An interactive cybersecurity education tool designed for Year 12 IT students to investigate a realistic phishing attack and data breach scenario.
This simulator provides hands-on experience in:
- Identifying phishing attacks
- Investigating security incidents
- Understanding attack timelines
- Interviewing witnesses (via AI chatbots)
- Recommending security improvements
cd teknova-sim
python3 -m http.server 8080Navigate to: http://localhost:8080/briefing.html
Students start at the briefing page which introduces the scenario, then proceed to investigate by:
- Reading the press release
- Checking the FAQ
- Accessing internal documents
- Chatting with virtual employees
- Collecting evidence
teknova-sim/
βββ index.html # Company homepage
βββ press.html # Public press release
βββ services.html # Company services
βββ about.html # About the company
βββ faq.html # Customer FAQ (contains clues)
βββ staff-portal.html # Staff login (disabled, has hints)
βββ internal/ # Evidence pages
β βββ helpdesk-log.html # IT support timeline
β βββ phishing-email.html # The malicious email
β βββ invoices.html # Real vs fake comparison
β βββ access-log.html # Server logs
β βββ memo.html # Security officer's report
βββ assets/
β βββ css/style.css # Styling
β βββ js/
β βββ chatbot.js # Chat interface
β βββ personas.js # Character knowledge bases
βββ facilitator/
βββ student-worksheet.html # Investigation worksheet
βββ FACILITATOR_GUIDE.md # Teacher instructions & answers
Students can interview four different employees:
- Dave Wilson (IT Support) - Technical details about the attack
- Sarah Mitchell (Accounts) - The employee who clicked the phishing link
- Michael Torres (Security) - Investigation findings and recommendations
- James Patterson (CEO) - Business impact and management response
Company: TechNova Systems - IT services provider
Incident: A sophisticated phishing email led to:
- Credential theft
- 23 customer invoices stolen
- Fake invoices sent with altered bank details
- $8,750 confirmed stolen from customers
Timeline: November 15, 2024, 9:00 AM - 11:00 AM
Students must discover:
- Phishing email with domain typo (tecknova.com)
- Timeline of the attack (9:02 AM - 10:15 AM)
- Compromised data (23 invoice PDFs)
- Attack method (credential harvesting)
- Impact (financial and reputational)
- 45-60 minutes for full activity
- 30 minutes minimum
- Complete website simulation
- Student worksheet (auto-saves progress)
- Facilitator guide with answer key
- Assessment rubric
- Discussion prompts
- Recognize phishing indicators
- Understand social engineering
- Practice incident investigation
- Develop critical thinking
- Learn security best practices
The simulator includes built-in chatbot responses. For custom AI integration:
window.chatbotBackend = async function(persona, message, context) {
// Your AI API implementation
return responseString;
};See CHATBOT_INTEGRATION.md for detailed integration instructions.
- Start with the homepage - Look for service notices
- Read carefully - Details matter in investigations
- Talk to everyone - Each employee has unique information
- Check URLs - Phishing often uses similar-looking domains
- Follow the timeline - Events are connected
- Think like an attacker - How did they plan this?
- Modern web browser (Chrome, Firefox, Safari, Edge)
- Python 3.x or any web server
- No internet connection required (runs locally)
- Works on tablets and laptops
Students are evaluated on:
- Evidence collection (8 key pieces)
- Timeline accuracy
- Attack analysis
- Impact assessment
- Security recommendations
- Teamwork and collaboration
This simulator is for educational purposes only. Students learn to:
- Defend against attacks (not perform them)
- Recognize threats
- Protect organizations
- Think critically about security
- Target Audience: Year 12 (Grade 12) IT students
- Prior Knowledge: Basic computer literacy
- Cybersecurity Experience: None required
- Complexity: Introductory to intermediate
- Built-in responses will activate as fallback
- Check browser console for errors
- Ensure JavaScript is enabled
- Start with the FAQ page
- Look for links in the staff portal
- Chat with employees for hints
- Ensure web server is running
- Check file paths are correct
- Try a different browser
This simulator teaches critical cybersecurity concepts through experiential learning:
- Human Factor: Why people fall for phishing
- Technical Controls: MFA, email filtering, access controls
- Incident Response: How to investigate and respond
- Business Impact: Beyond just technical damage
- Prevention: Practical security improvements
For questions or improvements:
- Review the facilitator guide
- Check the chatbot integration docs
- Test with a small group first
- Adjust difficulty as needed
Remember: The goal is learning through discovery. Encourage students to explore, make mistakes, and think critically about cybersecurity challenges in the real world.