{"id":2180,"date":"2025-10-22T14:32:08","date_gmt":"2025-10-22T13:32:08","guid":{"rendered":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/?page_id=2180"},"modified":"2026-01-12T14:31:06","modified_gmt":"2026-01-12T14:31:06","slug":"jogos-pt","status":"publish","type":"page","link":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/jogos-pt\/","title":{"rendered":"Jogos-PT"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2180\" class=\"elementor elementor-2180\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26327d9 e-flex e-con-boxed e-con e-parent\" data-id=\"26327d9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bcf1997 e-con-full e-flex e-con e-child\" data-id=\"bcf1997\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ce5bcc elementor-widget elementor-widget-heading\" data-id=\"3ce5bcc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jogos<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9976a23 elementor-widget elementor-widget-text-editor\" data-id=\"9976a23\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Nesta sec\u00e7\u00e3o reunimos jogos educativos e interativos que promovem a consciencializa\u00e7\u00e3o sobre o phishing e outras amea\u00e7as cibern\u00e9ticas, permitindo aprender de forma pr\u00e1tica, envolvente e segura.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6ede60 e-flex e-con-boxed e-con e-parent\" data-id=\"b6ede60\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-41cdc4f e-con-full e-flex e-con e-child\" data-id=\"41cdc4f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4259efb e-con-full e-flex e-con e-child\" data-id=\"4259efb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81237b1 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"81237b1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sir Firewall <br>(A Serious Game to Improve Phishing Awareness)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f527e49 elementor-widget elementor-widget-image\" data-id=\"f527e49\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Logo-final.png\" title=\"Logo-final\" alt=\"Logo-final\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fc5902 elementor-widget elementor-widget-text-editor\" data-id=\"1fc5902\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Sir Firewall \u00e9 um jogo interativo de consciencializa\u00e7\u00e3o sobre phishing, concebido para ensinar os jogadores a reconhecer e responder a amea\u00e7as de phishing de forma pr\u00e1tica e envolvente. Situado num enredo de tema medieval, o jogador assume o papel de um cavaleiro que defende um castelo, onde cada desafio representa uma t\u00e1tica de phishing do mundo real disfar\u00e7ada como parte da narrativa.<\/p><p>O jogo utiliza n\u00edveis de dificuldade progressivos, press\u00e3o temporal e feedback imediato para refor\u00e7ar a aprendizagem, mantendo a experi\u00eancia imersiva e divertida.<\/p><p>Atrav\u00e9s da tomada de decis\u00f5es pr\u00e1ticas, os jogadores aprendem a identificar elementos suspeitos em e-mails, classificar tentativas de phishing e agir de forma segura sob press\u00e3o. O Sir Firewall foi desenvolvido no \u00e2mbito de um estudo acad\u00e9mico e demonstrou aumentar tanto a motiva\u00e7\u00e3o dos utilizadores como a sua confian\u00e7a na dete\u00e7\u00e3o de ataques de phishing. \u00c9 ideal para organiza\u00e7\u00f5es, escolas e programas de forma\u00e7\u00e3o em ciberseguran\u00e7a que procurem uma alternativa mais envolvente ao treino tradicional de consciencializa\u00e7\u00e3o.<\/p><p><a href=\"https:\/\/sirfirewall.herokuapp.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/sirfirewall.herokuapp.com\/<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa280b1 e-con-full e-flex e-con e-child\" data-id=\"fa280b1\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-24e2eec e-grid e-con-full e-con e-child\" data-id=\"24e2eec\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c18f2e elementor-widget elementor-widget-image\" data-id=\"9c18f2e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sirfirewall.herokuapp.com\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"436\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1024x558.jpg\" class=\"attachment-large size-large wp-image-2213\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1024x558.jpg 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-300x164.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-768x419.jpg 768w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1536x838.jpg 1536w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1.jpg 1900w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ffd6d3 elementor-widget elementor-widget-image\" data-id=\"0ffd6d3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sirfirewall.herokuapp.com\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"746\" height=\"407\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/6.jpg\" class=\"attachment-large size-large wp-image-2230\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/6.jpg 746w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/6-300x164.jpg 300w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c329da e-flex e-con-boxed e-con e-parent\" data-id=\"1c329da\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ebf69d0 e-con-full e-flex e-con e-child\" data-id=\"ebf69d0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-decb5e7 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"decb5e7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Google\u2019s Jigsaw Phishing Quiz <br>(Evaluation of Contextual and Game Based Training for Phishing Detection)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6467b45 elementor-widget elementor-widget-text-editor\" data-id=\"6467b45\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Jigsaw Phishing Quiz da Google \u00e9 um jogo simples, mas eficaz, concebido para ensinar os utilizadores a reconhecer e-mails de phishing em situa\u00e7\u00f5es realistas. Em vez de recorrer a teoria extensa ou m\u00f3dulos longos de forma\u00e7\u00e3o, o question\u00e1rio apresenta aos jogadores e-mails com apar\u00eancia real e desafia-os a decidir se cada um \u00e9 leg\u00edtimo ou uma tentativa de phishing.<\/p><p>Ap\u00f3s cada escolha, os jogadores recebem feedback imediato, explicando as pistas que podem ter escapado \u00e0 sua aten\u00e7\u00e3o \u2014 como liga\u00e7\u00f5es suspeitas, manipula\u00e7\u00e3o do endere\u00e7o do remetente ou linguagem urgente \u2014 ajudando-os a melhorar \u00e0 medida que jogam.