Fulfills Step 5 of GSUSA Senior Cybersecurity Investigator badge requirements.
Items Needed
- 64 Squares from VTK Minesweeper by GSUSA (printed and cut out).
- Map Diagram from VTK Minesweeper by GSUSA for reference.
- (Optional) Painter’s tape, chalk, or floor tiles to create an 8×8 grid
Before the Meeting
- Set Up the Grid:
- Option 1: Use painter’s tape to mark an 8×8 grid on the floor.
- Option 2: Use existing floor tiles to define grid squares.
- Option 3: Use sidewalk chalk if meeting outdoors.
- Option 4: Simply place the cards in an 8×8 formation on the floor.
- Arrange the Cards:
- Place the START card face-up at one edge of the grid.
- Use the Map Diagram to lay out a safe path using SAFE cards, face down. You don’t need to use all the SAFE cards, and the path can include horizontal, vertical, or diagonal connections.
- Fill the remaining spaces on the grid with other Minesweeper cards (e.g., landmine and defense cards).
Instructions
- Scouts represent employees of a company and must guide their team safely across the minefield, avoiding cybersecurity threats.
- Divide scouts into teams of around 6. If there’s a large group, either create two minefields or have teams take turns.
- Line up on the edge of the minefield where the START card is located.
- The first scout steps onto the START card and moves one square in any direction (forward, backward, sideways, or diagonal).
- Pick up the card from the new square to reveal its type:
- SAFE Card: Place it face-up in the square, step in, and continue.
- Landmine: Read it aloud to the team, put it back face-down, and return to the line. The next scout then enters the grid.
- Defense Card: Hold onto the card to defuse one future landmine. At the end of the turn, put it back face-up in the same square so others can pass safely. Defense cards cannot be reused.
- Continue the game until the entire team makes it safely across the minefield.
(Optional) Group Discussion:
- What challenges did you face during the game?
- What strategies worked best to navigate safely?
- How could your team prevent stepping on the same landmine repeatedly?
- What kinds of threats or attacks were surprising to you?
- Why do you think people sometimes ignore cybersecurity advice, such as avoiding suspicious links?
Key Takeaways:
- Even after solving a cybercrime, organizations need to protect against future attacks.
- Insider threats, like employees accidentally or intentionally exposing sensitive data, pose significant risks to companies.
- Good cybersecurity practices—strong passwords, data backups, and reporting suspicious emails—can protect entire organizations.