Share With Care
Don't Fall For Fake #1
Don't Fall For Fake #2
Secure Your Secrets
It's Cool To Be Kind
100

What is your digital footprint?

Your digital footprint is everything on the Internet that makes you you! This could mean photos, audio, videos, texts, blog posts, and messages you write on friendsʼ pages.

100

A an attack happens when someone tries to trick you into sharing personal information online. And is usually done through email, ads, or sites that look similar to sites you already use. 

What is this and how is it spelled? Daily Double!

Phishing

100
What is the definition of trustworthy?

Able to be relied on to do what is right or what is needed.

100

What is an example of a security token?

Key Fob, fingerprint scan, face scan, retinal scan, etc.

100

What does it mean to amplify something?

To make something louder or stronger.

200

What personal information should you not give to anyone online? Name three.

1. Last Name

2. Your Home Address

3. Social Security Number

4. Phone Number

5. Where You Go To School

200

A phishing scam where an attacker targets you more precisely by using pieces of your own personal information.

Spearphishing

200

A program that shields your computer from most scams and tricks.

Firewall

200

What is the definition of privacy?

Protecting your personal information and that of others.

200

When someone cannot access your profile or send you an email...this is called?

Blocking

300

The area in any digital product, app, website, etc., where you can define or adjust what you share and how your account is handled. This is known as?

Settings

300

What is a scam?

A dishonest attempt to make money or gain something else of value by tricking people.

300

Name at least two types of firewalls?

McAfee, ZoneAlarm, Windows Defender, etc...

300

What is a password and what is the criteria for a strong password?

Daily Double

A secret combination used to access something.

At least 8 characters long, one uppercase letter, one lowercase letter and a symbol/special character.

300

What is a cyberbully?

Unwanted, aggressive behavior that is repeated (or has the potential to be repeated) over time ONLINE.

400

What on your social network should you do to keep yourself protected?

Set your privacy settings to private, not public.

400

Intended to make someone believe something that isnʼt true...



Deceptive

400

Done to trick someone for the purpose of getting something valuable.

Fraudulent

400

What is two-step verification?

A security process where logging in to a service requires two steps. You may have to enter in your password and enter in a code that was texted to your phone number (for example). 

400

What is an upstander vs bystander?

Daily Double

Upstander - Someone who intervenes to stop and/or report inappropriate behavior.

Bystander - Someone who has the power to intervene or report bad behavior but doesnʼt do anything to stop it.

500

What is a boundary?

A point or limit that indicates where two things become different, or unofficial rules about what should not be done. Behavior is acceptable on one side of the boundary, but not on the other.

500

What are two synonyms for authentic?

Real, genuine, true, or accurate.

500

How do you tell if the website you are using is secure? List two things?

Green Padlock and https

500

Security is using good habits for securing hardware and software. What is the name of the device/place where you can back up your files?

External Hard Drive or the Cloud

500

What is the definition of harassment?

To create an unpleasant or hostile situation by uninvited and unwelcome verbal or physical conduct.

M
e
n
u