[{"data":1,"prerenderedAt":256},["Reactive",2],{"menuQuery_de":3,"settingsQuery_de":188,"routerQuery_/piece-cake_de":194},{"data":4,"loading":186,"networkStatus":187},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":120,"footer_menu_external_links":140,"footer_menu_meta":168},{"__typename":6,"name":7,"items":8},"Menu","Main Navigation",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Kompetenzen",{"__typename":13,"path":14},"Url","/de/kompetenzen",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cyber Security",{"__typename":13,"path":19},"/de/kompetenzen/cyber-security",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/de/kompetenzen/cloud-services",[],{"__typename":10,"title":27,"url":28,"children":30},"Procurement & Legal",{"__typename":13,"path":29},"/de/kompetenzen/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/de/kompetenzen/digitale-identitaet",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/de/kompetenzen/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Research Network",{"__typename":13,"path":44},"/de/kompetenzen/research-network",[],{"__typename":10,"title":47,"url":48,"children":50},"Lösungen",{"__typename":13,"path":49},"/de/loesungen",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/de/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communitys",{"__typename":13,"path":59},"/de/switch-communities",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/de/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"Über uns",{"__typename":13,"path":69},"/de/ueber-uns",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Unsere Stiftung",{"__typename":13,"path":74},"/de/about/stiftung",[],{"__typename":10,"title":77,"url":78,"children":80},"Hochschulpolitik",{"__typename":13,"path":79},"/de/hochschulpolitik",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovationen",{"__typename":13,"path":84},"/de/node/407",[],{"__typename":10,"title":87,"url":88,"children":90},"Kooperationen",{"__typename":13,"path":89},"/de/Kooperationen-internationale",[],{"__typename":10,"title":92,"url":93,"children":95},"Jobs",{"__typename":13,"path":94},"/de/jobs",[],{"__typename":10,"title":97,"url":98,"children":100},"Kontakt",{"__typename":13,"path":99},"/de/kontakt",[],{"__typename":6,"name":102,"items":103},"Footer Spalte 1",[104,107,110,113,117],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":22,"url":108,"children":109},{"__typename":13,"path":24},[],{"__typename":10,"title":32,"url":111,"children":112},{"__typename":13,"path":34},[],{"__typename":10,"title":114,"url":115,"children":116},"Legal & Procurement",{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":118,"children":119},{"__typename":13,"path":39},[],{"__typename":6,"name":121,"items":122},"Footer Spalte 2",[123,126,129,132,135],{"__typename":10,"title":42,"url":124,"children":125},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":127,"children":128},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":130,"children":131},{"__typename":13,"path":64},[],{"__typename":10,"title":67,"url":133,"children":134},{"__typename":13,"path":74},[],{"__typename":10,"title":136,"url":137,"children":139},"Newsletter",{"__typename":13,"path":138},"/de/newsletter",[],{"__typename":6,"name":141,"items":142},"Footer Spalte 3 (Externe Links)",[143,148,153,158,163],{"__typename":10,"title":144,"url":145,"children":147},"nic.ch",{"__typename":13,"path":146},"https://www.nic.ch/",[],{"__typename":10,"title":149,"url":150,"children":152},"nic.li",{"__typename":13,"path":151},"https://www.nic.li/",[],{"__typename":10,"title":154,"url":155,"children":157},"eduid.ch",{"__typename":13,"path":156},"https://eduid.ch/",[],{"__typename":10,"title":159,"url":160,"children":162},"eduhub.ch",{"__typename":13,"path":161},"https://www.eduhub.ch/",[],{"__typename":10,"title":164,"url":165,"children":167},"Community Portal",{"__typename":13,"path":166},"https://portal.switch.ch/",[],{"__typename":6,"name":169,"items":170},"Copyright",[171,176,181],{"__typename":10,"title":172,"url":173,"children":175},"Datenschutz",{"__typename":13,"path":174},"/de/datenschutzerklaerung",[],{"__typename":10,"title":177,"url":178,"children":180},"Impressum",{"__typename":13,"path":179},"/de/impressum",[],{"__typename":10,"title":182,"url":183,"children":185},"Rechtliches",{"__typename":13,"path":184},"/de/rechtliches",[],false,7,{"data":189,"loading":186,"networkStatus":187},{"settings":190},{"__typename":191,"site_name":192,"slogan":193},"SiteSettings","Switch","",{"data":195,"loading":186,"networkStatus":187},{"router":196},{"__typename":197,"entity":198},"EntityResponse",{"__typename":199,"_id":200,"nid":201,"title":202,"langcode":203,"alternates":204,"breadcrumb":218,"seo_information":219,"content_elements":222,"lead":218},"ContentPage","1d28ec3b-a6f2-4e2f-be6c-58dd7dfb7ef2",362,"Piece