Protect Your Data
Who’s Watching You?
Social Media Secrets
Hackers & Scammers
The Privacy Toolkit
100

This security feature requires a second form of authentication, like a text message or app code.

What is two-factor authentication (2FA)?

100

Websites use these small files to track your activity across the internet.

What are cookies?

100

Changing these settings on your social media accounts can limit who sees your posts and personal info.

What are privacy settings?

100

An email that looks like it’s from a trusted source but is designed to steal your personal data.

What is a phishing email?

100

A service that hides your IP address by routing your traffic through encrypted servers.

What is a VPN (Virtual Private Network)?

200

A that stores and encrypts your passwords so you don’t have to remember them all.

What is a password manager?

200

This type of technology allows advertisers to track users across multiple websites.

What is cross-site tracking?

200

This social media giant has faced multiple scandals for mishandling user data, including the Cambridge Analytica case.

What is Facebook (Meta)?

200

A type of malware that locks your files and demands payment for their release.

What is ransomware?

200

This privacy-focused search engine does not track users like Google does.

What is DuckDuckGo?

300

HTTPS protects data in transit by using this type of encryption protocol.

What is TLS (Transport Layer Security)?

300

The U.S. government agency responsible for mass surveillance programs like PRISM.

What is the NSA (National Security Agency)?

300

A method of tricking people into revealing personal info by impersonating trusted sources.

What is social engineering?

300

This common scam involves fake technical support agents claiming your computer has a virus.

What is the tech support scam?

300

A browser extension that blocks tracking scripts and ads.

What is uBlock Origin?

400

The best practice for creating a strong password includes these three key characteristics.

What are length, complexity, and uniqueness?

400

This common term describes the collection and sale of user data by companies for targeted advertising.

What is data harvesting?

400

This popular video-sharing app has been scrutinized for its data collection policies and ties to China.

What is TikTok?

400

The dark web marketplace where hackers buy and sell stolen data.

What is the black market or dark web forums?

400

The encrypted messaging app preferred by privacy advocates.

What is Signal?

500

This type of encryption scrambles data in a way that only someone with the correct key can read it.

What is end-to-end encryption?

500

In 2018, this regulation was enacted in the European Union to give users more control over their personal data.

What is GDPR (General Data Protection Regulation)?

500

The term for when hackers or trolls publish personal information, like addresses or phone numbers, online.

What is doxxing?

500

A cyberattack that overwhelms a website or service by flooding it with traffic.

What is a DDoS (Distributed Denial of Service) attack?

500

This browser, originally developed by the U.S. Navy, helps users browse anonymously.

What is Tor (The Onion Router)?