-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
108 lines (108 loc) · 5.46 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Cyber Match Master</title>
<link rel="stylesheet" href="css/style.css">
</head>
<body>
<section class="layout">
<div class="header">
<h1>Cyber Match Master</h1>
<div id="header-container">
<div id="timer">
<div class="timer-bar"></div>
<span>Time left: 120s</span>
</div>
<div id="score">Score: <span id="score-value">0</span></div>
</div>
<p>Drag the term from the left column to its matching definition on the right</p>
</div>
<div class="leftSide">
<img src="img/super-hero.png" alt="Super Cyber Hero" class="super-hero-img">
</div>
<div class="body">
<ul class="draggable-list">
<li id="e1" draggable="true">Cybercrime</li>
<li id="e2" draggable="true">Spamming</li>
<li id="e3" draggable="true">Identity Theft</li>
<li id="e4" draggable="true">Hacking</li>
<li id="e5" draggable="true">Phishing</li>
<li id="e6" draggable="true">Botnet</li>
<li id="e7" draggable="true">Denial of Service (DOS) Attack</li>
<li id="e8" draggable="true">Firewall</li>
<li id="e9" draggable="true">Virus</li>
</ul>
<ul class="draggable-list">
<li id="s1" draggable="true">Any illegal activity that uses a computer as its primary means of commission</li>
<li id="s2" draggable="true">Sending the same message indiscriminately to a large number of Internet users</li>
<li id="s3" draggable="true">The fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.</li>
<li id="s4" draggable="true">Gaining unauthorised access to data in a system or computer</li>
<li id="s5" draggable="true">The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information online</li>
<li id="s6" draggable="true">A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.</li>
<li id="s7" draggable="true">An attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet</li>
<li id="s8" draggable="true">A security barrier designed to keep unwanted intruders "outside" a computer system or network while allowing safe communication between systems and users on the "inside".</li>
<li id="s9" draggable="true">A malicious program or code that attaches itself to another program file and can replicate itself and thereby infect other systems</li>
</ul>
</div>
<div class="rightSide">
<img src="img/super-hacker.png" alt="Super Hacker" class="super-hacker-img">
</div>
<div class="footer">
<div id="endMessage" style="display: none;">
<h3>Well done!</h3>
<table>
<tr>
<th>Term</th>
<th>Definition</th>
</tr>
<tr>
<td>Cybercrime</td>
<td>Any illegal activity that uses a computer as its primary means of commission</td>
</tr>
<tr>
<td>Spamming</td>
<td>Sending the same message indiscriminately to a large number of Internet users</td>
</tr>
<tr>
<td>Identity Theft</td>
<td>The fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.</td>
</tr>
<tr>
<td>Hacking</td>
<td>Gaining unauthorised access to data in a system or computer</td>
</tr>
<tr>
<td>Phishing</td>
<td>The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information online</td>
</tr>
<tr>
<td>Botnet</td>
<td>A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.</td>
</tr>
<tr>
<td>Denial of Service (DOS) Attack</td>
<td>An attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet</td>
</tr>
<tr>
<td>Firewall</td>
<td>A security barrier designed to keep unwanted intruders "outside" a computer system or network while allowing safe communication between systems and users on the "inside".</td>
</tr>
<tr>
<td>Virus</td>
<td>A malicious program or code that attaches itself to another program file and can replicate itself and thereby infect other systems</td>
</tr>
</table>
<button onclick="window.playAgain()">Play Again</button>
</div>
<div id="gameOverMessage" style="display:none;">
<h3>Game Over!</h3>
<button onclick="window.playAgain()">Start New Game</button>
</div>
</div>
</section>
<script src="js/script.js"></script>
</body>
</html>