What is the Recommended minimum length for a strong password?
8-12 Characters or More
What does phishing mean in cybersecurity?
Tricking someone into giving personal info
Why is 9/11 connected to changes in technology and cybersecurity?
It led to stronger security and surveillance measures
Should you click on links from unknown senders?
No, always verify first
What verse have we used all week
Matthew 10:16
Why should you avoid using the same password across multiple accounts/sites
If one is stolen, all are at risk
What is one common red flag in a phishing email?
Urgency, Suspicious links, spelling errors etc.
How did 9/11 highlight the importance of reliable communication in times of crisis?
Rumors spread fast, truth mattered
Why is oversharing on social media risky?
Can reveal personal info that scammers can use for scams or even identity theft
In the verse, what does shrewd as serpents teach us about online safety?
Be wise/discerning
What's better Password12345 or GiraffePizza2024
Emergency Alerts, Cybersecurity systems, extra surveillance inventions
What's one way to check if a website is secure
look for HTTPS or a padlock symbol
Act with integrity, don't spread harm
What is 2FA, and why is it important
2 factor authentication. Adds an extra step of security
What's the difference between Phishing and Spear-Phishing
How can lessons from 9/11 help us evaluate digital threats today
Stay vigilant, fact check, avoid panic
List 3 safe habits for protecting your digital life
Strong Passwords, 2FA, avoiding suspicious links, update software
How does biblical wisdom connect to cybersecurity in real life
Helps us balance caution with integrity
Why is the password MyDogEatsPurplePizza! often stronger than Xk$7p!?
First one is less prone to brute force attacks, causing natural complexity without being random gibberish
Hackers often use social engineering in phishing. What is this? How would it look online
Manipulation of human trust instead of just hacking tech. (Pretending to be a boss asking for gift cards, or a fake email from IT department asking for login credentials)
After 9/11 the U.S. passed new laws that expanded digital surveillance. What is one benefit and one risk
Benefit: improved ability to detect threats
Risk: increased government monitoring and potential for invasion of privacy
Imagine a new app asks for access to your contacts, camera, and location before you use it? What cybersecurity risks does this create, and what steps should you take before deciding to use it?
Risks: Data harvesting, surveillance, identity theft.
Steps: Research the app, check reviews, adjust your privacy settings, or avoid downloading if permissions are unnecessary
Matthew 10:16 tells us to be wise as serpents and innocent as doves. How does this dual mindset help us balance protecting ourselves online while also treating others with honesty and kindness
Wisdom: careful, skeptical, cautious
Innocence: acting ethically, not spreading misinformation, showing respect online.
Together it prevents carelessness and harmful behaviors