  [{"data":1,"prerenderedAt":400},["Reactive",2],{"menuQuery_de":3,"settingsQuery_de":188,"routerQuery_/security-arcade-die-raetselstationen_de":194,"viewQuery_3352_DE":374},{"data":4,"loading":186,"networkStatus":187},{"menu":5,"footer_menu_col1":101,"footer_menu_col2":120,"footer_menu_external_links":140,"footer_menu_meta":168},{"__typename":6,"name":7,"items":8},"Menu","Main Navigation",[9,46,51,56,61,66],{"__typename":10,"title":11,"url":12,"children":15},"MenuItem","Kompetenzen",{"__typename":13,"path":14},"Url","/de/kompetenzen",[16,21,26,31,36,41],{"__typename":10,"title":17,"url":18,"children":20},"Cyber Security",{"__typename":13,"path":19},"/de/kompetenzen/cyber-security",[],{"__typename":10,"title":22,"url":23,"children":25},"Cloud Services",{"__typename":13,"path":24},"/de/kompetenzen/cloud-services",[],{"__typename":10,"title":27,"url":28,"children":30},"Procurement & Legal",{"__typename":13,"path":29},"/de/kompetenzen/procurement-legal",[],{"__typename":10,"title":32,"url":33,"children":35},"Digital Identity",{"__typename":13,"path":34},"/de/kompetenzen/digitale-identitaet",[],{"__typename":10,"title":37,"url":38,"children":40},"Registry",{"__typename":13,"path":39},"/de/kompetenzen/registry",[],{"__typename":10,"title":42,"url":43,"children":45},"Research Network",{"__typename":13,"path":44},"/de/kompetenzen/research-network",[],{"__typename":10,"title":47,"url":48,"children":50},"LÃ¶sungen",{"__typename":13,"path":49},"/de/loesungen",[],{"__typename":10,"title":52,"url":53,"children":55},"Events",{"__typename":13,"path":54},"/de/events",[],{"__typename":10,"title":57,"url":58,"children":60},"Communitys",{"__typename":13,"path":59},"/de/switch-communities",[],{"__typename":10,"title":62,"url":63,"children":65},"Insights",{"__typename":13,"path":64},"/de/insights",[],{"__typename":10,"title":67,"url":68,"children":70},"Ãœber uns",{"__typename":13,"path":69},"/de/ueber-uns",[71,76,81,86,91,96],{"__typename":10,"title":72,"url":73,"children":75},"Unsere Stiftung",{"__typename":13,"path":74},"/de/about/stiftung",[],{"__typename":10,"title":77,"url":78,"children":80},"Hochschulpolitik",{"__typename":13,"path":79},"/de/hochschulpolitik",[],{"__typename":10,"title":82,"url":83,"children":85},"Innovationen",{"__typename":13,"path":84},"/de/node/407",[],{"__typename":10,"title":87,"url":88,"children":90},"Kooperationen",{"__typename":13,"path":89},"/de/Kooperationen-internationale",[],{"__typename":10,"title":92,"url":93,"children":95},"Jobs",{"__typename":13,"path":94},"/de/jobs",[],{"__typename":10,"title":97,"url":98,"children":100},"Kontakt",{"__typename":13,"path":99},"/de/kontakt",[],{"__typename":6,"name":102,"items":103},"Footer Spalte 1",[104,107,110,113,117],{"__typename":10,"title":17,"url":105,"children":106},{"__typename":13,"path":19},[],{"__typename":10,"title":22,"url":108,"children":109},{"__typename":13,"path":24},[],{"__typename":10,"title":32,"url":111,"children":112},{"__typename":13,"path":34},[],{"__typename":10,"title":114,"url":115,"children":116},"Legal & Procurement",{"__typename":13,"path":29},[],{"__typename":10,"title":37,"url":118,"children":119},{"__typename":13,"path":39},[],{"__typename":6,"name":121,"items":122},"Footer Spalte 2",[123,126,129,132,135],{"__typename":10,"title":42,"url":124,"children":125},{"__typename":13,"path":44},[],{"__typename":10,"title":47,"url":127,"children":128},{"__typename":13,"path":49},[],{"__typename":10,"title":62,"url":130,"children":131},{"__typename":13,"path":64},[],{"__typename":10,"title":67,"url":133,"children":134},{"__typename":13,"path":74},[],{"__typename":10,"title":136,"url":137,"children":139},"Newsletter",{"__typename":13,"path":138},"/de/newsletter",[],{"__typename":6,"name":141,"items":142},"Footer Spalte 3 (Externe