Data & Privacy
Cybersecurity Threats
Encryption & Security
Digital Footprints
Real-World Scenarios
100

What is personally identifiable information (PII)?

  • Information that can be used to identify a person (e.g., name, address, SSN).


100

What is phishing?

  • A scam to trick users into revealing personal information via fake messages or websites.


100

What is encryption?
 

The process of encoding data so only authorized parties can read it.

100

What is a digital footprint?

  • The record or trail left by the things you do online.


100

If you get a suspicious email with a link, what should you do?
 

Don’t click the link; verify the sender first.

200

What is data privacy?

  • Protecting personal information from unauthorized access.


200

Define “malware.”

  • Malicious software designed to harm, exploit, or otherwise compromise a computer system.


200

What is a key in encryption?

A piece of information used to encrypt and decrypt messages.

200

Give one example of an active digital footprint.

  • Posting on social media, filling out online forms.


200

Why is it risky to use public Wi-Fi for banking?

Public Wi-Fi is often unsecured, making it easier for hackers to intercept data.

300

Name one way websites collect user data.

  • Cookies, registration forms, surveys, tracking pixels, etc.


300

What is a denial-of-service (DoS) attack?

  • An attack that overwhelms a system, making it unavailable to users.


300

What’s the difference between symmetric and asymmetric encryption?

Symmetric uses the same key for encryption/decryption; asymmetric uses a public/private key pair.

300

 What is an example of a passive digital footprint?

  • Websites tracking your browsing history without you explicitly providing info.


300

What should you do if a website asks for unnecessary personal information?
 

Don’t provide it; check if it’s required or look for a privacy policy.

400

 What is the purpose of a privacy policy?

  • To inform users how their data is collected, used, and protected.


400

What is social engineering in cybersecurity?

  • Manipulating people into giving up confidential information.


400

What is SSL used for?

  • Securing data transmitted between web browsers and servers.


400

How can you reduce your digital footprint?

  • Adjust privacy settings, delete old accounts, use incognito mode, etc.


400

What’s a strong password characteristic?
 

Long, uses a mix of letters, numbers, and symbols.

500

 Explain the concept of data aggregation.

  • Combining data from multiple sources to reveal patterns or trends.


500

 Give one example of a weak password.

  • "123456", "password", "qwerty", etc.


500

 Why is end-to-end encryption important?

  • It ensures data can only be read by the sender and intended recipient.


500

Why should you care about your digital footprint?

  • It can affect your reputation, privacy, and opportunities.


500

If your account is hacked, what are two immediate steps you should take?
 

Change your password and enable two-factor authentication; notify the service provider.

M
e
n
u