  [{"data":1,"prerenderedAt":285},["Reactive",2],{"menuQuery_de":3,"settingsQuery_de":188,"routerQuery_/piece-cake_de":194},{"data":4,"loading":186,"networkStatus":187},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":120,"footer_menu_external_links":140,"footer_menu_meta":168},{"__typename":6,"name":7,"items":8},"Menu","Main Navigation",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Kompetenzen",{"__typename":13,"path":14},"Url","/de/kompetenzen",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cyber Security",{"__typename":13,"path":19},"/de/kompetenzen/cyber-security",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/de/kompetenzen/cloud-services",[],{"__typename":10,"title":27,"url":28,"children":30},"Procurement & Legal",{"__typename":13,"path":29},"/de/kompetenzen/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/de/kompetenzen/digitale-identitaet",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/de/kompetenzen/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Research Network",{"__typename":13,"path":44},"/de/kompetenzen/research-network",[],{"__typename":10,"title":47,"url":48,"children":50},"LÃ¶sungen",{"__typename":13,"path":49},"/de/loesungen",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/de/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communitys",{"__typename":13,"path":59},"/de/switch-communities",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/de/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"Ãœber uns",{"__typename":13,"path":69},"/de/ueber-uns",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Unsere Stiftung",{"__typename":13,"path":74},"/de/about/stiftung",[],{"__typename":10,"title":77,"url":78,"children":80},"Hochschulpolitik",{"__typename":13,"path":79},"/de/hochschulpolitik",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovationen",{"__typename":13,"path":84},"/de/node/407",[],{"__typename":10,"title":87,"url":88,"children":90},"Kooperationen",{"__typename":13,"path":89},"/de/Kooperationen-internationale",[],{"__typename":10,"title":92,"url":93,"children":95},"Jobs",{"__typename":13,"path":94},"/de/jobs",[],{"__typename":10,"title":97,"url":98,"children":100},"Kontakt",{"__typename":13,"path":99},"/de/kontakt",[],{"__typename":6,"name":102,"items":103},"Footer Spalte 1",[104,107,110,113,117],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":22,"url":108,"children":109},{"__typename":13,"path":24},[],{"__typename":10,"title":32,"url":111,"children":112},{"__typename":13,"path":34},[],{"__typename":10,"title":114,"url":115,"children":116},"Legal & Procurement",{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":118,"children":119},{"__typename":13,"path":39},[],{"__typename":6,"name":121,"items":122},"Footer Spalte 2",[123,126,129,132,135],{"__typename":10,"title":42,"url":124,"children":125},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":127,"children":128},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":130,"children":131},{"__typename":13,"path":64},[],{"__typename":10,"title":67,"url":133,"children":134},{"__typename":13,"path":74},[],{"__typename":10,"title":136,"url":137,"children":139},"Newsletter",{"__typename":13,"path":138},"/de/newsletter",[],{"__typename":6,"name":141,"items":142},"Footer Spalte 3 (Externe Links)",[143,148,153,158,163],{"__typename":10,"title":144,"url":145,"children":147},"nic.ch",{"__typename":13,"path":146},"https://www.nic.ch/",[],{"__typename":10,"title":149,"url":150,"children":152},"nic.li",{"__typename":13,"path":151},"https://www.nic.li/",[],{"__typename":10,"title":154,"url":155,"children":157},"eduid.ch",{"__typename":13,"path":156},"https://eduid.ch/",[],{"__typename":10,"title":159,"url":160,"children":162},"eduhub.ch",{"__typename":13,"path":161},"https://www.eduhub.ch/",[],{"__typename":10,"title":164,"url":165,"children":167},"Community Portal",{"__typename":13,"path":166},"https://portal.switch.ch/",[],{"__typename":6,"name":169,"items":170},"Copyright",[171,176,181],{"__typename":10,"title":172,"url":173,"children":175},"Datenschutz",{"__typename":13,"path":174},"/de/datenschutzerklaerung",[],{"__typename":10,"title":177,"url":178,"children":180},"Impressum",{"__typename":13,"path":179},"/de/impressum",[],{"__typename":10,"title":182,"url":183,"children":185},"Rechtliches",{"__typename":13,"path":184},"/de/rechtliches",[],false,7,{"data":189,"loading":186,"networkStatus":187},{"settings":190},{"__typename":191,"site_name":192,"slogan":193},"SiteSettings","ÂÌ²èÖ±²¥","",{"data":195,"loading":186,"networkStatus":187},{"router":196},{"__typename":197,"entity":198},"EntityResponse",{"__typename":199,"_id":200,"nid":201,"title":202,"langcode":203,"alternates":204,"breadcrumb":218,"seo_information":219,"content_elements":223,"lead":221,"background_color":284,"teaser_title":202,"teaser_subtitle":218,"teaser_text":221},"DetailPage","585c6645-a2cf-4280-8533-1204b53641b4",509,"Piece