Links)",[143,148,153,158,163],{"__typename":10,"title":144,"url":145,"children":147},"nic.ch",{"__typename":13,"path":146},"https://www.nic.ch/",[],{"__typename":10,"title":149,"url":150,"children":152},"nic.li",{"__typename":13,"path":151},"https://www.nic.li/",[],{"__typename":10,"title":154,"url":155,"children":157},"eduid.ch",{"__typename":13,"path":156},"https://eduid.ch/",[],{"__typename":10,"title":159,"url":160,"children":162},"eduhub.ch",{"__typename":13,"path":161},"https://www.eduhub.ch/",[],{"__typename":10,"title":164,"url":165,"children":167},"Community Portal",{"__typename":13,"path":166},"https://portal.switch.ch/",[],{"__typename":6,"name":169,"items":170},"Copyright",[171,176,181],{"__typename":10,"title":172,"url":173,"children":175},"Datenschutz",{"__typename":13,"path":174},"/de/datenschutzerklaerung",[],{"__typename":10,"title":177,"url":178,"children":180},"Impressum",{"__typename":13,"path":179},"/de/impressum",[],{"__typename":10,"title":182,"url":183,"children":185},"Rechtliches",{"__typename":13,"path":184},"/de/rechtliches",[],false,7,{"data":189,"loading":186,"networkStatus":187},{"settings":190},{"__typename":191,"site_name":192,"slogan":193},"SiteSettings","ÂÌ²èÖ±²¥","",{"data":195,"loading":186,"networkStatus":187},{"router":196},{"__typename":197,"entity":198},"EntityResponse",{"__typename":199,"_id":200,"nid":201,"title":202,"langcode":203,"alternates":204,"breadcrumb":218,"seo_information":219,"content_elements":223,"lead":221,"background_color":373,"teaser_title":202,"teaser_subtitle":218,"teaser_text":221},"DetailPage","efa7b6b9-fc08-4a83-b279-f70096641e80",487,"Security Arcade â€“ die RÃ¤tselstationen","de",[205,209,212,215],{"__typename":206,"language_id":207,"url":208},"AlternatePathItem","EN","/en/security-arcade-puzzle-stations",{"__typename":206,"language_id":210,"url":211},"DE","/de/security-arcade-die-raetselstationen",{"__typename":206,"language_id":213,"url":214},"IT","/it/security-arcade-le-stazioni-enigma",{"__typename":206,"language_id":216,"url":217},"FR","/fr/security-arcade-les-stations-denigmes",null,{"__typename":220,"meta_description":221,"meta_name_robots":193,"canonical":211,"page_title":222,"keywords":193,"hreflang":203},"SeoInformation","Informationen sammeln. VisuCorp hacken. Katzenvideos retten","Security Arcade â€“ die RÃ¤tselstationen | ÂÌ²èÖ±²¥",[224,245,269,274,297,307],{"__typename":225,"_id":226,"paragraph_id":227,"title":228,"intro":229,"fact_list_type":230,"facts":231},"FactsList","b13254ab-995a-4df5-9b41-266f46db77d8",3336,"SÃ¼sse Tiervideos? Gestrichen! ","\u003Cp>Unruhe herrscht im Cyber Space, seit der Mega-Konzern \u003Cstrong>VisuCorp\u003C/strong> jedes Tier-Video aus dem Netz gelÃ¶scht hat â€“ zu viel verlorene Arbeitszeit. Das ist inakzeptabel!&nbsp;\u003C/p>\u003Cp>\u003Cem>\u003Cstrong>Es gibt nur eine Chance: Ab in die Security Arcade\u003C/strong>\u003C/em>\u003C/p>","icon",[232,237,241],{"__typename":233,"id":234,"title":235,"text":218,"icon_name":236,"image":218,"link":218},"Fact",3335,"Zwei Personen","gamepad-modern",{"__typename":233,"id":238,"title":239,"text":218,"icon_name":240,"image":218,"link":218},3337,"Dreissig Minuten","clock-two",{"__typename":233,"id":242,"title":243,"text":218,"icon_name":244,"image":218,"link":218},3338,"FÃ¼nf Challenges. ","dice",{"__typename":246,"_id":247,"paragraph_id":248,"title":218,"items":249},"ImageTextList","d4d43eca-dc7f-4f5e-9562-be5eecf7ee94",3349,[250],{"__typename":251,"id":252,"_id":253,"title":254,"text":255,"cta":218,"cta_style":256,"image":257},"ImageTextItem",3348,"b213c54d-f68f-4465-97e7-49e47c0c9dbc","Infiltrate VisuCorp","\u003Cp style=\"background:white;line-height:normal;margin-bottom:0cm;margin-left:0cm;margin-right:0cm;margin-top:12.0pt;\">\u003Cspan style=\"color:#002864;font-family:&quot;Euclid Circular B&quot;,sans-serif;letter-spacing:.1pt;\">Infiltrieren Sie VisuCorp, hacken Sie das Headquarter und holen Sie die Katzenclips zurÃ¼ck. Jede RÃ¤tselstation bringt Sie tiefer in den Konzern und nÃ¤her zum Ziel: \u003Cstrong>Tiervideos fÃ¼r alle! Game on!