Online Safety
Phishing
CyberSecurity Principles
Malware
Operating Systems
100
Refers to any bullying that takes place through use of electronic technology.
What is cyber-bullying?
100
Received from a Nigerian prince via email asking you to give him bank account information so he can share the million dollars he has in an account that he must transfer somewhere to retrieve.
What is an email scam?
100

The protection of the underlying networking infrastructure from unauthorized access, misuse, or theft.

What is Network Security?

100
This is a computer program that spreads or self-replicates and requires user interaction to activate.
What is a virus?
100
Most commonly used operating system. It is user-friendly and used in offices and homes
What is Microsoft Windows?
200

This type of information can contain any of the following: Student ID Number, Date of Birth, Email Address, Mailing Address, Credit Card Information, Social Security Number.

What is "Personally Identifiable Information (PII)"?

200

When telephones replace emails as the method of communication for phishing.

What is smishing?

200

This process is focused on returning the performance of your organization’s services to normal as quickly as possible.

What is Incident Management

200
It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is deisgned to give hackers access to your computer or files.
What is a Trojan Horse?
200
Often open-source, meaning that anyone can use or modify the operating systems. Many different “flavors” or significantly varied operating systems.
What is Linux?
300
This should be done if you or one of your friends is a victim of cyber-bullying
What is report it to your parents or teacher?
300

Malicious emails sent to a specific person using known information, such as their name or place of employment

What is spear phishing?

300

A unique address that identifies a device on the internet or a local network. 

What is an IP Address

300
This malware can infect and spread without human assistance
What is a worm?
300
Distantly related to Linux operating systems. Generally more secure than Windows because malware is less likely to target non-Windows systems
What is MAC?
400
This is the person you should share your passwords with.
What is no one?
400

A targeted type of phishing as it goes after CEOs and authorities of large corporations

What is whaling?

400
When thieves sift through garbage for receipts with credit card information, medical forms with social security numbers, or other documents with PII.
What is dumpster diving?
400
Defined as programs that track where you go on the Internet.
What is spyware?
400
Is an environment, such as a program or operating system that does not physically exist, but is created within another environment
What is a virtual machine (VM)?
500
This icon appears in your browser address bar when the site is secure.
What is a lock?
500
This site can be used to verify if a file or website contains malware.
500
When someone looks over your shoulder as you type, to glean your passwords, account information, and other sensitive information.
What is Shoulder-Surfing?
500
This type of malware records everything you type into your keyboard.
What is a key-logger?
500
A software program used to create and run VMs
What is VMware?
M
e
n
u