Slide Deck
Are You Cyber-Savvy?
Quick interactive lesson on digital privacy and security.
Today’s agenda:
• Warm-up poll
• 5-question quiz
• Review insights
Welcome students and introduce the lesson. Explain that today’s goal is to gauge their current knowledge of digital privacy and security and spark discussion.
Warm-Up Poll: Sharing Online
Which of these personal details have you shared online?
A) Full name B) Location C) Birthday D) All of the above
Launch a live poll in your chosen tool (e.g., Poll Everywhere, Mentimeter) or ask for a show of hands. Record responses for discussion.
Quiz Instructions
• 5 multiple-choice questions
• Select the best answer (A, B, C or D)
• We’ll review answers and discuss after
Explain that students will now take a short multiple-choice quiz individually or in small groups. Encourage honesty—there are no penalties!
Question 1
When creating a password, which practice is the most secure?
A) Using your birthdate
B) A random combination of letters, numbers & symbols
C) The word “password” with numbers
D) Your pet’s name
Give students ~1 minute to answer, then move on or collect responses.
Question 2
What is two-factor authentication (2FA)?
A) Using two passwords
B) A backup email
C) A second verification step (e.g., code)
D) Logging in twice
Highlight the value of an extra verification step after students answer.
Question 3
What’s the safest way to connect to public Wi-Fi?
A) No protection needed
B) Use a VPN
C) Share files openly
D) Only use HTTP sites
Emphasize why public Wi-Fi can be risky without protection.
Question 4
If you receive an unexpected link via email, you should:
A) Click it immediately
B) Delete it
C) Reply asking for more info
D) Forward to friends
Discuss common tricks used in malicious emails after responses.
Question 5
Which is a sign of a phishing attempt?
A) Generic greeting
B) Correct spelling
C) Personalized info
D) Secure URL
Tie this back to real-world phishing examples.
Quiz Insights
Correct Answers:
- B 2) C 3) B 4) B 5) A
Discuss:
• Why strong passwords and 2FA protect you
• How VPNs secure public connections
• Recognizing phishing red flags
Reveal correct answers and prompt students to explain why each one matters for staying safe online.
Next Steps
In the next lessons, we’ll explore:
• Social media privacy settings
• Your digital footprint
• Healthy screen-time habits
Outline upcoming lessons to build on today’s foundation.
use Lenny to create lessons.
No credit card needed
Warm Up
Privacy Poll Warm-Up
Teacher Instructions: Launch a live poll (e.g., Poll Everywhere, Mentimeter) or ask for a show of hands. Record student responses to spark discussion around what information we commonly share online.
Prompt: Which of these personal details have you shared online?
A) Full name
B) Location
C) Birthday
D) All of the above
Discussion Questions:
• Were you surprised by any responses?
• Why might it be risky to share certain details?
• How could you limit what you share in the future?
Quiz
Are You Cyber-Savvy? Quiz
Answer Key
Quiz Insights
Below are the correct answers for the Are You Cyber-Savvy? Quiz, along with step-by-step explanations to guide classroom discussion.
Question 1: When creating a password, which practice is the most secure?
Correct Answer: B) A random combination of letters, numbers & symbols
Step-by-step reasoning:
- Using your birthdate – Easily found or guessed by anyone who knows you or checks your social media.
- “Password” with numbers – A common pattern that’s vulnerable to dictionary attacks.
- Your pet’s name – Often public or shared, making it guessable.
- Random combo – Unpredictable, long, and uses mixed character types, maximizing entropy and resisting cracking.
Question 2: What is two-factor authentication (2FA)?
Correct Answer: C) A second verification step (e.g., code)
Step-by-step reasoning:
- Using two passwords – Not standard and doesn’t significantly increase security if similar.
- Backup email – A way to recover access, not a true authentication factor.
- Logging in twice – Repeating login adds no new factor.
- Second verification step – Combines something you know (password) with something you have (SMS code, authenticator app, hardware token).
Discussion Prompt: What examples of 2FA have you encountered? (e.g., text code, authenticator app, fingerprint.)
Question 3: What’s the safest way to connect to public Wi-Fi?
Correct Answer: B) Use a VPN
Step-by-step reasoning:
- Public Wi-Fi is often unencrypted—data sent over it can be intercepted.
- No protection – Leaves you fully exposed.
- Share files openly – Invites malware and data leaks.
- Only HTTP sites – HTTP is unencrypted; HTTPS can still be vulnerable if the network is compromised.
- VPN – Encrypts all your traffic, making it unreadable to others on the same network.
Question 4: If you receive an unexpected link via email, you should:
Correct Answer: B) Delete it
Step-by-step reasoning:
- Phishing emails often contain malicious links leading to credential-stealing pages or malware installs.
- Click it immediately – Risks infection or credential theft.
- Reply asking for more info – Confirms your address is active and invites more phishing.
- Forward to friends – Spreads the threat.
- Delete (and report) – Safest way to remove the risk and notify your IT or teacher.
Question 5: Which is a sign of a phishing attempt?
Correct Answer: A) Generic greeting
Step-by-step reasoning:
- Correct spelling – Phishers often improve spelling to avoid detection.
- Personalized info – Can be used to build trust.
- Secure URL – Even HTTPS sites can be faked with look-alike domains.
- Generic greeting – (“Dear Customer,” “Hello User”) shows the sender doesn’t know you personally.
Discussion Prompt: What other red flags have you seen? (Urgent language, mismatched sender address, unexpected attachments.)
Use these explanations to spark deeper conversation about real-world examples and reinforce why each correct practice is vital for staying safe online.