Social Media Security
Common Threats Online
Online Behavior
Recognizing Scams
Account Protection
100

This type of setting allows you to control who can see your posts and personal information on social media platforms.

What are privacy settings?

100

This type of online fraud involves pretending to be someone else in order to gain access to your personal information.v

What is identity theft?

100

This practice involves being cautious about what you share online and avoiding posting sensitive information.

What is being mindful of what you share?

100

This term describes an email or message that looks like it’s from a legitimate source but is actually a trick to steal your information.

What is a phishing email?

100

This tool helps you generate and manage unique passwords for different accounts.

What is a password manager?

200

This common security measure involves using a combination of letters, numbers, and symbols to protect your social media accounts from unauthorized access.

What is a strong password?

200

This is a type of malicious software that can steal your personal information or harm your device.

What is malware?

200

This term refers to regularly checking your social media accounts for unauthorized activities or changes.

What is monitoring your account?

200

This type of message often tries to create a sense of urgency to pressure you into making a quick decision, like providing personal details or money.

What is a scam or fraudulent message?

200

This practice involves checking your social media accounts and devices for any unusual activity or signs of compromise.

What is regular account monitoring?

300

This practice involves not sharing personal details, such as your address or phone number, publicly on social media.

What is safeguarding personal information?

300

This type of scam involves receiving a message that tricks you into revealing sensitive information or clicking on a harmful link.

What is a phishing attack?

300

This practice involves logging out of your social media accounts when you’re finished using them, especially on shared or public computers.

What is logging out?

300

This is when a scammer publishes fake content or creates fake profiles to make a product or service look trustworthy to trick you into buying or signing up.

What is a fake review?

300

This type of security setting helps verify your identity by requiring an additional code sent to your phone or email.

What is two-factor authentication?

400

This type of scam involves a fake social media profile that tries to trick you into giving away personal details or money.

What is a phishing scam?

400

This term describes the act of someone creating a fake online profile to deceive others, often for malicious purposes.

What is catfishing?

400

This security practice involves using different passwords for different accounts to prevent a breach from affecting multiple accounts.

What is using unique passwords?

400

This type of scam involves pretending to be a friend or family member in distress, asking for money or sensitive information.

What is an impersonation scam?

400

This is a general term for using security practices, like strong passwords and privacy settings, to protect your online information.

What is cybersecurity?

500

This feature lets you log into your social media account from a new device or location and is often used to verify your identity.

What is two-factor authentication?

500

This security measure involves regularly updating your software to protect against vulnerabilities that could be exploited by hackers.

What is keeping software up to date?

500

This action involves reporting suspicious or harmful activity to the social media platform to help protect yourself and others.

What is reporting inappropriate content?

500

This scam involves offering you something valuable for free, like a prize or gift, but requiring personal information to claim it.

What is a prize or giveaway scam?

500

This security measure involves periodically reviewing and updating your social media privacy settings to ensure they are still appropriate.

What is reviewing privacy settings?

M
e
n
u