Passwords
Phishing
Online Safety
Cyberbullying
Internet Safety
100

What is a password?

A password is a secret combination of characters used to gain access to a secure system, such as an online account or computer.

100

What is phishing?

Phishing is a cyberattack technique used by cybercriminals to trick individuals into providing sensitive information, such as usernames, passwords, credit card numbers, or other personal information, by masquerading as a trustworthy entity in an electronic communication.

100

Why is it important to keep your personal information private online?

It is important to keep personal information private online because sharing sensitive information such as full name, address, phone number, or financial details can make individuals vulnerable to identity theft, fraud, or cyberstalking.

100

What is cyberbullying

Cyberbullying refers to the use of electronic communication devices, such as smartphones, computers, or tablets, to harass, intimidate, or harm others. This can include sending threatening messages, spreading rumors, sharing embarrassing photos or videos, or impersonating someone online with the intent to cause harm.

100

What does 'Internet Safety' mean?

Internet Safety refers to the practice of protecting oneself and others from online risks and dangers while using the internet. It involves being aware of potential threats such as cyberbullying, identity theft, malware, and scams, and taking steps to stay safe online

200

True or False: "123456" is a strong password.

False. "123456" is not a strong password as it is easily guessable and lacks complexity.

200

How can you recognize a phishing email?

Phishing emails often contain suspicious elements such as:

  • Spelling or grammatical errors.
  • Urgent requests for personal information.
  • Requests for sensitive information via email.
  • Suspicious sender email addresses or URLs.
200

What does it mean to "think before you click"?

"Think before you click" means to pause and consider the potential consequences before clicking on links, downloading files, or sharing information online. It involves being cautious and aware of potential risks such as phishing scams, malware, or unauthorized access to personal information.

200

What are three examples of cyberbullying behavior?

  1. Sending mean or threatening messages via email, social media, or text.
  2. Posting hurtful comments or rumors about someone on social media platforms.
  3. Sharing or forwarding private or embarrassing photos or videos without permission.
200

What is the golden rule of internet safety

The golden rule of internet safety is to never share personal information online with strangers or on unsecured websites. Personal information includes details such as full name, address, phone number, email address, passwords, and financial information.

300

Why is it recommended to use a combination of uppercase letters, lowercase letters, numbers, and symbols in a password rather than just using a single word?

It is recommended to use a combination of uppercase letters, lowercase letters, numbers, and symbols in a password because it increases the complexity of the password, making it harder for attackers to guess or crack through brute force methods.

300

What should you do if you receive a suspicious email asking for your personal information?

  • Avoid clicking on any links or downloading attachments.
  • Verify the legitimacy of the request through other means (e.g., contacting the organization directly).
  • Report the suspicious email to your email provider and delete it from your inbox.
300

What are some ways you can verify the credibility of information you find online?

  • Checking the source: Verify the credibility of the website or author by researching their credentials and reputation.
  • Cross-referencing information: Look for multiple sources to confirm the accuracy and reliability of the information.
  • Evaluating the quality of information: Assess the objectivity, accuracy, and relevance of the information provided.
300

Why is it important to report cyberbullying incidents to a trusted adult or authority figure?

  • They can provide support and guidance on how to handle the situation.
  • They can intervene to stop the cyberbullying and prevent further harm.
  • Reporting helps to document the incident and may lead to appropriate consequences for the cyberbully.
300

Name three tips for creating strong passwords.

  1. Use a mix of uppercase letters, lowercase letters, numbers, and special characters.
  2. Make passwords long and complex, ideally 8 characters or more.
  3. Avoid using easily guessable information such as common words, birthdays, or sequential numbers.
400

List three characteristics of a strong password.

  1. Length: A strong password should be at least 8 characters long, preferably longer.
  2. Complexity: It should include a mix of uppercase letters, lowercase letters, numbers, and special symbols.
  3. Unpredictability: It should not contain easily guessable patterns or words.
400

 What are some common phishing tactics used by cybercriminals?

  • Email spoofing: Faking the sender's email address to appear as a trusted source.
  • Deceptive links: Embedding malicious links disguised as legitimate URLs.
  • Spear phishing: Customizing phishing attempts based on specific individuals or organizations.
  • Clone phishing: Creating a replica of a legitimate email or website to deceive recipients.
400

How can you stay safe while using public Wi-Fi networks?

  • Avoid accessing sensitive information such as online banking or shopping accounts.
  • Use a virtual private network (VPN) to encrypt your internet connection and protect your data from potential eavesdropping or hacking.
  • Ensure that your device's firewall and antivirus software are up-to-date to protect against malware and other cyber threats.
400

Describe two ways you can support someone who is being cyberbullied.

  1. Offer emotional support: Listen to the victim's feelings without judgment, reassure them that they are not alone, and encourage them to talk about their experiences.
  2. Help them take action: Assist the victim in documenting evidence of the cyberbullying, blocking or reporting the cyberbully on social media platforms, and seeking help from trusted adults or authorities.
400

Why is it important to think before sharing personal information online?

  • Personal information can be misused by cybercriminals for identity theft, fraud, or cyberstalking.
  • Once shared online, personal information can be difficult to remove or control, potentially leading to privacy breaches and reputation damage.
  • Sharing too much personal information online can make individuals vulnerable to online predators, cyberbullies, and scams.
500

What is two-factor authentication, and why is it beneficial for account security?

Two-factor authentication (2FA) is a security measure that requires users to provide two different authentication factors to verify their identity. These factors typically include something the user knows (like a password) and something the user has (like a code sent to their phone). 2FA enhances account security by adding an extra layer of protection, making it more difficult for unauthorized users to gain access to accounts, even if they have obtained the password.

500

What are some common signs that an email might be a phishing attempt, and how can individuals protect themselves from falling victim to such attacks?

  • Unexpected requests for personal or financial information.
  • Urgent or threatening language designed to create a sense of panic.
  • Suspicious sender email addresses or domain names. To protect themselves, individuals can:
  • Verify the sender's identity by contacting the organization directly.
  • Avoid clicking on links or downloading attachments from suspicious emails.
  • Enable two-factor authentication for added account security.
  • Keep their antivirus and security software up-to-date to detect and prevent phishing attacks.
500

Describe two strategies for protecting yourself from cyberbullying.

  • Setting privacy settings: Adjust privacy settings on social media accounts and other online platforms to control who can see your posts and contact you.
  • Being mindful of online behavior: Avoid engaging with or responding to cyberbullies, block or report abusive users, and seek support from trusted adults or friends if you experience cyberbullying.
500

Explain how you can respond if you witness cyberbullying happening online.

  • Not participating: Refrain from liking, sharing, or commenting on the harmful content, as this can further perpetuate the cyberbullying.
  • Standing up for the victim: Speak out against the cyberbullying behavior by commenting that it is not acceptable and offering support to the victim.
  • Reporting the incident: Use the reporting tools available on social media platforms or websites to notify moderators or administrators about the cyberbullying. Additionally, inform a trusted adult or authority figure about what you have witnessed
500

What should you do if you encounter suspicious activity or content while browsing the internet?

  • Stop interacting with the suspicious content or website immediately.
  • Report the suspicious activity or content to the appropriate authorities or website administrators.
  • Avoid clicking on any links or downloading any files associated with the suspicious activity.
  • If necessary, inform a trusted adult or authority figure about what you have encountered.