

Yr8 Cybersecurity L1 L2 Homework
Presentation
•
Computers
•
6th Grade
•
Practice Problem
•
Medium
A Williams
Used 4+ times
FREE Resource
77 Slides • 19 Questions
1
2
3
Fill in the Blanks
4
5
6
7
8
Multiple Choice
What is the difference between data and information?
Data is structured information
Information is raw facts, data is information that has been given meaning.
Data is facts and figures, information is data that has been given meaning.
Information is unprocessed data
9
10
11
Multiple Select
Select all the examples of personal data
Profile picture
Current location
Number of cats in your neighbourhood
Email address
12
13
Multiple Choice
What would be a good advert for Izzy?
Top Dog
Pet supplies recommended by vets
Outdoor Supplies
Everything you need for camping and hiking under one roof
School Uniform Bargains
Pre-loved uniforms at great prices
UK PC Parts
Best prices
Reviews
Exchange
14
15
16
17
18
Multiple Select
How do you benefit from personal data collected about you by companies? Select all that are correct
Relevant recommendations
Improved internet security
Personalised ads and offers
More relevant and engaging experience with app
19
20
21
Multiple Select
How do companies benefit from the personal data you provide them? Select all the correct answers.
They can sell the data to other companies
They can target advertisements at the right people at the right time
They can improve their product
They can understand their customers better
22
23
24
25
26
27
Multiple Select
Which of these are consequences of a cybercriminal getting your personal data?
Data used to commit cybercrimes
Identity theft
Computer will not operate
Data sold to companies
28
29
30
31
32
Multiple Select
Which of these are consequences of a cybercriminal getting your personal data?
Data used to commit cybercrimes
Identity theft
Computer will not operate
Data sold to companies
33
Multiple Choice
What is the term for when someone uses your data to pretend to be you?
Identity duplication
Personality theft
Identity theft
Fraud identity
34
35
36
37
38
39
40
41
42
43
44
45
46
Multiple Choice
Which one is NOT a principle of the Data Protection Act?
A reason must be given for collecting personal data
Only data for the purpose stated can be collected, no other data
The personal data must be kept forever
Data must be protected from hacking
47
Multiple Select
Select all the correct principles of the Data Protection Act
Data collected must be accurate
Data must be deleted after a month
A reason must be given for collecting personal data
Data must include the users name and email address
48
Multiple Choice
Which of the following is a violation of the Data Protection Act?
Using data for a different purpose than originally stated
Asking the user for personal data
Storing personal data
Using data to provide adverts that the user will like
49
50
51
52
53
54
55
56
57
58
59
60
61
Multiple Choice
What is the main goal of social engineering?
to improve user experience
to trick people into revealing information
to enhance data security
to develop new software
62
Multiple Select
Which are common social engineering approaches? Select all that are correct.
Trying to scare you into doing something
Pretending to be your friend or to need your help
Offering you something nice you might like
Hacking your computer to put a virus on it
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
Multiple Choice
What is blagging in the context of social engineering?
a method of inventing scenarios to obtain data
a type of encryption
a software vulnerability
a secure data protocol
78
Multiple Choice
What is the term for the act of secretly observing someone enter private information, such as a PIN or password?
Shouldering
Phishing
Blagging
Name generator attack
79
Multiple Choice
What is phishing?
Watching someone type in their username and password
A fake message that tricks you into giving personal data by clicking on a link
A virus that copies all your personal information
Searching social media accounts for personal information
80
Multiple Select
Which one of these are characteristics of a phishing email? You can choose more than one.
Unexpected email with request for information that does not use your name
Creates as sense of urgency
Comes from one of your known contacts
Suspicious hyperlinked web address
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
Multiple Choice
What is a key strategy to prevent falling victim to social engineering?
ignoring all technology
regularly updating software
being aware of common tactics
using the same password everywhere
96
Show answer
Auto Play
Slide 1 / 96
SLIDE
Similar Resources on Wayground
94 questions
LAH Ch.11 20th century
Presentation
•
6th Grade
89 questions
Rational Numbers
Presentation
•
6th Grade
91 questions
5: Q1 Science Review
Presentation
•
5th Grade
91 questions
Illustrative Math Lessons
Presentation
•
7th Grade
90 questions
TA 5 - Unit 19 - Which place would you like to visit?
Presentation
•
5th Grade
86 questions
Chinese Language Revision
Presentation
•
6th Grade
87 questions
Practice FSA 5th grade Reading
Presentation
•
5th Grade
91 questions
Past Simple - vysvětlení, procvičování
Presentation
•
6th - 8th Grade
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade