Online safety
Common threats
Best Practices
100

Your friend has forgotten their password and ask to borrow yours. Should ypu let them? 

No. This is private information. Keep it a secret 

100

What should I do if I suspect malware on my computer? 

Run a reputable antivirus scan to detect and remove the malware. 

100

Why is it important to avoid public for sensitive activities? 

Wifi networks may be less secure, making it easiet for attackers to intercept your information. 

200

Someone online asks you to email a photo of yourself to them. Should you doit? 

No. This is private information. Tell a parent or grown-up you trust. 

200

Why is it important to use a strong password? 

Strong passwords make it harder for attackers to guess or crack them. 

200

Why is it important to avoid clicking on links or downloading attachments of unknown or suspicious emails? 

To prevents malware, infections and phishing attacks. 

300

Whilst listening to a sound online some of the words upset you. What should you do? 

Tell a parent or grown-up you trust. 

300

How can I protect myself from phishing attacks? 

Verify the source of the email before clicking on any links. 

300

What are the benefits of keeping software updated? 

Updates often include patches for security vulnerabilities discovered by software developers or software. 

400

Another player is rude to you whilst playing your favorite online game. What would you do? 

Dont reply. Tell a parent or adult you trust. 

400

How can I protect against DoS attacks? 

Implement DoS protection mechanism such as rate limiting and access controls. 

400

How does enabling two-factor aunthentication (2FA) enhance security? 

2FA requires an additional verification step beyond just a password, adding an extra layer of protection. 

500

Your teacher says that some people online may pretend to be somebody else. Is this true? 

Yes. Remember, meeting people online is not like meeting people in real life. 

500

What are some signs that indicate a possible man-in-the-middle ttack? 

Inconsistencues in the data being transmitted or received. 

500

How can individuals recognize phishing attempts ? 

Look for suspicious email addresses, grammatical errors, or urgent requests for personal information. 

M
e
n
u