Social Engineering
Malware
Social Media and Chatrooms
Keeping You Safe
100

Online places where you are susceptible to social engineering (multiple).

What are email accounts, chatrooms, and any place you can receive messages or advertisements?

100

Any computer program designed to do harmful and unwanted things to the computer user, such as stealing your information.

What is malware?

100

Some of the social media platforms on which cyberbullying may occur (multiple).

What are Snapchat, Instagram, YouTube, and TikTok?

100

The only people you can (mostly) trust on the Internet.

Who are family members and close friends you have met in person?

200

Ways to identify an email scam (multiple).

What are suspicious email addresses, spelling and grammar mistakes, unfamiliar links, and asking for personal information?

200

Malware designed to copy itself and spread with human assistance in the form of email chains, attachments, shared files, spoof links, and more; also, a submicroscopic infectious agent.

What are viruses?

200

Things you must avoid posting on social media (multiple).

What are profanity, inappropriate clothing and actions, and offensive comments? Remember: anyone with the right knowledge will be able to see these posts even after they are deleted.

200

How long information stays on the Internet once it is posted.

What is forever?

300

Email scams in which someone attempts to gather personal or financial information (a type of social engineering).

What is phishing?

300

Malware designed to copy itself and spread entirely without human assistance, often going unnoticed; also, a dirty organism.

What are worms?

300

People you can talk to if you need help on social media (multiple).

Who are trusted adults (e.g., parents, teachers, family members)?

300

Qualifications of a strong password (multiple).

What are making them hard to guess but easy to remember, including different types of characters, and having a length of at least 8 characters?

400

Fake scenarios set up by attackers to steal information (a type of social engineering).

What is pretexting?

400

Software designed to appeal to the user, but secretly contain hidden malware; also, a sneaky maneuver that may be in your history book.

What is a Trojan Horse?

400

What you should never do in chatrooms (multiple).

What are sharing photos of yourself, opening links or attachments, and meeting in real life?

400

The type of information which you should never reveal online.

What is Personally Identifiable Information (name, age, address, phone number, credit card number, etc.)?

500

Promising something you want in exchange for information (a type of social engineering).

What is baiting?

500

Softwares you can install to block incoming viruses, remove existing viruses, and/or block losing your outgoing data (2).

What are anti-malware software and firewalls?

500

Type of chatroom you should always remain in; also, the type of social media account that claims to maintain secrecy, but does not entirely do so.

What is public? Private chatrooms require invites and give access between just you and another unknown person. Be careful of what you post on private social media accounts.

500

Some of the many cybersecurity professionals who are dedicated to keeping you safe online (multiple).

Who are Cybersecurity Analysts, Computer Programmers, Computer Network Architects, Security Consultants/Developers/Engineers?