Social Media/Cyberbullying
Encryption
Malware/Phishing
CyberSafety in Gaming
100

Give an example of cyberbullying.

  • Sending messages to intimidate or threaten others

  • Spreading embarrassing messages, images, and videos of others with the intent to hurt them.

  • Making cruel/harmful remarks about individuals

  • Posting derogatory photos

100

Which concept of cryptography do hashes use?

Public Key Cryptography/ One way functions

100

How does a trojan virus disguise itself?

As a useful program.

100

Where should you download games from?

A trusted platform!

200

What is the first thing to do if you have been cyberbullied?

Tell a trusted adult!!!

200

What do hashes do?

They take a chunk of data of any size and produce a signature of fixed length.

200

How to prevent a virus from reproducing?

Use an antivirus!

200

What does DDoS stand for?

Distributed Denial of Service

300

What should you do if you know who is cyberbullying you?

Stop talking to the person and report it!

300

Name 2 situations where a hash may prove useful.

  • Cryptocurrency

  • Password verification

  • Making sure you downloaded the right file

300

Name 2 ways to prevent phishing scams.

•Find the link yourself

•Check the URL before logging in

•Never download files from sketchy websites

•Install an antivirus

300

What happens during a DoS/DDoS attack?

Unwanted traffic gets sent to the victim’s IP to overload it.

400

Approximately how many people have social media in the US?

250 MILLION!

400

If the hash for "abcdefghijklmnopqrstuvwxyz" has a signature of 26 characters, then how many characters will the hash of "abc" have?

26, as the signatures are of fixed length!

400

How many phishing scams were there in 2016?

- Ten!

- Over a thousand!

- Over a million!

- Over a billion!

Over a million!

400

What is "swatting"?

Falsely reporting authorities to a location

500

List 3 of the 5 big cons of social media.

-Cannot be entirely deleted

-Distributing information to an outside network

-Leads to depression, anxiety, and low self-esteem

-Distraction

-Hacking, online harassment, predators

500

Name 3 of the 5 presented encryption techniques/ciphers.

- Hill Cipher

- Affine Cipher

- AES-256

- Public Key Cryptography

- ROT-13

500

What's the difference between a virus and a worm?

The worm is a standalone program, whereas the virus needs to be attached to a file.

OR

The worm self-duplicates!


500

How to hide your personal information online? Name 3 ways.

  • Use a VPN

  • Don’t allow apps to share your IP Address(like Skype)

  • Utilize in-game messaging apps and minimize connections with third-party servers

  • Generally, use common sense, and keep your social media private

M
e
n
u