In Challenge 2, we created a video with five sketches. What was the main purpose of acting these out ourselves?
To set a personal example and show exactly how to react to scams rather than just talking about it.
What percentage of users had weak passwords according to our bot's database?
45%
Why is using the same password for your bank, email, and social media called a "Digital Trap"?
Because if a hacker gets one password, they automatically have access to your entire digital life
💻 + 🗣️ + 😢
Cyberbullying
Who did we interview in Challenge 5 to bridge the gap between academic theory and the practical reality of Kazakhstani cybersecurity?
A) A Nazarbayev University professor
B) A specialist from KZ-CERT
C) A director from a local bank
D) A group of high school students
B (KZ-CERT)
Out of the 21 billion tenge lost to internet fraud in 2024, how much was actually recovered for the citizens?
1 billion tenge
What is "Social Engineering" in the context of phone scams?
Manipulating or tricking people into giving up confidential information by using emotions like fear or urgency.
👣 + 👣 + 🌐
The Clue: The "tracks" you leave behind every time you use the internet
DIGITAL FOOTPRINT
We provided a long-term resource for families to use after our workshop. What platform did we use for this "Cybersecurity 2026" guide?
Notion
How many reported calls from telephone scammers did Kazakhstani citizens receive in the year 2024?
A) Over 1,000
B) Over 3,500
C) Over 8,000
D) Over 20,000
C (Over 8,000)
Which of these is the most secure way to protect an account if your password is stolen?
A) Changing your username
B) Using a secret hint question (e.g., "Mother's maiden name")
C) Two-Factor Authentication (2FA)
D) Deleting the app and reinstalling it
C (2FA)
🎣 (Fishing Hook) + 📧 (Email) + 🔗 (Suspicious Link)
Letters Provided: P _ _ _ _ _ _ G
Phishing is when a scammer "fishes" for your secrets. They send a fake email that looks like it is from your bank to trick you into clicking a bad link.
In Challenge 10, we chose TomYumBar for our celebration. Why was this specific choice considered "inclusive"?
A) It was the cheapest option available.
B) It was the closest place to the university.
C) The decision was made collectively based on everyone’s food preferences.
D) It was the only place with enough seats.
C (Collective decision-making)
What percentage of students in grades 7-11 in Kazakhstan reported personal experiences with cyberbullying?
A) 15%
B) 48%
C) 72%
D) 85%
C) 72%
True or False: If you delete a photo or a message from your phone, it is immediately and permanently erased from the internet.
False. Because of "Digital Footprints," data is often cached, backed up on servers, or screenshotted by others before you can delete it.
🔑 (Key)
Hint: It is a unique physical trait used to unlock your devices.
Letters Provided: B _ _ _ _ _ _ _ _ S
BIOMETRICS
We intentionally transitioned from building a Telegram Bot (Challenge 6) to hosting a Family Workshop (Challenge 8). Based on our leadership strategy, why was the automated Bot alone insufficient to solve the "Digital Trap," and what specific human element did the Workshop add to fix this?
The Bot is a functional tool for individuals, but the "Digital Trap" is a social issue involving the "Digital Divide." The Workshop added Active Skill Development and the "Bridge" element—allowing parents (the Gatekeepers) to protect the most vulnerable (children and elderly) simultaneously, which an automated bot cannot do alone.
In the Almaty case study, an 82-year-old pensioner lost 67 million tenge. How many separate transactions did the scammers force her to make?
14 transactions
You are at a coffee shop and see "Free_Public_WiFi." You connect and log into your bank. A hacker sitting nearby is using a "Man-in-the-Middle" (MitM) attack to see everything you type. What is the best tool to encrypt your data so the hacker can't read it even if they intercept it?
A VPN (Virtual Private Network). It creates an encrypted "tunnel" for your data.
(Your Password) + (A Code on your Phone 📱) = 🔐
Open Question: What is the 3-letter acronym for this security process?
MFA (Multi-Factor Authentication) or 2FA (Two-Factor Authentication).