A hostile software that is made to damage a computer
The act of creating a fake online identity to deceive others, often for fraudulent or harmful purposes.
What is catfishing
A student gets messages from someone who says they are 15. The person asks for money, but never agrees to meet up in person, or to video call.
What is an example of catfishing
The trial of data a person leaves behind while using the internet.
Digital foot print
A fraudulent attempt to steal sensitive information, such as passwords or credit card numbers, by pretending to be a trustworthy entity.
what is phishing
A type of malware that locks users out of their device or encrypts their files, demanding payment to restore access.
What is ransomware
A program that is designed to be able to damage or gain unauthorized access to someone's system
Spyware
Has more than 10 letters, has numbers, has symbols, and uppercase and lower case letters.
What is the contents of a strong password
A student is constantly getting threatening messages and emails from his peers
What is an example of cyberbullying
To keep doing something over and over to irritate people
Spam
The trail of data a person leaves behind while using the internet.
Digital footprint
Stop communication, report, block, and tell a trusted adult
What is defense against catfishing.
A piece of code that had the ability to copy itself and has a harmful effect.
Virus
Colleges, employers, and even friends or family may search for you online. Ensuring your digital footprint reflects your best self can help create positive impressions.
What is why it is important to manage your digital footprint.
Unwilling to contact in person, inconstant stories, and request for money, or personal information.
What is catfishing warning signs