Q4 Cyber Spy Game

6. Cyber Safety Protect Your Identity


Try the 21thing4students Interactive Cyber Security Smarts
Challenge embedded above, or use this Direct link.


In this Quest you and classmates will design your own Cyber Security Game. Your goal is to have the most points, or game-tokens.

The quiz at the top of this page presents you with different scenarios, with hints when you select the small "i" icon Small letter i to indicate an information bubble, and correct information when you select "Check". You can retry any question and learn from a correct or incorrect answer choice. This is an example for you and your class as you plan to create your own Cyber Spy game version.

I Can Statements

  • understand risks to online security
  • know strategies to deal with difficult situations
  • be a good digital citizen, kind and caring
  • demonstrate empathy and thoughtful behaviors
  • ‚Äčknow how to be cyber-smart


Hacker: A hacker is a person who uses computers to gain unauthorized access to data.

Password recommendation: A password recommendation is eight characters in combinations of letters, numbers, and symbols.

Personal information: Personal information is information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information.

Pop-up ad: A pop-up ad is an advertisement that appears on the screen while a web page loads or after it has loaded.

Security Patch: A security patch is an update, generally to the operating system, that adds new or improved security measures.

Settings: This enables users to set document properties such as privacy, sharing, and access.

Spyware: Spyware is software that secretly lets someone else get information from your computing device without permission.

Virus: A virus is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

Play the interactive Quizlet Game: Direct Link



1. Start by taking the Quiz at the top of this page.

2. Play this interactive Media Smarts "How cyber-savvy are you? " challenge. Click on the Start Cyber Security Quiz link that looks like this imagecybersecurityquizicon.

3. Complete and add to each of these Slide Decks

  • Risks & Scenarios: View the Risks and then create your own scenarios on the slides provided. Feel free to add additional risks and scenarios.
     (Google slides, or PowerPoint)
  • Cyber Tools: Review and add to this Cyber Tools deck
     (Google slides, or PowerPoint)

4. Together, create your own Cyber Safety game in a small group or as a class project.

  • Decisions: Will this be printed out, use a spinner or die, create a board game on poster board, or use an online board such as Flippity, or a coding program using Scratch or Minecraft?
  • Create your characters: digital (meme, avatar, superhero) or a real physical one (drawing, clay, objects you glue together, 3D printed).
  • Make up names for your game and characters.
  • Decide on the player rules, points and name of your game.
  • Some resources your group may wish to consider (check with your teacher):

Credit note: Credit for these ideas goes to the Media Smarts (Canada's Center for Digital Media and Literacy) for their "Winning the Cyber Security Game" lesson and ideas that inspired this activity.

This is a very animated and interactive game that is noisy, so we recommend you use headphones when playing it. The game does not require a login nor account.

It was developed in the United Kingdom by for students between the ages of 8-10.

Link to the Game

Screenshot of an Interactive Game called Band Runner for 8-10 year olds for Cyber safety steps.


Completing this Quest

Share your (our your group's) game design with classmates and your teacher. Explain some of the challenges and how you overcame them, and what you feel are important things you learned in the process about Cyber-safety.

Check off this Quest on the 21t4s roadmap 

Proceed to the next Quest – ID Theft Face-off Game

MITECS Michigan Integrated Technology Competencies for Students, and

ISTE Standards for Students

2. Digital Citizen
a. Cultivate and manage their digital identity and reputation and are aware of the permanence of their actions in the digital world
b. Engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices
c. Demonstrate an understanding of and respect for the rights and obligations of using and sharing intellectual property
d. Manage their personal data to maintain digital privacy and security and are aware of data-collection technology used to track their navigation online