Cyber World
SIMULATION WEB GAME
Role
Prototyper &
Designer
collaborators
Lukas Zirngibl (Team lead)
Roman Burkard (Dev)
Design Goal
To empower users to gain valuable insights into diverse cyber threats, to foster a deeper understanding of evolving security challenges.
The project began with a deep dive into major cyberattacks, analyzing the top 10–15 incidents, including Melissa Virus, Log4j, WannaCry, and Stuxnet. I developed detailed use cases categorizing timing, nature, perpetrators, impact, cost, and origin, while examining technical methods. For the game’s creative narrative, I used Midjourney for visual inspiration and GenAI to refine storytelling.
The concept is inspired by a flight simulation, cyber video games and space movies. The player is placed in the position of a spaceship. Different statistics provide information on the outside environment and ship data. In this simulation, the ship goes on an expedition flight to explore new planets.
Once Earth loads, users can scan it for viruses and cyberattacks and start the simulation game to explore specific incidents. This prototype offers an interactive platform to explore a wide range of cyberattacks, providing insights into diverse threats and fostering a deeper understanding of evolving security challenges.
After launching the expedition, users can explore different cyberattacks on Earth by clicking orange attack points. The prototype provides an intuitive interface to navigate and analyze historical attacks, using case studies and interactive visualizations to examine vectors, methods, and mitigation strategies, improving cybersecurity awareness.
Once an attack is selected, users see key facts and a simulation preview. This example shows the Log4j attack, one of the most severe cyberattacks worldwide. The hands-on approach helps users take a proactive stance and strengthen their digital defenses.
Different categories are covered such as when, where, what, intention, severity and estimated costs. A special focus is placed on the technical explanation of how such an attack has been realised.
As cyber threats continue to evolve, our prototype serves as a valuable resource, arming users with the information needed to stay ahead in the ever-changing landscape of cybersecurity.
Facts and statistics undermine and explain the severity and extend of the attack based on the research conducted in the case studies.
As cyber threats continue to evolve, our prototype serves as a valuable resource, arming users with the information needed to stay ahead in the ever-changing landscape of cybersecurity.





