What is personally identifiable information (PII)?
What is phishing?
What is encryption?
The process of encoding data so only authorized parties can read it.
What is a digital footprint?
If you get a suspicious email with a link, what should you do?
Don’t click the link; verify the sender first.
What is data privacy?
Define “malware.”
What is a key in encryption?
A piece of information used to encrypt and decrypt messages.
Give one example of an active digital footprint.
Why is it risky to use public Wi-Fi for banking?
Public Wi-Fi is often unsecured, making it easier for hackers to intercept data.
Name one way websites collect user data.
What is a denial-of-service (DoS) attack?
What’s the difference between symmetric and asymmetric encryption?
Symmetric uses the same key for encryption/decryption; asymmetric uses a public/private key pair.
What is an example of a passive digital footprint?
What should you do if a website asks for unnecessary personal information?
Don’t provide it; check if it’s required or look for a privacy policy.
What is the purpose of a privacy policy?
What is social engineering in cybersecurity?
What is SSL used for?
How can you reduce your digital footprint?
What’s a strong password characteristic?
Long, uses a mix of letters, numbers, and symbols.
Explain the concept of data aggregation.
Give one example of a weak password.
Why is end-to-end encryption important?
Why should you care about your digital footprint?
If your account is hacked, what are two immediate steps you should take?
Change your password and enable two-factor authentication; notify the service provider.