What your child will learn
Identify pretext attacks: fake IT help desk calls, authority impersonation, and urgency pressure
Recognize social engineering in physical environments including tailgating and inside-access cons
Apply the verify-before-you-trust principle to unexpected requests from strangers claiming authority
Understand how attackers layer multiple techniques in a single "boss battle" multi-vector con
Respond correctly: hang up, report to a trusted adult, block physical access, and verify through a known channel
How this mission works
A 5-scene interactive lab covering the social engineering attacks kids and teens face in school, on the phone, and in public. Scene 1: A fake IT help desk caller claims your school account is locked and needs your password — right now. Scene 2: A substitute teacher in the hallway knows your schedule, your teacher's name, and your locker number — but something is off. Scene 3: A lost delivery driver needs someone to hold the door open so he can bring in heavy boxes. Scene 4: "Your parent called the office" — a stranger claims to have permission to check you out of school. Scene 5: Boss Battle — a sophisticated multi-vector con artist uses authority, urgency, and insider knowledge all at once. Identify all four social engineering techniques to complete the mission.
What students actually encounter
"Hi, this is IT. Your school account is showing a security alert. I need your password right now or it gets locked permanently in 5 minutes."
A substitute greets you by name, mentions your teacher, and knows your locker — but you've never seen them before.
A delivery driver at the school entrance says the boxes are too heavy to carry alone and asks you to hold the door.
Cipher is with them the whole way
When a student gets stuck on Social Engineering Sentinel, Cipher appears with a mission-specific nudge — no spoilers, just a hint toward the right thinking. Make a wrong choice, and Cipher explains the real-world consequence. Finish the mission, and Cipher generates a personalized performance debrief based on exactly how the student played it.
ISTE alignment
Students engage in positive, safe, legal, and ethical behaviors in digital and physical environments; demonstrate an understanding of rights and obligations when interacting with authority figures online and in person; and manage their personal data against social engineering attacks that exploit trust and urgency.