Public vs Private Information
Social Engineering
Ways to Stay Safe
Encryption & Caesar Cipher
100

Which of these is safe to share with everyone: your favorite hobby, your password, or your home address?

Your favorite hobby (safe to share).

100

What is a scammer?

A scammer is a person who uses tricks to get private information to steal money or information.

100

Give one tip for creating a strong password.

Tip: use a mix of letters, numbers, and symbols; make it long.

100

What does encryption do?

Encryption changes information into a special code so only people with the key can read it.

200

Is a drawing of your pet public or private information? Explain briefly.

Public (a drawing of your pet is safe to share).

200

What does the term "social engineering" mean in one sentence?

Social engineering is using clever words to trick someone into giving private info or doing something they shouldn’t.

200

Why is it a good idea to lock or shut down your device after use?

Prevents others from using your device or seeing your information.

200

What is the Caesar cipher?

A Caesar cipher shifts each letter by a fixed number (the key).

300

Choose which is private information: your family’s phone number or the name of your favorite book?

Family’s phone number (private).

300

Name one trick a scammer might use to get someone’s private information.

Examples: pretending to be tech support, urgent messages asking for passwords, fake prizes.

300

How can you check if a website is safe before entering personal information?

Check the web address: starts with httpshttps and has a padlock symbol; confirm domain name is correct.

300

If the key is 3, what does the letter A become when encrypted using the Caesar cipher?

With key 3, A → D.

400

Give two examples of information you should NEVER share with people you don’t know.

Examples: passwords, home address, bank information, family phone numbers.

400

If someone online asks for your password right away and says it’s urgent, what should you do? Give two steps.

Steps: stop and think, do not share password, verify identity by contacting the company using an official number.

400

Describe two physical security rules you can follow to protect your devices and information.

Examples: lock your device, hide passwords, shut down device, store devices in a safe place.

400

Encrypt the word "CAT" using a Caesar cipher with key 2. (Show the encrypted word.)

"CAT" with key 2: C→E, A→C, T→V → "ECV".

500

Explain why your password should be private and describe one safe place to keep it.

Passwords protect accounts; store in a password manager or written and locked in a safe place.

500

You get a message that seems to be from your bank asking for account details, but the message has spelling mistakes and an odd web link. Explain why this might be a scam and what you should do.

Signs of a scam: spelling mistakes, odd link, unexpected request. Action: do not click link, contact bank using official contact info.

500

Create an example of a strong password (do not use your real information). Explain why it is stronger than "password123".

Example strong password: "Sun!7Tree?bLue9" — includes uppercase, lowercase, symbols, and numbers; longer and harder to guess than "password123".

500

Decrypt the message "KHOOR" if the Caesar cipher key is 3. (Show the decrypted word.)

"KHOOR" with key 3 decrypted: K→H, H→E, O→L, O→L, R→O → "HELLO".

M
e
n
u