What is the difference between a dictionary attack and a brute-force attack on a password?
A dictionary attack tries common words/phrases, while brute-force tries every possible combination of letters, numbers, and symbols.
How can you identify a spoofed website?
Check for misspellings in the URL, lack of HTTPS, or unusual design that doesn’t match the official site.
Why is “I deleted it, so it’s gone” dangerous?
Deleted posts may be archived, screenshotted, or stored on servers.
How is cyberbullying different from traditional bullying?
It can happen anytime, spread quickly to a large audience, and be anonymous.
Difference between a virus, worm, and Trojan horse?
Virus = attaches to files, Worm = spreads without files, Trojan = disguised as safe software.
Why is “Pa$$w0rd123” still considered weak even though it has symbols and numbers?
It’s predictable because it’s based on a common word and common substitutions hackers expect.
Why are HTTPS and the padlock symbol important?
They show the site uses encryption, protecting data as it travels online.
How can companies use your digital footprint to target ads?
They track browsing/search history and build profiles to show personalized ads.
Why is being a bystander to online bullying harmful?
It allows bullying to continue and makes the victim feel unsupported.
Explain how ransomware works.
It locks or encrypts your files and demands payment to unlock them.
Why is a password manager safer than writing passwords in a notebook?
It encrypts and stores complex unique passwords securely, reducing the chance of theft or loss.
How can a phishing email trick someone even if it looks professional?
It may copy logos and language but usually contains suspicious links, urgent tone, or requests for personal info.
What could happen if a university finds offensive posts you made years ago?
It could harm your chances of admission due to poor online reputation.
If you screenshot and share a private conversation, what ethical principle are you breaking?
Privacy and confidentiality.
What is the role of antivirus software?
Detects, quarantines, and removes malware to protect devices.
What does “salting a password” mean in cybersecurity?
Adding random data to a password before hashing it, making it harder for hackers to crack.
What’s the difference between phishing, smishing, and vishing?
Phishing = email fraud, smishing = SMS/text fraud, vishing = voice/phone fraud.
Difference between active and passive digital footprint?
Active = things you post (comments, photos), Passive = data collected without you posting (cookies, tracking).
How can the law get involved in cyberbullying cases?
Cyberbullying can be a crime (harassment, defamation, threats), and victims can report it to authorities.
Why might a free Wi-Fi hotspot be risky?
Hackers can intercept data (passwords, messages) on unsecured networks.
If a website you use gets hacked, what’s the first thing you should do?
Change your password immediately (and anywhere else you used the same password).
You receive an email from your bank asking for your account number. How do you verify it?
Don’t click links — instead, contact the bank directly through official phone numbers or websites.
Example of digital footprint affecting job applications?
An employer finds inappropriate photos or rude comments, leading them not to hire you.
Should schools monitor students’ social media activity? Argue for/against.
For: To protect students from harm.
Against: It invades privacy and control outside of school.
Explain how a keylogger can steal your information.
It secretly records everything you type, like usernames and passwords, and sends it to hackers.