Internet
Privacy
Cybersecurity
Cybercrime
Staying Safe Online
100

A global network that connects millions of computers and allows them to communicate.

the Internet

100

Your name, address, and birthdate are examples of this.

personal data

100

This process turns plain data into unreadable code.

encryption

100

A fake email that tricks you into giving personal info is an example of this.

phishing

100

How to make a strong password?

uses uppercase, numbers, and symbols

200

Which part of the internet is this: undersea cables, routers, and servers. 

physical parts of the Internet

200

These small text files track your behavior on websites.

cookies

200

This secure version of HTTP adds a padlock icon in the browser.

HTTPS

200

After clicking a suspicious link, your device may get infected with this.  

virus or malware

200

These updates fix bugs and patch security holes.

software updates

300

This protocol breaks data into packets so they can travel across networks.

TCP/IP?

300

When a website stores your browsing history and preferences, it may be a risk to this.

privacy

300

After receiving a security alert, you should update this and check your activity

your password (or account)

300

The Australian government records these to help track online scams.

scam statistics

300

You can reduce your online risks by managing this digital trail.

digital footprint

400

When you send an email from Australia to the US, your data travels through these systems

global routers and undersea cables

400

Comparing these documents for two different apps can show which one better protects your data.

privacy policies

400

This method of security requires your password plus a second code from another device

two-factor authentication

400

This type of malware locks your files and demands money to unlock them.

ransomware

400

A tool that creates and stores strong, unique passwords for each website.

password manager

500

This type of design connects a modem, router, and devices with specific protocols

network setup

500

These government guidelines help organizations handle data ethically in Australia.

Australian Privacy Principles (APPs)

500

These three tools work together to protect your network from threats.

firewalls, authentication, and encryption

500

A cybercriminal tricks someone into giving personal info by pretending to be a trusted source.

social engineering

500

Adjusting this on your social media limits who can see your posts and personal info

privacy settings