Computer Science Grade 9 20 min

6. Social Media Security

Discuss security risks associated with social media and how to protect personal information.

Tutorial Preview

1

Introduction & Learning Objectives

Learning Objectives Identify at least three common security threats on social media platforms. Explain the concept of a digital footprint and its long-term implications. Apply privacy settings on a simulated social media profile to limit data exposure. Differentiate between strong and weak passwords using established criteria. Recognize phishing attempts and social engineering tactics in social media messages. Analyze a social media post for personally identifiable information (PII). Ever posted something online you wish you could take back? 🤔 Let's explore how to keep your digital world safe and secure! This lesson covers the essentials of social media security. You will learn how to protect your personal information, manage your digital reputation, and spot online d...
2

Key Concepts & Vocabulary

TermDefinitionExample Digital FootprintThe trail of data you create while using the internet, including social media posts, search history, and website visits.A photo you posted on Instagram five years ago, a comment you left on a YouTube video, and a 'like' on a friend's Facebook status are all part of your digital footprint. PhishingA cyber attack where scammers try to trick you into giving them personal information, like passwords or credit card numbers, by pretending to be someone trustworthy.Receiving a direct message on Twitter from a fake 'verified' account saying you've won a prize and need to click a link and enter your login details to claim it. Personally Identifiable Information (PII)Any data that can be used to identify a specific individual.Your...
3

Core Syntax & Patterns

The Strong Password Formula Length (12+) + Complexity (Aa1!) + Uniqueness (per site) = Strong Password A strong password should be at least 12 characters long, include a mix of uppercase letters, lowercase letters, numbers, and symbols, and should never be reused across different websites. The P.A.U.S.E. Method for Spotting Phishing Pressure, Anomaly, Urgency, Spelling, Extras Use this acronym to check suspicious messages. Scammers often create a sense of Pressure or Urgency (e.g., 'Act now!'), include an Anomaly (e.g., a weird sender address), have poor Spelling or grammar, and offer Extras that are too good to be true. The 'Grandma Rule' for Posting If you wouldn't show it or say it to your grandma, don't post it online. Before posting...

4 more steps in this tutorial

Sign up free to access the complete tutorial with worked examples and practice.

Sign Up Free to Continue

Sample Practice Questions

Challenging
A user posts a photo of their new car with the license plate visible. A week later, they post about their favorite coffee shop. Later, they 'check in' at their school's football game. How could an attacker synthesize this seemingly harmless information?
A.By combining these details to build a detailed profile of the user's habits, routines, and locations.
B.By using the license plate number to make the car run less efficiently.
C.By concluding that the user does not like coffee.
D.By using the football game score to guess the user's password.
Challenging
Even with 2FA enabled on an account, a user might still be vulnerable. Which scenario describes how a sophisticated social engineering attack could bypass 2FA?
A.An attacker guesses the user's password correctly on the first try.
B.An attacker calls the user, pretends to be from tech support, and tricks the user into reading the 2FA code to them over the phone.
C.An attacker sees the user type their password in a public place.
D.The 2FA system server has a temporary outage.
Challenging
You receive a DM from your social media platform's official-looking 'Security Team'. The message warns of a breach and asks you to reply with your password to confirm your identity. The grammar is perfect and there's no link. What is the most secure, multi-step course of action?
A.Reply with your password, because the account looks official and has a verified badge.
B.Delete the message and assume it's a bug in the system.
C.Do not reply. Separately, go to the platform's official website, log in there, check for notifications, and enable 2FA if you haven't already.
D.Reply to the message asking for more proof that they are the real security team.

Want to practice and check your answers?

Sign up to access all questions with instant feedback, explanations, and progress tracking.

Start Practicing Free

More from V. Cybersecurity Fundamentals

Ready to find your learning gaps?

Take a free diagnostic test and get a personalized learning plan in minutes.