of Cake","de",[205,209,212,215],{"__typename":206,"language_id":207,"url":208},"AlternatePathItem","EN","/en/piece-cake",{"__typename":206,"language_id":210,"url":211},"DE","/de/piece-cake",{"__typename":206,"language_id":213,"url":214},"IT","/it/piece-cake",{"__typename":206,"language_id":216,"url":217},"FR","/fr/piece-cake",null,{"__typename":220,"meta_description":221,"meta_name_robots":193,"canonical":211,"page_title":222,"keywords":193,"hreflang":203},"SeoInformation","Informationen sammeln. Sich einschleichen. Und sich sein KuchenstÃ¼ck verdienen.","Piece of Cake | ÂÌ²èÖ±²¥",[224,245,268,274],{"__typename":225,"_id":226,"paragraph_id":227,"title":228,"intro":229,"fact_list_type":230,"facts":231},"FactsList","dde5ffaa-963e-4802-9082-f9d4e46f7cdc",3546,"Das Rollenspiel","\u003Cp>Schleichen Sie sich in die RÃ¤umlichkeiten Ihres Rivalen\u003Cbr>Oh nein! Das geheime Rezept fÃ¼r Ihren berÃ¼hmten Kuchen wurde gestohlen! Ohne dieses Rezept ist Ihre BÃ¤ckerei ruiniert. Nur Ihr grÃ¶sster Rivale ist zu so einer bÃ¶swilligen Tat fÃ¤hig. KÃ¶nnen Sie das Rezept zurÃ¼ckholen, bevor es zu spÃ¤t ist?\u003Cbr>\u003Cbr>Sind Sie bereit, sich unbemerkt bei Ihrem Rivalen einzuschleichen? Aufgabe Ihres Teams ist es, das gestohlene Rezept zu finden und zurÃ¼ckzustehlen. SchlÃ¼pfen Sie in Ihre Rolle, und Ã¼berzeugen und manipulieren Sie Ihren Gegenspieler, bis dieser Sie zu Ihrem wertvollsten Gut fÃ¼hrt.\u003Cbr>\u003Cbr>Zusammen mit bis zu 5 Personen mÃ¼ssen Sie versuchen, seinen Aufenthaltsort mit Hilfe von Social-Engineering-Techniken zu finden.\u003C/p>","icon",[232,237,241],{"__typename":233,"id":234,"title":235,"text":218,"icon_name":236,"image":218,"link":218},"Fact",3543,"5 Spielende","users-gear",{"__typename":233,"id":238,"title":239,"text":218,"icon_name":240,"image":218,"link":218},3544,"2 Stunden","alarm-clock",{"__typename":233,"id":242,"title":243,"text":218,"icon_name":244,"image":218,"link":218},3545,"Eine Mission","trophy",{"__typename":246,"_id":247,"paragraph_id":248,"title":218,"items":249},"ImageTextList","de3eeb56-6502-404a-8595-90faf9abb312",3548,[250],{"__typename":251,"id":252,"_id":253,"title":254,"text":255,"cta":218,"cta_style":256,"image":257},"ImageTextItem",3547,"6f978b6f-98b5-43ba-8b9f-52c0cd986755","Lernziel","\u003Cp>Ziel dieses Abenteuers ist es, die Teilnehmer Ã¼ber die Bedeutung von Datenschutz und Datensicherheit sowie Ã¼ber die Risiken von Social-Engineering-Taktiken aufzuklÃ¤ren. Das Spiel zeigt, wie wichtig es ist, persÃ¶nliche und sensible Informationen vor unbefugtem Zugriff oder Offenlegung zu schÃ¼tzen. DarÃ¼ber hinaus erfahren die Teilnehmer mehr Ã¼ber psychologische Manipulation und TÃ¤uschung, die bei Social-Engineering-Angriffen eingesetzt werden, um Opfer dazu zu bringen, sensible Informationen preiszugeben.\u003C/p>","primary",{"__typename":258,"src":259,"sources":260,"width":265,"height":266,"alt":202,"type":267,"caption":218},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-04/piece-of-cake.jpg?itok=WX7G-6_m",[261],{"__typename":262,"src":263,"media":218,"sizes":264},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-04/piece-of-cake.jpg?itok=WX7G-6_m 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-04/piece-of-cake.jpg?itok=RUbN32zo 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-04/piece-of-cake.jpg?itok=G8s89-UC 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-04/piece-of-cake.jpg?itok=cssIarvN 1230w","(min-width: 984px) 51vw, 95vw",3567,2480,"image/jpeg",{"__typename":269,"_id":270,"paragraph_id":271,"title":272,"text":273},"TextItem","42e4b674-fee7-4815-9dc5-321f19ec65a0",3549,"Es geht darum, Leute zu hacken","\u003Cp>Kriminelle Hacker haben lÃ¤ngst herausgefunden, dass es einfacher sein kann, Menschen zu hacken als stark geschÃ¼tzte Computersysteme. Phishing, CEO Fraud oder Anlagebetrug sind nur einige Angriffstypen, bei denen Social-Engineering-Techniken genutzt werden, um Menschen so zu manipulieren, dass sie Informationen oder Geld herausgeben.\u003Cbr>Social Engineering ist eine psychologische Beeinflussung von Menschen, die auf bestimmte Verhaltensweisen oder die Preisgabe vertraulicher Informationen abzielt. Der Unterschied zur traditionellen Â«BetrÃ¼gereiÂ» ist, dass es sich hÃ¤ufig nur um einen von zahlreichen Schritten im Rahmen einer weit komplexeren Betrugsmethode handelt. (wikipedia.org)\u003C/p>",{"__typename":275,"_id":276,"paragraph_id":277,"title":278,"contact_boxes":279},"ContactBoxList","bfb49bfc-1666-41c9-936c-99b6867705c0",3551,"Noch Fragen?",[280],{"__typename":281,"name":282,"image":218,"phone_number":218,"e_mail_address":283,"job_title":218,"organisation":218},"ContactBox","Human Centred Security Team","hucs@switch.ch","blue-purple",1776427005467]