link to the Game

Screenshot of an Interactive Game called Band Runner for 8-10 year olds for Cyber safety steps.


Completing this Quest

Share your (our your group's) game design with classmates and your teacher. Explain some of the challenges and how you overcame them, and what you feel are important things you learned in the process about Cyber-safety.

Check off this Quest on the 21t4s roadmap 

Proceed to the next Quest – ID Theft Face-off Game

6.Q4 Student Checklist


6.Q4 Teacher Guide


MITECS Michigan Integrated Technology Competencies for Students, and

ISTE Standards for Students

2. Digital Citizen
b. Engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices
c. Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property