What kind of information should you never share with anyone?
What is Sensitive Data?
This is when someone uses a fake online profile to trick you.
What is Catfishing?
The fastest way to end unwanted contact; you should do this immediately.
What is Blocking?
This flag is raised if an email threatens you or tells you to act "in the next 10 minutes" or else.
What is Urgency & Fear?
This essential security measure should be a mix of upper/lower case letters, numbers, and symbols.
What is Strong Password?
Profile audits involve regularly checking your online profiles for anything that could give someone clues about ______________.
What is Your Location?
The tactic of giving too much affection or attention too quickly in a new relationship.
What is Love Bombing?
The Defense step that means taking a picture of any threatening messages before cutting contact.
What is Screenshotting (or Documentation)?
This flag is raised if an email says you've won an amazing prize you never signed up for.
What is Too Good to Be True?
This adds a second step, like a code texted to your phone, after you enter your password.
What is Two-factor Authentication?
This concept warns that info shared on a gaming app can be used to target you on a dating app because of weak boundaries.
What are Porous Boundaries?
The criminal act of building a relationship with a minor online to gain trust before potential exploitation or abuse.
What is Grooming?
What is something you should give yourself before you meet someone in person after meeting them online?
What is Time?
This flag is raised if the email's domain or sender's name looks misspelled or weird.
What is Suspicious Sender?
The setting you use on social media to ensure only people you approve can see your posts.
What is Privacy Settings?
The important reminder that once something is posted online, it can last forever.
What is Digital Permanence?
This is a Red Flag that involves someone being inconsistent or pressuring you to move too fast.
What is High Pressure?
The idea that you must always be allowed to change your mind and say "no," even if you said "yes" before.
What is Continuous Consent?
This flag is raised if a message asks you to reply with your password or Social Security Number.
What is Requests Sensitive Info?
The main danger of using this type of internet connection is that your data can be easily stolen by hackers on the same network.
What is Public Wi-Fi?
What is Blocked?
In today's class example, what photo application was exploited by the cyberstalker to discover the victim's address?
What is Tinder?
Sending your friend your live location and establishing a secret code word for an emergency are key parts of this plan.
What is a Contingency Plan (or Exit Strategy)?
This flag is raised if a message demands you pay only with gift cards or cryptocurrency.
What is Unusual Payment?
The act of repeatedly watching, bothering, or threatening someone through electronic communication.
What is Cyberstalking?