0% found this document useful (0 votes)
55 views3 pages

Cyber Stage Act

The Cyber Stage act follows Emily as she navigates various scenarios that highlight the dangers of online security, including phishing scams, identity theft, and social media mishaps. Each scene illustrates the consequences of careless online behavior, culminating in Emily learning valuable lessons about protecting her privacy and data. The act concludes with Emily sharing her experiences with colleagues to raise awareness about cybersecurity.

Uploaded by

Neha Makhija
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views3 pages

Cyber Stage Act

The Cyber Stage act follows Emily as she navigates various scenarios that highlight the dangers of online security, including phishing scams, identity theft, and social media mishaps. Each scene illustrates the consequences of careless online behavior, culminating in Emily learning valuable lessons about protecting her privacy and data. The act concludes with Emily sharing her experiences with colleagues to raise awareness about cybersecurity.

Uploaded by

Neha Makhija
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Cyber Stage act

Scene 1: The Cookie Trap


Setting: An open-plan office with four desks, computers, and various office supplies. A soft yellow light fills the room,
indicating a calm, productive atmosphere.

Lights: Warm, steady lighting.

Action:

Colleague 1 (Sam): Typing furiously on the computer.


Colleague 2 (Lisa): Reviewing documents.
Colleague 3 (John): On a phone call.
Colleague 4 (Emily): Working on a presentation.
Colleague 5 (Megan): Enters excitedly with a box of cookies.
Dialogues and Expressions:

Megan (excitedly): "Hey everyone! I brought cookies!"


Sam (shaking head): "No, thanks."
Lisa (waving hand): "I'm on a diet."
John (holding phone away): "Maybe later."
Emily (smiling, accepting a cookie): "Sure, I'll have one."
Light Change: A red spotlight focuses on Emily as she eats the cookie, indicating danger.

Scene 2: The Costly Post


Setting: A cozy living room with a family preparing for an outing. A camera is set up for a family photo.

Lights: Soft, warm lighting.

Action:

Emily: Taking a selfie with her family and posting it on social media.
Thieves: Lurking in the shadows outside the window.
Dialogues and Expressions:

Emily (to family): "Say cheese!"


Emily (posting online): "Family outing! #FunTimes"
Light Change: Red light washes over the living room as the thieves start breaking in.

Scene 3: The Unwanted Email


Setting: The same office, but with a tense atmosphere. The boss’s office in the background.

Lights: Harsh white light with a red spotlight on Emily.

Action:

Emily: Looking confused and scared.


Boss: Yelling, holding a printed email.
Dialogues and Expressions:

Boss (angrily): "How dare you send this email!"


Emily (bewildered): "I didn't send anything!"
Scene 4: The Phishing Scam
Setting: Emily's home office. A dimly lit room with a computer screen glowing.

Lights: Dim lighting with a blue hue from the computer screen.

Action:
Emily: Clicking on a suspicious email link.
Phisher: Typing furiously on another computer screen.
Dialogues and Expressions:

Emily (reading email): "Your account has been compromised. Click here to secure it."
Emily (clicking the link): "Better safe than sorry."
Light Change: Red light envelops the room as Emily realizes the mistake.

Scene 5: The Identity Theft


Setting: Emily's living room. Papers and mail scattered around indicating chaos.

Lights: Flickering lights to show distress.

Action:

Emily: Opening a letter with a shocked expression.


Thief: Smiling, holding Emily's credit card details.
Dialogues and Expressions:

Emily (panicking): "This can't be happening!"


Thief (sinisterly): "Gotcha."
Scene 6: The Fake Friend Request
Setting: Office break room. A casual atmosphere with colleagues chatting.

Lights: Soft, warm lighting.

Action:

Emily: Accepting a friend request on her phone.


Fake Friend: Watching her actions from a distance.
Dialogues and Expressions:

Emily (smiling): "Another friend request, nice!"


Fake Friend (muttering): "Just what I needed."
Light Change: Red spotlight on Emily as she gets another notification.

Scene 7: The Misleading Advertisement


Setting: Emily's living room. An online shopping site open on her laptop.

Lights: Soft, cozy lighting.

Action:

Emily: Excitedly clicking on a deal too good to be true.


Scammer: Smirking, confirming the fake order.
Dialogues and Expressions:

Emily (excited): "What a steal!"


Scammer (laughing): "Indeed."
Light Change: Red light as Emily gets a confirmation email with an absurd shipping date.

Scene 8: The Social Media Spill


Setting: Office break room again. Colleagues gossiping in hushed tones.

Lights: Dim, moody lighting.

Action:

Emily: Browsing her social media feed, seeing a negative post about her.
Colleagues: Whispering and glancing at her.
Dialogues and Expressions:
Emily (worried): "Why are they talking about me?"
Colleagues (giggling): "Did you see her post?"
Light Change: Red spotlight on Emily, indicating her distress.

Scene 9: The Data Breach


Setting: Emily's office desk. Computer screen showing a security alert.

Lights: Flickering lights and a red hue from the computer screen.

Action:

Emily: Reading a notification about a data breach.


Hacker: Smiling, watching her screen.
Dialogues and Expressions:

Emily (panicking): "All my data is compromised!"


Hacker (satisfied): "Got everything I need."
Light Change: Red light as Emily tries to secure her data.

Scene 10: The Recovery


Setting: Office meeting room. Emily talking to an IT professional.

Lights: Soft, reassuring lighting.

Action:

Emily: Discussing security measures with IT professional.


IT Professional: Explaining steps to prevent future issues.
Dialogues and Expressions:

Emily (determined): "I need to secure my online presence."


IT Professional (supportive): "We'll help you set up proper defenses."
Light Change: Warm, steady light as Emily looks relieved.

Final Scene: The Lesson


Setting: Office break room. Colleagues gathered, listening to Emily.

Lights: Warm, steady lighting.

Action:

Emily: Sharing her experiences and lessons learned with colleagues.


Dialogues and Expressions:

Emily (speaking): "Be cautious online. Protect your privacy and data."
Colleagues (nodding): "Thanks for the advice, Emily."
Light Change: Warm, bright light as everyone feels more aware and secure.

You might also like