lenny

Are You Cyber-Savvy?

user image

Slide Deck

Are You Cyber-Savvy?

Quick interactive lesson on digital privacy and security.

Today’s agenda:
• Warm-up poll
• 5-question quiz
• Review insights

Welcome students and introduce the lesson. Explain that today’s goal is to gauge their current knowledge of digital privacy and security and spark discussion.

Warm-Up Poll: Sharing Online

Which of these personal details have you shared online?

A) Full name B) Location C) Birthday D) All of the above

Launch a live poll in your chosen tool (e.g., Poll Everywhere, Mentimeter) or ask for a show of hands. Record responses for discussion.

Quiz Instructions

• 5 multiple-choice questions
• Select the best answer (A, B, C or D)
• We’ll review answers and discuss after

Explain that students will now take a short multiple-choice quiz individually or in small groups. Encourage honesty—there are no penalties!

Question 1

When creating a password, which practice is the most secure?

A) Using your birthdate
B) A random combination of letters, numbers & symbols
C) The word “password” with numbers
D) Your pet’s name

Give students ~1 minute to answer, then move on or collect responses.

Question 2

What is two-factor authentication (2FA)?

A) Using two passwords
B) A backup email
C) A second verification step (e.g., code)
D) Logging in twice

Highlight the value of an extra verification step after students answer.

Question 3

What’s the safest way to connect to public Wi-Fi?

A) No protection needed
B) Use a VPN
C) Share files openly
D) Only use HTTP sites

Emphasize why public Wi-Fi can be risky without protection.

Question 4

If you receive an unexpected link via email, you should:

A) Click it immediately
B) Delete it
C) Reply asking for more info
D) Forward to friends

Discuss common tricks used in malicious emails after responses.

Question 5

Which is a sign of a phishing attempt?

A) Generic greeting
B) Correct spelling
C) Personalized info
D) Secure URL

Tie this back to real-world phishing examples.

Quiz Insights

Correct Answers:

  1. B 2) C 3) B 4) B 5) A

Discuss:
• Why strong passwords and 2FA protect you
• How VPNs secure public connections
• Recognizing phishing red flags

Reveal correct answers and prompt students to explain why each one matters for staying safe online.

Next Steps

In the next lessons, we’ll explore:
• Social media privacy settings
• Your digital footprint
• Healthy screen-time habits

Outline upcoming lessons to build on today’s foundation.

lenny
0 educators
use Lenny to create lessons.

No credit card needed

Warm Up

Privacy Poll Warm-Up

Teacher Instructions: Launch a live poll (e.g., Poll Everywhere, Mentimeter) or ask for a show of hands. Record student responses to spark discussion around what information we commonly share online.

Prompt: Which of these personal details have you shared online?

A) Full name
B) Location
C) Birthday
D) All of the above

Discussion Questions:
• Were you surprised by any responses?
• Why might it be risky to share certain details?
• How could you limit what you share in the future?


lenny
lenny

Quiz

Are You Cyber-Savvy? Quiz

lenny

Answer Key

Quiz Insights

Below are the correct answers for the Are You Cyber-Savvy? Quiz, along with step-by-step explanations to guide classroom discussion.

Question 1: When creating a password, which practice is the most secure?

Correct Answer: B) A random combination of letters, numbers & symbols

Step-by-step reasoning:

  1. Using your birthdate – Easily found or guessed by anyone who knows you or checks your social media.
  2. “Password” with numbers – A common pattern that’s vulnerable to dictionary attacks.
  3. Your pet’s name – Often public or shared, making it guessable.
  4. Random combo – Unpredictable, long, and uses mixed character types, maximizing entropy and resisting cracking.

Question 2: What is two-factor authentication (2FA)?

Correct Answer: C) A second verification step (e.g., code)

Step-by-step reasoning:

  1. Using two passwords – Not standard and doesn’t significantly increase security if similar.
  2. Backup email – A way to recover access, not a true authentication factor.
  3. Logging in twice – Repeating login adds no new factor.
  4. Second verification step – Combines something you know (password) with something you have (SMS code, authenticator app, hardware token).

Discussion Prompt: What examples of 2FA have you encountered? (e.g., text code, authenticator app, fingerprint.)

Question 3: What’s the safest way to connect to public Wi-Fi?

Correct Answer: B) Use a VPN

Step-by-step reasoning:

  1. Public Wi-Fi is often unencrypted—data sent over it can be intercepted.
  2. No protection – Leaves you fully exposed.
  3. Share files openly – Invites malware and data leaks.
  4. Only HTTP sites – HTTP is unencrypted; HTTPS can still be vulnerable if the network is compromised.
  5. VPN – Encrypts all your traffic, making it unreadable to others on the same network.

Question 4: If you receive an unexpected link via email, you should:

Correct Answer: B) Delete it

Step-by-step reasoning:

  1. Phishing emails often contain malicious links leading to credential-stealing pages or malware installs.
  2. Click it immediately – Risks infection or credential theft.
  3. Reply asking for more info – Confirms your address is active and invites more phishing.
  4. Forward to friends – Spreads the threat.
  5. Delete (and report) – Safest way to remove the risk and notify your IT or teacher.

Question 5: Which is a sign of a phishing attempt?

Correct Answer: A) Generic greeting

Step-by-step reasoning:

  1. Correct spelling – Phishers often improve spelling to avoid detection.
  2. Personalized info – Can be used to build trust.
  3. Secure URL – Even HTTPS sites can be faked with look-alike domains.
  4. Generic greeting – (“Dear Customer,” “Hello User”) shows the sender doesn’t know you personally.

Discussion Prompt: What other red flags have you seen? (Urgent language, mismatched sender address, unexpected attachments.)


Use these explanations to spark deeper conversation about real-world examples and reinforce why each correct practice is vital for staying safe online.

lenny
lenny