Passwords + Protection
Phishing + Scams
Cyber security + 9/11
Safe Online Habits
Scripture + Cyber Wisdom
100

What is the Recommended minimum length for a strong password?

8-12 Characters or More

100

What does phishing mean in cybersecurity?

Tricking someone into giving personal info

100

Why is 9/11 connected to changes in technology and cybersecurity?

It led to stronger security and surveillance measures

100

Should you click on links from unknown senders?

No, always verify first

100

What verse have we used all week

Matthew 10:16

200

Why should you avoid using the same password across multiple accounts/sites

If one is stolen, all are at risk

200

What is one common red flag in a phishing email?

Urgency, Suspicious links, spelling errors etc.

200

How did 9/11 highlight the importance of reliable communication in times of crisis?

Rumors spread fast, truth mattered


200

Why is oversharing on social media risky?

Can reveal personal info that scammers can use for scams or even identity theft

200

In the verse, what does shrewd as serpents teach us about online safety?

Be wise/discerning

300

What's better Password12345 or GiraffePizza2024

GiraffePizza2024
300
If you get a text saying you've won a prize, what is the safest thing to do?
Ignore/Delete/Report as Spam
300
What kinds of digital innovations increased after 9/11

Emergency Alerts, Cybersecurity systems, extra surveillance inventions

300

What's one way to check if a website is secure

look for HTTPS or a padlock symbol

300
What does innocent as doves mean for our online behavior

Act with integrity, don't spread harm

400

What is 2FA, and why is it important

2 factor authentication. Adds an extra step of security 

400

What's the difference between Phishing and Spear-Phishing

General scam vs highly targeted scam
400

How can lessons from 9/11 help us evaluate digital threats today

Stay vigilant, fact check, avoid panic

400

List 3 safe habits for protecting your digital life

Strong Passwords, 2FA, avoiding suspicious links, update software

400

How does biblical wisdom connect to cybersecurity in real life

Helps us balance caution with integrity

500

Why is the password MyDogEatsPurplePizza! often stronger than Xk$7p!?

First one is less prone to brute force attacks, causing natural complexity without being random gibberish

500

Hackers often use social engineering in phishing. What is this? How would it look online

Manipulation of human trust instead of just hacking tech. (Pretending to be a boss asking for gift cards, or a fake email from IT department asking for login credentials)

500

After 9/11 the U.S. passed new laws that expanded digital surveillance. What is one benefit and one risk

Benefit: improved ability to detect threats

Risk: increased government monitoring and potential for invasion of privacy

500

Imagine a new app asks for access to your contacts, camera, and location before you use it? What cybersecurity risks does this create, and what steps should you take before deciding to use it?

Risks: Data harvesting, surveillance, identity theft.

Steps: Research the app, check reviews, adjust your privacy settings, or avoid downloading if permissions are unnecessary

500

Matthew 10:16 tells us to be wise as serpents and innocent as doves. How does this dual mindset help us balance protecting ourselves online while also treating others with honesty and kindness

Wisdom: careful, skeptical, cautious

Innocence: acting ethically, not spreading misinformation, showing respect online.

Together it prevents carelessness and harmful behaviors