Cyberbullying
Threats
Viruses
100

Majority of people cyberbully rather than in person mainly for this reason.

Why is it is easier than bullying the victim face-to-face.

100

When you join a public hotspot and the person in control of the hotspot uses your connection to the hotspot to steal your information.

What is fake hotspotting?

100

Used to spread e-mail spam and launch distributed denial-of-service (DDoS) attacks.

What are Botnets?

200

Law officials are involved in less than 1 in 5 cases of cyberbullying. The reason this is happening because teens and children do not do this.

What is tell an adult?

200

By looking over your shoulder as you type, thieves can glean your passwords, account information, and other sensitive information.

What is shoulder surfing?

200

Malware that is often disguised as legitimate software.

What is a Trojan horse?

300

This is one of the extreme effects of cyberbullying.

What is suicide?

300

When a person sends an email saying you won a prize or money.

What is a Nigerian prince?

300

Controlled under remote direction to perform criminal tasks, as well as infect other computers with viruses.

What are Zombies?

400

This is the most common device for cyberbullying.

What is a cell phone?

400

Thieves sift through garbage for receipts with credit card information, medical forms with social security numbers, or other documents with personally identifiable information (PII).

What is dumpster diving?

400

Records instant messages, e-mail, and any information you type at any time using your keyboard.

What is a Keylogger?

500

List at least two examples of cyberbullying.

Mean texts and emails, rumors spread by social networking, embarrassing pictures, etc.

500

When you plug your phone into a public outlet that has been tampered with to steal all of your information from your phone.

What is juice jacking?

500

Malware computer programs that replicate themselves in order to spread to other computers. 

What are worms?

M
e
n
u