Malicious software designed to damage or disrupt a computer system, or steal information.
Malware
What is the trail of data a person leaves behind while using the internet?
Digital footprint.
What type of scam involves pretending to be someone you are not to deceive others, often online?
Catfishing.
What is bullying that takes place over digital devices such as smartphones or computers?
Cyberbullying.
What is the term for malicious software that locks users out of their files and demands payment to restore access?
Ransomware.
What security process requires two forms of identification to access an account?
Two-factor authentication.
What do we call unsolicited and irrelevant messages, often sent in bulk via email?
Spam.
Why is managing your digital footprint important for future employment?
Employers may check your online presence as part of the hiring process.
What type of software secretly collects information about a user's activities?
Spyware.
What software helps protect against malware by detecting and removing it?
Anti-virus software.
What scam involves sending fake emails or messages to trick individuals into sharing personal information?
Phishing.
What should you do if you experience cyberbullying?
Talk to a trusted adult and save evidence of the bullying.
What are 3 examples of phishing (Think about three different places where phishing can occur)
Emails
Texts
Social Media
Websites
Job offers
What technology encrypts internet connections to protect user privacy and data from hackers?
Virtual Private Network (VPN).
How can you identify a phishing email? 2 DIFFERENT WAYS
Check for poor grammar, strange email addresses, and suspicious links.
What can happen if you overshare personal information online?
It can lead to identity theft, cyberbullying, or privacy violations.
What tool does spyware use to track every key pressed on your keyboard to steal passwords and other sensitive data?
Keylogger.
What should you regularly do to protect your data from being lost in a ransomware attack?
Backup important files.
What scam involves fake online stores that offer discounts but never deliver the purchased items?
Fake online store scam.
What is the term for the permanent trail of data that can never be fully erased once it’s online?
Digital footprint.