Cyber Threats
Protecting Personal Information
Online Scams
Cyberbullying and Online Behavior
100

Malicious software designed to damage or disrupt a computer system, or steal information.

Malware 

100

What is the trail of data a person leaves behind while using the internet?

Digital footprint.

100

What type of scam involves pretending to be someone you are not to deceive others, often online?

Catfishing.

100

What is bullying that takes place over digital devices such as smartphones or computers?

Cyberbullying.

200

What is the term for malicious software that locks users out of their files and demands payment to restore access?

Ransomware.

200

What security process requires two forms of identification to access an account?

Two-factor authentication.

200

What do we call unsolicited and irrelevant messages, often sent in bulk via email?

Spam.

200

Why is managing your digital footprint important for future employment?

Employers may check your online presence as part of the hiring process.

300

What type of software secretly collects information about a user's activities?

Spyware.

300

What software helps protect against malware by detecting and removing it?

Anti-virus software.

300

What scam involves sending fake emails or messages to trick individuals into sharing personal information?

Phishing.

300

What should you do if you experience cyberbullying?

Talk to a trusted adult and save evidence of the bullying.

400

What are 3 examples of phishing (Think about three different places where phishing can occur)

Emails

Texts

Social Media

Websites

Job offers

400

What technology encrypts internet connections to protect user privacy and data from hackers?

Virtual Private Network (VPN).

400

How can you identify a phishing email? 2 DIFFERENT WAYS 

Check for poor grammar, strange email addresses, and suspicious links.

400

What can happen if you overshare personal information online?

It can lead to identity theft, cyberbullying, or privacy violations.

500

What tool does spyware use to track every key pressed on your keyboard to steal passwords and other sensitive data?

Keylogger.

500

What should you regularly do to protect your data from being lost in a ransomware attack?

Backup important files.

500

What scam involves fake online stores that offer discounts but never deliver the purchased items?

Fake online store scam.

500

What is the term for the permanent trail of data that can never be fully erased once it’s online?

Digital footprint.