\u003C/strong>\u003C/span>\u003Cbr>\u003Cbr>\u003Cspan style=\"color:#002864;font-family:&quot;Euclid Circular B&quot;,sans-serif;letter-spacing:.1pt;\">LÃ¶sen Sie zu zweit als Hacker-Duo futuristische Challenges und arbeiten Sie sich Schritt fÃ¼r Schritt ins Herz von VisuCorp vor. Nur wenn Sie clever genug sind, kehren die Tiervideos zurÃ¼ck.&nbsp;\u003C/span>\u003C/p>","primary",{"__typename":258,"src":259,"sources":260,"width":265,"height":266,"alt":267,"type":268,"caption":218},"ImageMedia","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-01/hucs.png?itok=iyBqJB7G",[261],{"__typename":262,"src":263,"media":218,"sizes":264},"ImageSource","https://static.www.switch.ch/sites/default/files/styles/image_small_5_4/public/2026-01/hucs.png?itok=iyBqJB7G 330w, https://static.www.switch.ch/sites/default/files/styles/image_medium_5_4/public/2026-01/hucs.png?itok=QNxKYSG2 600w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4/public/2026-01/hucs.png?itok=7-xgRJ3J 800w, https://static.www.switch.ch/sites/default/files/styles/image_large_5_4_1_5x/public/2026-01/hucs.png?itok=iWjt8oJo 1230w","(min-width: 984px) 51vw, 95vw",908,670,"Hucs - Game","image/png",{"__typename":270,"_id":271,"paragraph_id":272,"title":218,"text":273},"TextItem","3ee2c034-fc19-4e55-9a71-3ed7b6990804",3344,"\u003Ch4>\u003Cstrong>Lernziele\u003C/strong>\u003C/h4>\u003Cp>In der Security Arcade erleben die Teilnehmenden spielerisch, wie Cyberangriffe funktionieren. Sie durchforsten das Netz nach frei verfÃ¼gbaren Informationen und erkennen, wie viel Ã¼ber Personen und Organisationen offen zugÃ¤nglich ist. Sie verfassen gemeinsam eine Phishing-Mail und erfahren, welche sprachlichen und psychologischen Mittel eine solche Nachricht Ã¼berzeugend machen. Zudem lernen sie, welche sensiblen Daten durch unscheinbare Spuren wie Standortangaben oder weggeworfene Dokumente sichtbar werden kÃ¶nnen, und warum gerade Emotionen bei Social-Engineering-Angriffen so wirkungsvoll eingesetzt werden. So entsteht ein tieferes VerstÃ¤ndnis fÃ¼r die Vielfalt von Angriffsszenarien und die eigene Rolle darin.\u003C/p>\u003Ch4>\u003Cbr>\u003Cstrong>Es geht darum, Leute zu hacken\u003C/strong>\u003C/h4>\u003Cp>Kriminelle Hacker haben lÃ¤ngst herausgefunden, dass es einfacher sein kann, Menschen zu hacken als stark geschÃ¼tzte Computersysteme. Phishing, CEO Fraud oder Anlagebetrug sind nur einige Angriffstypen, bei denen Social-Engineering-Techniken genutzt werden, um Menschen so zu manipulieren, dass sie Informationen oder Geld herausgeben. Social Engineering ist eine psychologische Beeinflussung von Menschen, die auf bestimmte Verhaltensweisen oder die Preisgabe vertraulicher Informationen abzielt. Der Unterschied zur traditionellen Â«BetrÃ¼gereiÂ» ist, dass es sich hÃ¤ufig nur um einen von zahlreichen Schritten im Rahmen einer weit komplexeren Betrugsmethode handelt. (wikipedia.org)\u003Cbr>&nbsp;\u003C/p>",{"__typename":275,"_id":276,"paragraph_id":277,"title":278,"attributes":279,"video_url":296},"VideoEmbed","ed67b878-e497-4a1a-b0f1-238f00c9b43d",3394,"Tauche ein in die Security Arcade",[280,284,286,288,290,292,294],{"__typename":281,"name":282,"value":283},"VideoEmbedAttribute","download","1",{"__typename":281,"name":285,"value":283},"forms",{"__typename":281,"name":287,"value":283},"allow-same-origin",{"__typename":281,"name":289,"value":283},"scripts",{"__typename":281,"name":291,"value":283},"allow-top-navigation",{"__typename":281,"name":293,"value":283},"allowfullscreen",{"__typename":281,"name":295,"value":283},"autoplay","https://switch.mediaspace.cast.switch.ch/embed/secure/iframe/entryId/0_fq1jtaha/uiConfId/23449074/st/0",{"__typename":298,"_id":299,"paragraph_id":300,"title":301,"contact_boxes":302},"ContactBoxList","1866ea59-3409-4fa1-bcbd-187b20de7558",3351,"Noch