Give an example of cyberbullying.
Sending messages to intimidate or threaten others
Spreading embarrassing messages, images, and videos of others with the intent to hurt them.
Making cruel/harmful remarks about individuals
Posting derogatory photos
Which concept of cryptography do hashes use?
Public Key Cryptography/ One way functions
How does a trojan virus disguise itself?
As a useful program.
Where should you download games from?
A trusted platform!
What is the first thing to do if you have been cyberbullied?
Tell a trusted adult!!!
What do hashes do?
They take a chunk of data of any size and produce a signature of fixed length.
How to prevent a virus from reproducing?
Use an antivirus!
What does DDoS stand for?
Distributed Denial of Service
What should you do if you know who is cyberbullying you?
Stop talking to the person and report it!
Name 2 situations where a hash may prove useful.
Cryptocurrency
Password verification
Making sure you downloaded the right file
Name 2 ways to prevent phishing scams.
•Find the link yourself
•Check the URL before logging in
•Never download files from sketchy websites
•Install an antivirus
What happens during a DoS/DDoS attack?
Unwanted traffic gets sent to the victim’s IP to overload it.
Approximately how many people have social media in the US?
250 MILLION!
If the hash for "abcdefghijklmnopqrstuvwxyz" has a signature of 26 characters, then how many characters will the hash of "abc" have?
26, as the signatures are of fixed length!
How many phishing scams were there in 2016?
- Ten!
- Over a thousand!
- Over a million!
- Over a billion!
Over a million!
What is "swatting"?
Falsely reporting authorities to a location
List 3 of the 5 big cons of social media.
-Cannot be entirely deleted
-Distributing information to an outside network
-Leads to depression, anxiety, and low self-esteem
-Distraction
-Hacking, online harassment, predators
Name 3 of the 5 presented encryption techniques/ciphers.
- Hill Cipher
- Affine Cipher
- AES-256
- Public Key Cryptography
- ROT-13
What's the difference between a virus and a worm?
The worm is a standalone program, whereas the virus needs to be attached to a file.
OR
The worm self-duplicates!
How to hide your personal information online? Name 3 ways.
Use a VPN
Don’t allow apps to share your IP Address(like Skype)
Utilize in-game messaging apps and minimize connections with third-party servers
Generally, use common sense, and keep your social media private