Identity theft
password
Protecting Yourself Online
Online Safety
Digital Footprint
100
Type of identity theft occurs when a thief uses someone else's identity to gain medical treatment or commit insurance fraud?
What is Medical
100
Is "WS1979" a strong password, yes or no?
What is No
100
Keeps important, private information safe.
What is Passwords
100
The act of cracking into a computer to steal information.
What is Hacking
100
An image you do not have the right to use is considered a digital asset. True or False
What is False
200
Type of identity theft occurs when a thief uses someone else's identity to commit a crime?
What is Criminal
200
Is "#Ih8P@$$words" a strong password, yes or no?
What is Yes
200
Special encryption called _____ can protect your web browsing information
What is HTTPS
200
Is software that has malicious intent.
What is Malware
200
Hiring managers and college admissions officers are some of the people who use social media and other internet resources to research candidates for employment. True or False
What is True
300
Type of identity theft occurs when a thief uses SSN to file taxes or reap other governmental benefits
What is Governmental
300
In order to protect your passwords, don't use easy-to-guess information, don't share your passwords, and NEVER change your passwords. True or False
What is False
300
If the network is ___________, that means the data sent back and forth between your device and wireless router can be viewed by others
What is unencrypted
300
Spreads from one machine to another, rapidly, without human action
What is Worms
300
Protecting what is added to your digital footprint is important because potentially embarrassing information can remain on-line ___________.
What is forever
400
Type of identity theft occurs when a thief spends another person’s money or opens a line of credit in their name.
What is Financial
400
The whole purpose of a password is to keep important, private information safe. True or False
What is True
400
When someone wrongfully obtains and uses another person’s personal data, typically for economic gain
What is Identity theft
400
Attaches itself to a file or program, enabling it to spread from one computer to another
What is A computer virus
400
Textual content, images, and multimedia that the creator must have the right to use
What is Digital Asset
500
Two types of malware
What is computer virus and worms
500
Uses upper and lower case letters, numbers and symbols. (8 or more characters)
What is Strong passwords
500
The primary goal of an _____________, is to trick someone into giving money or sharing information
What is internet scam
500
A computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as worms and viruses
What is Antivirus software
500
All of the information online about a person either posted by that person or others, intentionally or unintentionally.
What is Digital Footprint