<\/p><p>O jogo demora apenas alguns minutos a completar e \u00e9 ideal para um refor\u00e7o r\u00e1pido de consciencializa\u00e7\u00e3o em escolas, empresas ou forma\u00e7\u00f5es pessoais de ciberseguran\u00e7a. Os seus cen\u00e1rios realistas e ciclos curtos de aprendizagem tornam-no uma ferramenta pr\u00e1tica para ajudar as pessoas a desenvolver h\u00e1bitos seguros no uso do e-mail, sem necessidade de conhecimentos t\u00e9cnicos.<\/p><p><a href=\"https:\/\/phishingquiz.withgoogle.com\" target=\"_blank\" rel=\"noopener\">https:\/\/phishingquiz.withgoogle.com<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7b14c6 elementor-widget elementor-widget-image\" data-id=\"b7b14c6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/phishingquiz.withgoogle.com\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"619\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/2-1024x792.jpg\" class=\"attachment-large size-large wp-image-2258\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/2-1024x792.jpg 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/2-300x232.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/2-768x594.jpg 768w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/2.jpg 1300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d6a6b9 e-con-full e-flex e-con e-child\" data-id=\"3d6a6b9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d5da87 elementor-widget elementor-widget-image\" data-id=\"9d5da87\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/phishingquiz.withgoogle.com\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"609\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1-1024x780.jpg\" class=\"attachment-large size-large wp-image-2256\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1-1024x780.jpg 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1-300x228.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1-768x585.jpg 768w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1.jpg 1334w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebf46c3 elementor-widget elementor-widget-image\" data-id=\"ebf46c3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/phishingquiz.withgoogle.com\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"722\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/4-1024x924.jpg\" class=\"attachment-large size-large wp-image-2283\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/4-1024x924.jpg 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/4-300x271.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/4-768x693.jpg 768w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/4.jpg 1080w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69089c0 e-flex e-con-boxed e-con e-parent\" data-id=\"69089c0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-abc7a2b e-con-full e-flex e-con e-child\" data-id=\"abc7a2b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b2b85ce e-con-full e-flex e-con e-child\" data-id=\"b2b85ce\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f833ca elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f833ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phish Invader <br>(The Development and Evaluation of an Anti-Phishing E-Learning Intervention for Nurses)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2baf83c elementor-widget elementor-widget-text-editor\" data-id=\"2baf83c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Phish Invader \u00e9 um jogo simples e envolvente concebido para ensinar os utilizadores a reconhecer e evitar amea\u00e7as de phishing. Desenvolvido como parte de um programa de e-learning, o jogo transforma a consciencializa\u00e7\u00e3o em ciberseguran\u00e7a numa experi\u00eancia interativa, onde os jogadores devem identificar elementos suspeitos e evitar armadilhas de phishing \u00e0 medida que progridem por cada n\u00edvel. Combina aprendizagem visual com decis\u00f5es r\u00e1pidas, mantendo os utilizadores ativos e concentrados.<\/p><p>O jogo faz parte de um m\u00f3dulo de forma\u00e7\u00e3o mais abrangente que inclui li\u00e7\u00f5es curtas, question\u00e1rios e v\u00eddeos, tornando-o ideal para aprendizagem ao ritmo do utilizador. Constitui uma introdu\u00e7\u00e3o pr\u00e1tica \u00e0 consciencializa\u00e7\u00e3o sobre phishing, destinada a pessoas com pouca ou nenhuma experi\u00eancia em ciberseguran\u00e7a.<\/p><p><a href=\"https:\/\/www.construct.net\/en\/free-online-games\/phish-invader-39134\/play\" target=\"_blank\" rel=\"noopener\">https:\/\/www.construct.net\/en\/free-online-games\/phish-invader-39134\/play<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9a83826 e-con-full e-flex e-con e-child\" data-id=\"9a83826\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-368c230 e-grid e-con-full e-con e-child\" data-id=\"368c230\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-061563c elementor-widget elementor-widget-image\" data-id=\"061563c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/phishingquiz.withgoogle.com\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"445\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-2.jpg\" class=\"attachment-large size-large wp-image-2268\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-2.jpg 959w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-2-300x167.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-2-768x427.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Jogos Nesta sec\u00e7\u00e3o reunimos jogos educativos e interativos que promovem a consciencializa\u00e7\u00e3o sobre o phishing e outras amea\u00e7as cibern\u00e9ticas, permitindo aprender de forma pr\u00e1tica, envolvente e segura. Sir Firewall (A Serious Game to Improve Phishing Awareness) Sir Firewall \u00e9 um jogo interativo de consciencializa\u00e7\u00e3o sobre phishing, concebido para ensinar os jogadores a reconhecer e responder [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2180","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/2180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/comments?post=2180"}],"version-history":[{"count":95,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/2180\/revisions"}],"predecessor-version":[{"id":2402,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/2180\/revisions\/2402"}],"wp:attachment":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/media?parent=2180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}