Cyber Bullying basics
Responding to Cyber bullying
Staying safe online
Cybersecurity 101
Advanced Cybersecurity
100

Using digital devices to harass, threaten, or humiliate someone.

What is Cyber bullying?

100

What is the first thing you should do if you are being bullied online?

What is telling a trusted adult and reporting it.

100

What should you do before clicking a link in an email?

What is hovering over it and check it's legitimate?

100

A secret code to access accounts

What is a password?

100

A scam where you are tricked into giving up personal information.

What is phishing?

200

Using fake accounts with different names.

What is hiding their identity?

200

What should you do instead of replying to a cyberbully?

What is taking screenshots for evidence and blocking them?

200

A tool that helps store passwords.

What is a password manager?

200

A type of software that protects your device from malware and viruses.


What is Antivirus software?

200

An online attack that overwhelms a website with traffict to shut it down.

What is a Distributed Denial-of-Service attack?

300

Repeatedly sends mean or threatening messages online.

What is online harassment?

300

Beyond Blue, Headspace, Reach Out Australia, Kids Helpline, and eSafety Commissioner.

What are Websites that can help you if you are being cyber bullied?

300

Messages that are too good to be true, contain urgent language, or have strange links.

What are warning signs of a phishing/ scam email?

300

Type of network(internet) unsafe for sensitive tasks like online banking.

What is Public Wi-Fi?

300

A secure method of login requiring 2 or more proofs of identity.

What is 2FA and Multi-factor authentication?

400

Posting embarrassing or false information about others.

What is doxxing and cyber stalking?
400

Anxiety, depression, low self-esteem, and isolation.

What are emotional effects of Cyber bullying?

400

Personal information you should avoid posting online?

Your address, phone number, or other sensitive details.

400

The process of turning data into code to prevent unauthorized access.

What is Encryption?

400

Malicious software that secretly collects data from your device

What is Spyware?

500

Pretending to be someone else online to bully and or deceive.

What is catfishing?

500

A sign of encryption on a website.

What is HTTPS?

500

An ethical hacker that uses their skills for good to test for network vulnerabilities and to increase security.

What is a White Hat Hacker?