Online places where you are susceptible to social engineering (multiple).
What are email accounts, chatrooms, and any place you can receive messages or advertisements?
Any computer program designed to do harmful and unwanted things to the computer user, such as stealing your information.
What is malware?
Some of the social media platforms on which cyberbullying may occur (multiple).
What are Snapchat, Instagram, YouTube, and TikTok?
The only people you can (mostly) trust on the Internet.
Who are family members and close friends you have met in person?
Ways to identify an email scam (multiple).
What are suspicious email addresses, spelling and grammar mistakes, unfamiliar links, and asking for personal information?
Malware designed to copy itself and spread with human assistance in the form of email chains, attachments, shared files, spoof links, and more; also, a submicroscopic infectious agent.
What are viruses?
Things you must avoid posting on social media (multiple).
What are profanity, inappropriate clothing and actions, and offensive comments? Remember: anyone with the right knowledge will be able to see these posts even after they are deleted.
How long information stays on the Internet once it is posted.
What is forever?
Email scams in which someone attempts to gather personal or financial information (a type of social engineering).
What is phishing?
Malware designed to copy itself and spread entirely without human assistance, often going unnoticed; also, a dirty organism.
What are worms?
People you can talk to if you need help on social media (multiple).
Who are trusted adults (e.g., parents, teachers, family members)?
Qualifications of a strong password (multiple).
What are making them hard to guess but easy to remember, including different types of characters, and having a length of at least 8 characters?
Fake scenarios set up by attackers to steal information (a type of social engineering).
What is pretexting?
Software designed to appeal to the user, but secretly contain hidden malware; also, a sneaky maneuver that may be in your history book.
What is a Trojan Horse?
What you should never do in chatrooms (multiple).
What are sharing photos of yourself, opening links or attachments, and meeting in real life?
The type of information which you should never reveal online.
What is Personally Identifiable Information (name, age, address, phone number, credit card number, etc.)?
Promising something you want in exchange for information (a type of social engineering).
What is baiting?
Softwares you can install to block incoming viruses, remove existing viruses, and/or block losing your outgoing data (2).
What are anti-malware software and firewalls?
Type of chatroom you should always remain in; also, the type of social media account that claims to maintain secrecy, but does not entirely do so.
What is public? Private chatrooms require invites and give access between just you and another unknown person. Be careful of what you post on private social media accounts.
Some of the many cybersecurity professionals who are dedicated to keeping you safe online (multiple).
Who are Cybersecurity Analysts, Computer Programmers, Computer Network Architects, Security Consultants/Developers/Engineers?