CS Grade 6-8

CS: Cybersecurity: Threats and Protections

Recognizing common cyber threats and choosing safer protections

View Answer Key
Name:
Date:
Score: / 12

Recognizing common cyber threats and choosing safer protections

CS - Grade 6-8

Instructions: Read each problem carefully. Identify the threat or protection, and explain your thinking in complete sentences.
  1. 1
    A student notices a suspicious email with a link, password key, warning symbol, and shield.

    A student receives an email that says their school account will be deleted unless they click a link and enter their password right away. What type of cyber threat is this, and what should the student do?

  2. 2

    Choose the stronger password and explain why: soccer7 or R!verTurtle42$.

  3. 3
    A protected account uses both a password key and a phone verification symbol.

    A website asks you to turn on multi-factor authentication for your account. Explain what multi-factor authentication does and why it helps protect you.

  4. 4
    A laptop shows a dangerous pop-up with a virus icon and unknown download, with a shield nearby.

    A pop-up says your computer is infected and tells you to download a free cleaner from an unknown website. What risk does this create, and what is a safer action?

  5. 5
    Malware bugs attack a device, causing a cracked screen and locked file icon.

    Define malware in your own words, and give one example of what malware can do to a device or account.

  6. 6
    One student considers giving a password key to another student, with a warning and shield between them.

    A classmate asks for your game account password so they can help you win a level. Explain why sharing the password is unsafe, even if the classmate seems trustworthy.

  7. 7
    A suspicious person tries to collect personal information icons while students stay behind a shield.

    A message from someone pretending to be a school club leader asks for students' full names, birthdays, home addresses, and phone numbers. What type of information is being requested, and why should students be careful?

  8. 8
    A safe app update with a shield is contrasted with an unknown link carrying a bug warning.

    Explain the difference between updating an app and installing an app from an unknown link. Which is safer, and why?

  9. 9
    One reused key is connected to several accounts, while separate keys with a shield show safer password habits.

    A student uses the same password for email, games, and school accounts. Explain one danger of reusing passwords and one better habit.

  10. 10
    A student protects a login code from a suspicious online tech support stranger.

    A stranger in an online chat says they are from tech support and need your login code to fix a problem. What cyber threat could this be, and how should you respond?

  11. 11
    A website screen shows warning signs such as a broken lock, warning symbol, suspicious link, and bug icon.

    List three signs that a website might not be safe to use for entering a password or personal information.

  12. 12

    Create a short cybersecurity safety plan for a middle school student. Include at least three protections they should use regularly.

LivePhysics™.com CS - Grade 6-8

More CS Worksheets

See all CS worksheets

More Grade 6-8 Worksheets

See all Grade 6-8 worksheets