Fragen?",[303],{"__typename":304,"name":305,"image":218,"phone_number":218,"e_mail_address":306,"job_title":218,"organisation":218},"ContactBox","Human Centred Security Team","hucs@switch.ch",{"__typename":308,"_id":309,"paragraph_id":310,"title":52,"langcode":210,"preseselected_field_event_type_target_id":311,"preseselected_field_topics_target_id":319,"next_events":322,"events_overview_page":363},"NextEvents","b73265ab-feb3-4683-8f12-3e65a3709b5a",3352,[312,316],{"__typename":313,"id":314,"name":315},"TaxonomyTerm",23,"Community Event",{"__typename":313,"id":317,"name":318},24,"Ã–ffentlicher Event",[320],{"__typename":313,"id":321,"name":17},9,{"__typename":323,"display_id":324,"view_id":325,"available_exposed_filters":326,"available_contextual_filters":357,"pager":358},"View","next_events","events_overview",[327,349],{"__typename":328,"field_name":329,"filter_label":330,"options":331},"ViewsExposedFilter","field_topics_target_id","Kompetenzbereich",[332,335,338,340,342,344,346],{"__typename":333,"id":334,"label":17},"ViewsExposedFilterOptions","9",{"__typename":333,"id":336,"label":337},"10","Cloud Services & Video",{"__typename":333,"id":339,"label":114},"13",{"__typename":333,"id":341,"label":32},"11",{"__typename":333,"id":343,"label":37},"15",{"__typename":333,"id":345,"label":42},"12",{"__typename":333,"id":347,"label":348},"16","eduhub",{"__typename":328,"field_name":350,"filter_label":351,"options":352},"field_event_type_target_id","Art des Events",[353,355],{"__typename":333,"id":354,"label":315},"23",{"__typename":333,"id":356,"label":318},"24","langcode,excluded_nid",{"__typename":359,"pager_type":360,"total_pages":361,"items_per_page":362},"ViewsPager","full",2,3,{"__typename":364,"alternates":365},"LandingPage",[366,368,369,371],{"__typename":206,"language_id":207,"url":367},"/en/events",{"__typename":206,"language_id":210,"url":54},{"__typename":206,"language_id":213,"url":370},"/it/node/215",{"__typename":206,"language_id":216,"url":372},"/fr/events","blue-purple",{"data":375,"loading":186,"networkStatus":187},{"view":376},{"__typename":323,"view_id":325,"field_settings":218,"result_count":361,"pager":377,"result":379},{"__typename":359,"items_per_page":362,"pager_type":360,"total_pages":378},1,[380,391],{"__typename":381,"nid":382,"title":383,"teaser_text":384,"url":385,"teaser_title":383,"infos_date":386,"infos_location":390,"teaser_subtitle":218},"EventDetailPage",503,"Human Centred Security Day 2026","Am Human Centred Security Day von ÂÌ²èÖ±²¥ werfen wir einen praxisnahen Blick auf aktuelle Herausforderungen der Cybersicherheit.\r\n\r\nIm Fokus steht, sicheres Verhalten im Alltag zu erleichtern, ergÃ¤nzt durch Einblicke in Human Risk, KI-bezogene Bedrohungen und Sicherheitskultur sowie Austausch mit Fachpersonen.","/de/human-centred-security-day-2026",{"__typename":387,"date_range":388,"time_range":389},"DateRangeItem","22. Okt. 2026","8:30â€“17:30","Zentrum Paul Klee, Monument im Fruchtland 3, 3006 Bern",{"__typename":381,"nid":392,"title":393,"teaser_text":394,"url":395,"teaser_title":393,"infos_date":396,"infos_location":399,"teaser_subtitle":218},505,"ICT Focus 2026","Die Veranstaltung ICT Focus bringt EntscheidungstrÃ¤gerinnen und -trÃ¤ger aus den Bereichen Bildung, Forschung und Innovation in der ganzen Schweiz zusammen sowie Mitglieder der Leitungsgremien von ÂÌ²èÖ±²¥, einschliesslich Stiftungsrat und Ausschuss.\r\nDie Veranstaltung richtet sich traditionell an FÃ¼hrungskrÃ¤fte von IT- und Serviceabteilungen an Schweizer Hochschulen und Forschungsinstitutionen.\r\nICT Focus - Verbindet KÃ¶pfe. Schafft Zukunft.","/de/ict-focus-2026",{"__typename":387,"date_range":397,"time_range":398},"25. Nov. 2026","8:30â€“14:30","Verkehrshaus Luzern",1776792153226]