You are on page 1of 3

Most of what we do online falls into one of three categories: Talk, Shop and Play.

There are
risks associated with all these activities that consumers need to be aware of so they can take
the necessary steps to protect themselves and their computers.
Directions: In Google Classroom, read the following articles and answer the questions in your
own words on the Blog we just created.
Article 1: Cyber Security Consumer Tip Sheet
A. Summarize each of the following types of potential risks you may encounter online and at
least two ways that you can avoid them.
a. Cybersquatting b. Cookies
c. Data Theft
d. Excessive Spending
e. Griefing
f. Identity Spoofing
g. Identity Theft
h. Malware
i. Online Fraud
j. Phishing Scams
k. Spyware
B. In your own words, define the following tools you can use to protect yourself online.
a. Bookmarks
b. Blocking Other Users
c. Browser and antivirus updates
d. Clearing browser cache
e. Contacting sites and ISPs
f. Content Filters
g. Creating strong passwords
h. E-mail encryption
i. Firewalls
j. Managing reputation
k. Prepaid Credit
l. Private browsing tools
m. Privacy settings
n. Reporting online crimes
o. Secure sites
p. User/vendor rating systems
Article 2: Cyber Security Consumer Tip Sheet
1. What are the four main browsers?
2. What are the two main types of risk related to web surfing, give an example of both.
3. What are some ways that you can protect yourself, your network and your computer from
these risks?
4. Summarize the good and bad news of technological risks.
5. What are eight ways to protect yourself from technological risks?

6. Summarize the good and bad news of behavioral risks.


7. What are nine ways to protect yourself from behavioral risks?
Article 3: Protecting Yourself from Malware, answer each of the following in your own
words.
1. What is Malware?
2. Explain how malware does each of the following:
a. Damage your system
b. Change how your system works
c. Compromise your personal information
d. Use your system to spread itself
e. Take control of your computer
3. Explain five ways that malware infects your devices.
4. Explain three ways you can protect your system.
Article 4: E-Commerce, answer and explain each of your answers in your own words
1. What are four advantages of online commerce?
2. What are five risks of online commerce?
3. What are twelve ways you can protect yourself?
Article 5 Socializing and Interacting Online, answer and explain each of your answers in
your own words.
1. Explain three risks to your privacy and identity.
2. Explain three negative interactions with other users.
3. Explain thirteen tips for safe and secure surfing.
Article 6: Mobile Devices, answer and explain each of your answers in your own words.
1. What are eight risks to using mobile devices?
2. What are eleven ways to protecting yourself?

GENERATION LIKE
Directions: As we watch Generation Like answer the following questions.
1.
2.
3.
4.
5.
6.
7.
8.

What social media apps do you use?


Why do you choose to use these?
How important are likes to you and why?
Why do teens today, not need to be chased down by marketers? Give an
example.
Why are profile pictures important?
What is the social currency of your generation? How do you feel about this?
What happens when you like something online?
How has the interaction between celebrities and fans changed due to social
media?

9. Some say that social media has empowered them, explain how this might be
possible.
10.What are the marketing icons of your generation?
11.How has social media helped something like an Oreos make a statement?
12.What are some online ways that you are creating data for marketers?
13.What is Instagram worth? What about Twitter and Facebook? What makes
these companies so expensive?
14.How did Tyler Oakley, a YouTuber become so popular?
15.How do YouTubers get such large audiences?
16.How did a kid use to get fame? How has this changed?
17.Explain how Liam Horne has become so popular?
18.Why would businesses want to sponsor YouTubers?
19.How do YouTubers make their money?
20.Why do people act the way that they do online? Are their actions justified?
Explain your answer.

You might also like