of Cake","de",[205,209,212,215],{"__typename":206,"language_id":207,"url":208},"AlternatePathItem","EN","/en/piece-cake",{"__typename":206,"language_id":210,"url":211},"DE","/de/piece-cake",{"__typename":206,"language_id":213,"url":214},"IT","/it/piece-cake",{"__typename":206,"language_id":216,"url":217},"FR","/fr/piece-cake",null,{"__typename":220,"meta_description":193,"meta_name_robots":193,"canonical":211,"page_title":221,"keywords":193,"hreflang":203},"SeoInformation","Piece of Cake | Switch",[223,240,246],{"__typename":224,"_id":225,"paragraph_id":226,"title":218,"caption":218,"size":227,"image":228},"ImageItem","7276830a-8c31-4e6e-aff9-d8b890e45f1c",2178,"big",{"__typename":229,"src":230,"sources":231,"width":236,"height":237,"alt":238,"type":239,"caption":218},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2024-04/img_20200821_161353.jpg?itok=ctBiUJyy",[232],{"__typename":233,"src":234,"media":218,"sizes":235},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_16_9/public/2024-04/img_20200821_161353.jpg?itok=ctBiUJyy 400w, https://static.www.switch.ch/sites/default/files/styles/image_small_1_5x_16_9/public/2024-04/img_20200821_161353.jpg?itok=ZdBFIGCE 608w, https://static.www.switch.ch/sites/default/files/styles/image_large_16_9/public/2024-04/img_20200821_161353.jpg?itok=IlPgLGsp 1024w, https://static.www.switch.ch/sites/default/files/styles/hero_large_16_9/public/2024-04/img_20200821_161353.jpg?itok=QTquwGdh 1600w","100vw",4048,2253,"Poc","image/jpeg",{"__typename":241,"_id":242,"paragraph_id":243,"title":244,"text":245},"TextItem","b866150c-088f-4417-89ab-68c07eec86f5",2090,"«Piece of Cake» – das Rollenspiel","\u003Cp>\u003Cstrong>Informationen sammeln. Sich einschleichen. Und sich sein Kuchenstück verdienen.\u003C/strong>\u003C/p>\u003Cp>&nbsp;\u003C/p>\u003Ch4>\u003Cstrong>Das Tabletop-Rollenspiel\u003C/strong>\u003C/h4>\u003Cp>Schleichen Sie sich in die Räumlichkeiten Ihres Rivalen\u003Cbr>Oh nein! Das geheime Rezept für Ihren berühmten Kuchen wurde gestohlen! Ohne dieses Rezept ist Ihre Bäckerei ruiniert. Nur Ihr grösster Rivale ist zu so einer böswilligen Tat fähig. Können Sie das Rezept zurückholen, bevor es zu spät ist?\u003C/p>\u003Cp>Sind Sie bereit, sich unbemerkt bei Ihrem Rivalen einzuschleichen? Aufgabe Ihres Teams ist es, das gestohlene Rezept zu finden und zurückzustehlen. Schlüpfen Sie in Ihre Rolle, und überzeugen und manipulieren Sie Ihren Gegenspieler, bis dieser Sie zu Ihrem wertvollsten Gut führt.\u003Cbr>&nbsp;\u003C/p>\u003Cp>Zusammen mit bis zu 5 Personen müssen Sie versuchen, seinen Aufenthaltsort mit Hilfe von Social-Engineering-Techniken zu finden.\u003C/p>\u003Cp>&nbsp;\u003C/p>\u003Ch4>\u003Cstrong>Lernziel\u003C/strong>\u003C/h4>\u003Cp>Ziel dieses Abenteuers ist es, die Teilnehmer über die Bedeutung von Datenschutz und Datensicherheit sowie über die Risiken von Social-Engineering-Taktiken aufzuklären. Das Spiel zeigt, wie wichtig es ist, persönliche und sensible Informationen vor unbefugtem Zugriff oder Offenlegung zu schützen. Darüber hinaus erfahren die Teilnehmer mehr über psychologische Manipulation und Täuschung, die bei Social-Engineering-Angriffen eingesetzt werden, um Opfer dazu zu bringen, sensible Informationen preiszugeben.\u003C/p>\u003Cp>&nbsp;\u003C/p>\u003Ch4>Es geht darum, Leute zu hacken\u003C/h4>\u003Cp>Kriminelle Hacker haben längst herausgefunden, dass es einfacher sein kann, Menschen zu hacken als stark geschützte Computersysteme. Phishing, CEO Fraud oder Anlagebetrug sind nur einige Angriffstypen, bei denen Social-Engineering-Techniken genutzt werden, um Menschen so zu manipulieren, dass sie Informationen oder Geld herausgeben.\u003Cbr>Social Engineering ist eine psychologische Beeinflussung von Menschen, die auf bestimmte Verhaltensweisen oder die Preisgabe vertraulicher Informationen abzielt. Der Unterschied zur traditionellen «Betrügerei» ist, dass es sich häufig nur um einen von zahlreichen Schritten im Rahmen einer weit komplexeren Betrugsmethode handelt. (wikipedia.org)\u003C/p>",{"__typename":247,"_id":248,"paragraph_id":249,"title":250,"contact_boxes":251},"ContactBoxList","6a269f1a-2a5c-44af-a89a-b0a3cc7ba573",2305,"Noch Fragen?",[252],{"__typename":253,"name":254,"image":218,"phone_number":218,"e_mail_address":255,"job_title":218,"organisation":218},"ContactBox","Kompetenzzentrum für Human Centred Security","hucs@switch.ch",1775141035887]