Cybersecurity Basics
Protecting Personal Information
Safe Internet Practices
Phishing
100

What should you create to keep your online accounts safe, and it's better if it's a mix of different characters like letters and numbers?

Password

100

What's it called when someone pretends to be you and uses your information without your permission?

Identity Theft

100

How can you make sure a website is safe to use before you give them your information?

Check for a Lock (or Padlock)

100

What is the fraudulent practice of sending fake emails to trick individuals into revealing personal information or login credentials?

Phishing

200

To stay safe online, what should you do when your computer or phone asks to fix or improve itself?

Update (or Install Updates)

200

How can you make sure no one can easily read your messages or files on your computer screen while you are away?

Lock computer before walking away. 

200

What kind of program can help keep your computer safe from bad stuff on the internet?

Antivirus

200

What term is used for a phishing attack that specifically targets a specific person or group within an organization?

Spear Phishing

300

When you get too many messages or requests from people you don't know, what's that called?

Spam

300

If you're not sure whether a phone call or email asking for your information is legitimate, what should you do?

Verify It

300

What technology can you use to make your internet connection more secure and private when browsing online?

VPN

300

What is the term for a website that looks legitimate but is designed to steal your personal information?

Phishing Website

400

What should you use to remember your personal passwords, rather than writing them down where others can find them?

Password Manager

400

What's the name for a secure, locked box or drawer where you can store important documents and items that contain your personal information? 

Safe

400

Why might people use a VPN when connecting to public Wi-Fi networks in places like cafes or airports?

Secure Connection

400

What's the practice of not clicking on QR codes or links received in unsolicited emails to avoid potential phishing?

Email Safety

500

What's the term for the unauthorized access to someone's computer or network with malicious intent?

Hacking

500

When you're finished using a public computer, what should you make sure to do to protect your personal information?

Log Out

500

Why is it crucial to use a strong, unique password for each online account?

Using strong, unique passwords helps protect your accounts from hackers.

500

In phishing emails, what famous company's name is often used to trick you into giving away your information?

Microsoft, Google, Facebook, etc..