0% found this document useful (0 votes)
35 views3 pages

ICT CyberSecurity - v3.0 - L01 - Clozed Notes

Uploaded by

Jeremy Hill
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views3 pages

ICT CyberSecurity - v3.0 - L01 - Clozed Notes

Uploaded by

Jeremy Hill
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

ICT Cybersecurity Essentials: Lesson 1: Protecting Your Identity 1

ICT CyberSecurity Essentials


Lesson 1 – Clozed Notes
Directions:
Complete the closed notes using the slideshow or lesson.

1. Privacy is the state of being free from being ____________ or disturbed. It is the right to keep one’s
personal information ____________.
2. ____________ of privacy is the act of intruding on a person’s life without permission.
3. Technology can ____________ a person’s Internet activity without the person’s knowledge or permission.
4. Personal identifiable information (____________) is data that can directly identify a person.
5. Cybercriminals will use PII to commit a ____________.
6. Online privacy is measured by the amount of protection being used to protect a user’s ____________
and ____________ usage.
7. Online privacy is affected by:
a. Data collected by ____________ forces of the Internet.
b. Data a user ____________ while on the Internet.
c. Data collected with or ____________ a user’s knowledge.
8. Online retail stores collect data to create a personalized ____________ experience.
9. Government collects data to ____________ crime.
10. Business tracks data to improve ____________ service.
11. Service provider tracks data to ____________ technical problems.
12. Games track data to ____________ the game’s performance.
13. Radio and TV track data to identify ____________ programs.
14. Social media apps track data to improve targeted ____________.
15. A user provides data to a company when they create a user account or submit a ____________ form.
16. A ____________ tracks a user’s location.
17. A ____________ tracks a user’s browsing history.
18. A ____________ assistant tracks purchasing behaviors.
19. Browser ____________ tracks browser activity.
20. Cell phone triangulation tracks location information by pinpointing the location of the ____________
device.
21. Terms of Service is a legal document that describes the ____________ the company and user agree to
and obey.

© 2024 Certification Partners, LLC. — All Rights Reserved. Version 3.0


ICT Cybersecurity Essentials: Lesson 1: Protecting Your Identity 2

22. Privacy Policy is a ____________ document that describes what information is being collected, how the
information will be used, and how the collected information is being protected.
23. A Privacy Policy is legally ____________ and is found on websites and apps.
24. Data on users is ____________.
25. Data analysts study data to ____________ users; it helps them make ____________ decisions on the user
experience.
26. Advertising uses collected data to ____________ an advertisement to a certain demographic.
27. Collected data is sometimes ____________ to an organization that can’t collect data.
28. Cybercriminals will use collected information to ____________ into a device or ____________ a person’s
identity.
29. A ____________ is an event when digital data is stolen by hacking.
30. A digital footprint is a ____________ of a user’s online activity. It can be thought of as a digital trail.
31. Know what your digital ____________ says about you.
32. The Internet ____________ forgets…not even deleted data.
33. Clean up your digital footprint by:
a. Reviewing posted content on all your apps.
b. Removing any ____________ information.
c. Remove any information that should be kept private.
d. Research ____________ online.
e. Ask others to remove posts about you.
f. Change privacy settings on posts of you.
g. Use data ____________ tools.
34. Cybersafety involves using ____________ methods to keep you and your data safe.
35. Cybersafety best practices include:
a. ____________ the privacy policy for each app or website.
b. ____________ privacy settings.
c. ____________ sharing PII data.
d. Always ____________ a website or app.
e. ____________ cookies.
f. ____________ browser history.
g. Use browser ____________.
h. Use a ____________ search engine.
i. ____________ a link before clicking.

© 2024 Certification Partners, LLC. — All Rights Reserved. Version 3.0


ICT Cybersecurity Essentials: Lesson 1: Protecting Your Identity 3

36. PII data that should never be shared includes:


a. Name
b. ____________
c. Email
d. Social Security Number
e. ____________ ID
f. Photo
37. Photos contain the location of the photo. Cameras include a ____________ on each photo. The geotag
uses ____________ data.
38. Review the Terms of Service for each website visited or ____________ used.
39. Use a ____________ name that does not include your real name.
40. Say ____________ to a friend or chat requests from strangers.
41. Don’t trust links from a ____________.
42. Share ____________ and media wisely.
43. ____________ review of photos you are tagged in.
44. Ask others to ask before posting a ____________ that includes you.
45. Be ____________, responsible and ____________.
46. Information in your digital footprint can be ____________, copied, collected, and ____________.

© 2024 Certification Partners, LLC. — All Rights Reserved. Version 3.0

You might also like