{"id":2303,"date":"2025-10-22T17:18:47","date_gmt":"2025-10-22T16:18:47","guid":{"rendered":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/?page_id=2303"},"modified":"2025-10-22T17:33:55","modified_gmt":"2025-10-22T16:33:55","slug":"games","status":"publish","type":"page","link":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/en\/games\/","title":{"rendered":"Jogos-Eng"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2303\" class=\"elementor elementor-2303\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26327d9 e-flex e-con-boxed e-con e-parent\" data-id=\"26327d9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bcf1997 e-con-full e-flex e-con e-child\" data-id=\"bcf1997\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ce5bcc elementor-widget elementor-widget-heading\" data-id=\"3ce5bcc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Games<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9976a23 elementor-widget elementor-widget-text-editor\" data-id=\"9976a23\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>This section gathers educational and interactive games that raise awareness about phishing and other cyber threats, offering a practical, engaging, and safe way to learn.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6ede60 e-flex e-con-boxed e-con e-parent\" data-id=\"b6ede60\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-41cdc4f e-con-full e-flex e-con e-child\" data-id=\"41cdc4f\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4259efb e-con-full e-flex e-con e-child\" data-id=\"4259efb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81237b1 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"81237b1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sir Firewall <br>(A Serious Game to Improve Phishing Awareness)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f527e49 elementor-widget elementor-widget-image\" data-id=\"f527e49\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/Logo-final.png\" title=\"Logo-final\" alt=\"Logo-final\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fc5902 elementor-widget elementor-widget-text-editor\" data-id=\"1fc5902\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Sir Firewall is an interactive phishing awareness game designed to teach players how to recognize and respond to phishing threats in a practical and engaging way. Set in a medieval-themed storyline, the player takes the role of a knight defending a castle, where each challenge represents a real-world phishing tactic disguised as part of the narrative. The game uses progressive difficulty levels, time pressure and instant feedback to reinforce learning while keeping the experience immersive and enjoyable.<\/p><p>Through hands-on decision-making, players learn to identify suspicious email elements, classify phishing attempts and take safe action under pressure. Sir Firewall was developed as part of an academic study and has been shown to increase both user motivation and confidence in detecting phishing attacks. It is ideal for organisations, schools and cybersecurity training programs looking for a more engaging alternative to traditional awareness training.<\/p><p><a href=\"https:\/\/sirfirewall.herokuapp.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/sirfirewall.herokuapp.com\/<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa280b1 e-con-full e-flex e-con e-child\" data-id=\"fa280b1\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-24e2eec e-grid e-con-full e-con e-child\" data-id=\"24e2eec\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c18f2e elementor-widget elementor-widget-image\" data-id=\"9c18f2e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sirfirewall.herokuapp.com\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"436\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1024x558.jpg\" class=\"attachment-large size-large wp-image-2213\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1024x558.jpg 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-300x164.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-768x419.jpg 768w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1536x838.jpg 1536w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1.jpg 1900w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ffd6d3 elementor-widget elementor-widget-image\" data-id=\"0ffd6d3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sirfirewall.herokuapp.com\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"746\" height=\"407\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/6.jpg\" class=\"attachment-large size-large wp-image-2230\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/6.jpg 746w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/6-300x164.jpg 300w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c329da e-flex e-con-boxed e-con e-parent\" data-id=\"1c329da\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ebf69d0 e-con-full e-flex e-con e-child\" data-id=\"ebf69d0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-decb5e7 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"decb5e7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Google\u2019s Jigsaw Phishing Quiz <br>(Evaluation of Contextual and Game Based Training for Phishing Detection)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6467b45 elementor-widget elementor-widget-text-editor\" data-id=\"6467b45\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Google\u2019s Jigsaw Phishing Quiz is a simple but effective game designed to teach users how to recognize phishing emails in realistic situations. Instead of using heavy theory or long training modules, the quiz presents players with real-looking emails and challenges them to decide whether each one is legitimate or a phishing attempt. After every choice, players receive instant feedback explaining the clues they may have missed, such as suspicious links, sender address manipulation or urgent language tricks, helping them improve as they play.