What is a password?
A password is a secret combination of characters used to gain access to a secure system, such as an online account or computer.
What is phishing?
Phishing is a cyberattack technique used by cybercriminals to trick individuals into providing sensitive information, such as usernames, passwords, credit card numbers, or other personal information, by masquerading as a trustworthy entity in an electronic communication.
Why is it important to keep your personal information private online?
It is important to keep personal information private online because sharing sensitive information such as full name, address, phone number, or financial details can make individuals vulnerable to identity theft, fraud, or cyberstalking.
What is cyberbullying
Cyberbullying refers to the use of electronic communication devices, such as smartphones, computers, or tablets, to harass, intimidate, or harm others. This can include sending threatening messages, spreading rumors, sharing embarrassing photos or videos, or impersonating someone online with the intent to cause harm.
What does 'Internet Safety' mean?
Internet Safety refers to the practice of protecting oneself and others from online risks and dangers while using the internet. It involves being aware of potential threats such as cyberbullying, identity theft, malware, and scams, and taking steps to stay safe online
True or False: "123456" is a strong password.
False. "123456" is not a strong password as it is easily guessable and lacks complexity.
How can you recognize a phishing email?
Phishing emails often contain suspicious elements such as:
What does it mean to "think before you click"?
"Think before you click" means to pause and consider the potential consequences before clicking on links, downloading files, or sharing information online. It involves being cautious and aware of potential risks such as phishing scams, malware, or unauthorized access to personal information.
What are three examples of cyberbullying behavior?
What is the golden rule of internet safety
The golden rule of internet safety is to never share personal information online with strangers or on unsecured websites. Personal information includes details such as full name, address, phone number, email address, passwords, and financial information.
Why is it recommended to use a combination of uppercase letters, lowercase letters, numbers, and symbols in a password rather than just using a single word?
It is recommended to use a combination of uppercase letters, lowercase letters, numbers, and symbols in a password because it increases the complexity of the password, making it harder for attackers to guess or crack through brute force methods.
What should you do if you receive a suspicious email asking for your personal information?
What are some ways you can verify the credibility of information you find online?
Why is it important to report cyberbullying incidents to a trusted adult or authority figure?
Name three tips for creating strong passwords.
List three characteristics of a strong password.
What are some common phishing tactics used by cybercriminals?
How can you stay safe while using public Wi-Fi networks?
Describe two ways you can support someone who is being cyberbullied.
Why is it important to think before sharing personal information online?
What is two-factor authentication, and why is it beneficial for account security?
Two-factor authentication (2FA) is a security measure that requires users to provide two different authentication factors to verify their identity. These factors typically include something the user knows (like a password) and something the user has (like a code sent to their phone). 2FA enhances account security by adding an extra layer of protection, making it more difficult for unauthorized users to gain access to accounts, even if they have obtained the password.
What are some common signs that an email might be a phishing attempt, and how can individuals protect themselves from falling victim to such attacks?
Describe two strategies for protecting yourself from cyberbullying.
Explain how you can respond if you witness cyberbullying happening online.
What should you do if you encounter suspicious activity or content while browsing the internet?