Security awareness game (spot the threat)
Why Choose This Project?
Human error is the #1 cause of cybersecurity breaches (e.g., clicking phishing links, downloading malware). Traditional training is boring and ineffective. A gamified security awareness tool makes learning fun while improving the ability to detect real threats. This project engages users through an interactive "Spot the Threat" game that simulates real-world attack scenarios.
What You Get in This Project
-
A web-based interactive game to train employees/students in spotting security risks.
-
Multiple game levels (emails, websites, passwords, social engineering).
-
Scoring system with a leaderboard to encourage participation.
-
Admin dashboard for monitoring training progress and top performers.
Technology Stack
| Layer | Technology |
|---|---|
| Frontend | HTML, CSS, JavaScript, Bootstrap, React/Angular (optional for interactivity) |
| Backend | Node.js (Express) / Spring Boot / Django |
| Database | MySQL / PostgreSQL / MongoDB |
| Game Logic | JavaScript (drag-drop, click-to-spot, multiple choice) |
| Visualization | Chart.js for user performance tracking |
| Authentication | JWT / Spring Security (optional) |
Key Features
| Feature | Description |
|---|---|
| Phishing Email Challenge | Show users emails with links/attachments → they must identify malicious ones. |
| Website Spoofing Game | Present real vs. fake websites → users spot which is safe/dangerous. |
| Password Strength Test | Users create passwords, game scores them based on security. |
| Social Engineering Scenarios | Chat-based or message-based threats (e.g., fake IT request) → player chooses response. |
| Scoring & Leaderboard | Points awarded for correct spotting, leaderboard encourages competition. |
| Hints & Explanations | After each round, system explains why it was safe/dangerous. |
| Admin Dashboard | Track overall performance, weak areas, and progress reports. |
Working Flow
User Flow
-
User logs into the game portal.
-
Chooses a game mode (Phishing, Website, Password, Social Engineering).
-
Plays interactive challenges (spotting threats by clicking or choosing).
-
Earns points for correct answers, loses points for mistakes.
-
Sees explanations to learn from errors.
-
Score gets added to global leaderboard.
Admin Flow
-
Admin logs in.
-
Monitors leaderboard, average scores, and weakest categories.
-
Uses data to plan future cybersecurity training.
Security Features
-
User Authentication → Optional login to track scores.
-
Secure Input Handling → Prevents XSS/CSRF attacks inside game.
-
Role-Based Access → Separate user/admin dashboards.
-
Leaderboard Security → Prevents tampering with scores.
-
HTTPS Encryption → Ensures safe communication.