<\/p><p>The game only takes a few minutes to complete and is ideal for quick awareness boosts in schools, companies or personal cybersecurity training. Its realistic scenarios and short learning cycles make it a practical tool for helping people build safe email habits without the need for technical knowledge.<\/p><p><a href=\"https:\/\/phishingquiz.withgoogle.com\" target=\"_blank\" rel=\"noopener\">https:\/\/phishingquiz.withgoogle.com<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7b14c6 elementor-widget elementor-widget-image\" data-id=\"b7b14c6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/phishingquiz.withgoogle.com\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"619\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/2-1024x792.jpg\" class=\"attachment-large size-large wp-image-2258\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/2-1024x792.jpg 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/2-300x232.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/2-768x594.jpg 768w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/2.jpg 1300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d6a6b9 e-con-full e-flex e-con e-child\" data-id=\"3d6a6b9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d5da87 elementor-widget elementor-widget-image\" data-id=\"9d5da87\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/phishingquiz.withgoogle.com\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"609\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1-1024x780.jpg\" class=\"attachment-large size-large wp-image-2256\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1-1024x780.jpg 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1-300x228.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1-768x585.jpg 768w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-1.jpg 1334w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebf46c3 elementor-widget elementor-widget-image\" data-id=\"ebf46c3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/phishingquiz.withgoogle.com\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"722\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/4-1024x924.jpg\" class=\"attachment-large size-large wp-image-2283\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/4-1024x924.jpg 1024w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/4-300x271.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/4-768x693.jpg 768w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/4.jpg 1080w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69089c0 e-flex e-con-boxed e-con e-parent\" data-id=\"69089c0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-abc7a2b e-con-full e-flex e-con e-child\" data-id=\"abc7a2b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b2b85ce e-con-full e-flex e-con e-child\" data-id=\"b2b85ce\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f833ca elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f833ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phish Invader <br>(The Development and Evaluation of an Anti-Phishing E-Learning Intervention for Nurses)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2baf83c elementor-widget elementor-widget-text-editor\" data-id=\"2baf83c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Phish Invader is a simple and engaging game designed to teach users how to recognize and avoid phishing threats. Developed as part of an e-learning program, the game transforms cybersecurity awareness into an interactive experience where players must identify suspicious elements and avoid phishing traps while progressing through each level. It combines visual learning with fast decision-making to keep users active and focused.<\/p><p>The game is part of a larger training module that includes short lessons, quizzes and videos, making it ideal for self-paced learning. It offers a practical introduction to phishing awareness for people with little or no cybersecurity background.<\/p><p><a href=\"https:\/\/www.construct.net\/en\/free-online-games\/phish-invader-39134\/play\" target=\"_blank\" rel=\"noopener\">https:\/\/www.construct.net\/en\/free-online-games\/phish-invader-39134\/play<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9a83826 e-con-full e-flex e-con e-child\" data-id=\"9a83826\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-368c230 e-grid e-con-full e-con e-child\" data-id=\"368c230\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-061563c elementor-widget elementor-widget-image\" data-id=\"061563c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.construct.net\/en\/free-online-games\/phish-invader-39134\/play\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"445\" src=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-2.jpg\" class=\"attachment-large size-large wp-image-2268\" alt=\"\" srcset=\"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-2.jpg 959w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-2-300x167.jpg 300w, https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-content\/uploads\/2025\/10\/1-2-768x427.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Games This section gathers educational and interactive games that raise awareness about phishing and other cyber threats, offering a practical, engaging, and safe way to learn. Sir Firewall (A Serious Game to Improve Phishing Awareness) Sir Firewall is an interactive phishing awareness game designed to teach players how to recognize and respond to phishing threats [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2303","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/2303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/comments?post=2303"}],"version-history":[{"count":28,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/2303\/revisions"}],"predecessor-version":[{"id":2334,"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/pages\/2303\/revisions\/2334"}],"wp:attachment":[{"href":"https:\/\/www.gecad.isep.ipp.pt\/pc2phish\/wp-json\/wp\/v2\/media?parent=2303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}