Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cyber Awareness Game, How to play - Coggle Diagram
Cyber Awareness Game
Wellbeing Security
Grooming
Defend
If someone stranger try to talk to you on the internet the best thing to do is not reply and block them ( T / F)
-
-
Prevent
-
Correct the scenario:
Person A: Why you look sad? Let's go to my home and eat dinner together.
You: Immm, I'm not sure but ...
Person A: Dear, you can trust me because no one understands you the way I do.
You: ... Ok ..
Correct the scenario:
Person A: I saw you reading comic about pets. I'm planning to go to the zoo, I can take you if you want to go.
You: Ok, I'll ask my parents.
Person A : No need! we'll back quickly
You: Ok, that's great!
Detect
-
-
What would you do if someone begins to fill your needs and utilize tactics such as gift giving, flattery, gifting money, and meeting your other basic needs?
Cyber Security
Identity Theft
Prevent
What would you do if someone asked you to fill a form that's asking for personal information like your full name, phone number or address?
What would you do if you have documents that contain some of your PII and you don't need them anymore?
What would you do if you’re in an airport, coffee shop or other location that offers free public Wi-Fi and you want to connect and browse your social accounts?
Defend
It is fine to carry your Social Security card or any documents that include your identity information around with you ( T / F )
Before acting on an email link or attachment, you should investigate it thoroughly to make sure it’s legitimate ( T / F )
Experts advise not to do anything on a public Wi-Fi network that involves logging in to accounts or making purchases (T / F )
-
Content Security
Privacy
Prevent
-
Sometimes it is ok to reveal personal information, such as address, phone number, or school name or location ( T / F )
Let your parents know if a stranger emails you, sends a text message, or starts a conversation with you online ( T / F )
Follow the family rules, and those set by the Internet service provider ( T / F )
Defend
Classify the phishing from the legitimate emails:
You are well recognizing the sender name
There is a suspicious link in the email
The email contains grammatical errors
It’s asking for personal information like your full name, phone number or address
The message is sent from a public email domain
The message creates a sense of urgency
Classify what safe profiles should/ should not include:
Home address
Body weight
Telephone number
Your mental health
Email address
Food you eat
Films & music you like
Things you like to buy
Frequency of visits
Religious or spiritual activities
First name, nickname or pseudonym
Only photos where specific details can’t be identified such as school or sports uniform, location, time
Full name
Full name of friends or family
Birth date
Name of school or clubs/teams
Photos that can easily identify you e.g. school uniform
-
Detect
What would you do if unsolicited gifts arrived to your mail and the sender prodded you to provide your address to send your gifts?
What would you do if you have received an official email that asks for your personal information?
What would you do if someone prodded you to sign in and create a profile in a new social media website?
-
-