Online Safety
Phishing
CyberSecurity Principles
Malware
Operating Systems
100
Refers to any bullying that takes place through use of electronic technology.
What is cyber-bullying?
100
Received from a Nigerian prince via email asking you to give him bank account information so he can share the million dollars he has in an account that he must transfer somewhere to retrieve.
What is an email scam?
100
This leg of the CIA triad keeps data private.
What is Confidentiality?
100
This is a computer program that spreads or self-replicates and requires user interaction to activate.
What is a virus?
100
Most commonly used operating system. It is user-friendly and used in offices and homes
What is Microsoft Windows?
200

This type of information can contain any of the following: Student ID Number, Date of Birth, Email Address, Mailing Address, Credit Card Information, Social Security Number.

What is "Personally Identifiable Information (PII)"?

200

When telephones replace emails as the method of communication for phishing.

What is smishing?

200
This leg of the CIA triad validates that data remains in it's original state.
What is Integrity?
200
It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is deisgned to give hackers access to your computer or files.
What is a Trojan Horse?
200
Often open-source, meaning that anyone can use or modify the operating systems. Many different “flavors” or significantly varied operating systems.
What is Linux?
300
This should be done if you or one of your friends is a victim of cyber-bullying
What is report it to your parents or teacher?
300

Malicious emails sent to a specific person using known information, such as their name or place of employment

What is spear phishing?

300
This leg of the CIA triad ensures that data is there when you need it
What is Availability?
300
This malware can infect and spread without human assistance
What is a worm?
300
Distantly related to Linux operating systems. Generally more secure than Windows because malware is less likely to target non-Windows systems
What is MAC?
400
This is the person you should share your passwords with.
What is no one?
400

A targeted type of phishing as it goes after CEOs and authorities of large corporations

What is whaling?

400
When thieves sift through garbage for receipts with credit card information, medical forms with social security numbers, or other documents with PII.
What is dumpster diving?
400
Defined as programs that track where you go on the Internet.
What is spyware?
400
Is an environment, such as a program or operating system that does not physically exist, but is created within another environment
What is a virtual machine (VM)?
500
This icon appears in your browser address bar when the site is secure.
What is a lock?
500
This site can be used to verify if a file or website contains malware.
500
When someone looks over your shoulder as you type, to glean your passwords, account information, and other sensitive information.
What is Shoulder-Surfing?
500
This type of malware records everything you type into your keyboard.
What is a key-logger?
500
A software program used to create and run VMs
What is VMware?