What is your digital footprint?
Your digital footprint is everything on the Internet that makes you you! This could mean photos, audio, videos, texts, blog posts, and messages you write on friendsʼ pages.
A an attack happens when someone tries to trick you into sharing personal information online. And is usually done through email, ads, or sites that look similar to sites you already use.
What is this and how is it spelled? Daily Double!
Phishing
Able to be relied on to do what is right or what is needed.
What is an example of a security token?
Key Fob, fingerprint scan, face scan, retinal scan, etc.
What does it mean to amplify something?
To make something louder or stronger.
What personal information should you not give to anyone online? Name three.
1. Last Name
2. Your Home Address
3. Social Security Number
4. Phone Number
5. Where You Go To School
A phishing scam where an attacker targets you more precisely by using pieces of your own personal information.
Spearphishing
A program that shields your computer from most scams and tricks.
Firewall
What is the definition of privacy?
Protecting your personal information and that of others.
When someone cannot access your profile or send you an email...this is called?
Blocking
The area in any digital product, app, website, etc., where you can define or adjust what you share and how your account is handled. This is known as?
Settings
What is a scam?
A dishonest attempt to make money or gain something else of value by tricking people.
Name at least two types of firewalls?
McAfee, ZoneAlarm, Windows Defender, etc...
What is a password and what is the criteria for a strong password?
Daily Double
A secret combination used to access something.
At least 8 characters long, one uppercase letter, one lowercase letter and a symbol/special character.
What is a cyberbully?
Unwanted, aggressive behavior that is repeated (or has the potential to be repeated) over time ONLINE.
What on your social network should you do to keep yourself protected?
Set your privacy settings to private, not public.
Intended to make someone believe something that isnʼt true...
Deceptive
Done to trick someone for the purpose of getting something valuable.
Fraudulent
What is two-step verification?
A security process where logging in to a service requires two steps. You may have to enter in your password and enter in a code that was texted to your phone number (for example).
What is an upstander vs bystander?
Daily Double
Upstander - Someone who intervenes to stop and/or report inappropriate behavior.
Bystander - Someone who has the power to intervene or report bad behavior but doesnʼt do anything to stop it.
What is a boundary?
A point or limit that indicates where two things become different, or unofficial rules about what should not be done. Behavior is acceptable on one side of the boundary, but not on the other.
What are two synonyms for authentic?
Real, genuine, true, or accurate.
How do you tell if the website you are using is secure? List two things?
Green Padlock and https
Security is using good habits for securing hardware and software. What is the name of the device/place where you can back up your files?
External Hard Drive or the Cloud
What is the definition of harassment?
To create an unpleasant or hostile situation by uninvited and unwelcome verbal or physical conduct.