Vocab
Privacy
Safe Habit
Scenarios
General CSP
General Knowledge
100

Data you leave behind whenever you use the internet.

Digital Footprint


100

What types of information do people commonly overshare on social media that attackers find valuable?

Relationships, Personal Information, Locations

100

Gavin shares on Instagram his current location and tags everyone he is with. What vocab term is this?

Oversharing

100

How many different numbers can you represent with 5 bits.

32 numbers.

100

Which blood type is a universal donor? 

O Negative

200

Sharing too much information about someone's or your personal life.

Oversharing

200

What is OSINT and how would an attacker use public social media profiles to target someone?

 Open-source intelligence is where you gather information and include social media platforms. Hackers use it to collect information on people, so they can target that with more personal attacks.  

200

Kevin goes to his settings in Tik Tok to manage what personal information is given. What vocab term is this?

Privacy Settings

200

The separation of a program into independent modules that are each responsible for one aspect of the program's functionality.

Modularity

200

What is the largest country in the world?

Russia

300

Stealing someone's personal information to impersonate them.

Identity Theft

300

How can photo metadata (EXIF data) reveal your location without you knowing?

Hidden information in EXIF data of an image can show hackers where you are which can be used to track you in real life. It can reveal spots you frequent or even your home address.

300

Karen leaves a comment on a video. What vocab term is this?

Digital Footprint

300

The repetition of steps in an algorithm or program for a certain amount of times or until a certain condition is met.

Iteration

300

In 1863, what memorable speech did Abraham Lincoln give during the dedication of the Soldiers’ National Cemetery?

The Gettysburg Address 

400

Psychological manipulation into preforming actions or giving confidential information/data.

Social Engineering

400

What are the most important privacy settings on Instagram, TikTok, or Snapchat — and what do they actually do?

On Instagram and TikTok you can make your account private and can limit who can follow you and who can see your content.

400

Grandma Jane receives an AI generated call with her granddaughters voice telling her she needs $1000. What vocab term is this?

Social Engineering

400

Famous undecidable problem proved by Alan Turing.

Halting Problem.

400

What is Avogadro's Number?

6.022 x 10^23

500

Collecting and using publicly available information for decision making in business, security, and research.

Open Source Intelligence (OSINT)

500

How can attackers use information from social media to guess security questions or reset passwords?

Attackers can use information from your personal life and following on social media to guess security questions like “What is your mother's maiden name?” or “What is your childhood pets name?” Answers to these questions can easily be found on social media and then be used to access your information.

500

 Sara trusts her friend Mina a lot so, she sends her credit card information through Instagram DM's to treat Mina for her birthday. True or False. Is this a safe Social Media Practice?

False

500

Who are the co-creators of the Internet?

Vint Cerf and Bob Kahn

500

What is the longest river in Europe?

Volga