Draw a flowchart that shows why cybersecurity is everyone's responsibility. Include steps showing how a person can protect themselves and others by following simple security actions like using strong passwords, updating software, and being careful with emails.
0
0
Why cybersecurity is everyone's responsibility in Intro to Computing - Draw It to Prove It
Draw This - beginner
10 minutes
Hint 1
Hint 2
Hint 3
Hint 4
Grading Criteria
Start and End symbols present
Decision diamonds used for yes/no questions
Actions like 'Change password' and 'Delete email' included
Flow logically shows steps to protect cybersecurity
Clear paths for both positive and negative decisions
Solution
+-------+
| Start |
+---+---+
|
v
+-----------------+
| Is password |
| strong? |
+--------+--------+
|
+----+----+
| |
Yes No
| |
v v
+--------+ +----------------+
| Update | | Change password |
| software| +--------+-------+
+----+---+ |
| v
v +-------------+
+-------------------------+
| Is email safe? |
+------------+------------+
|
+----+----+
| |
Yes No
| |
v v
+---------------+ +----------------+
| Open email | | Delete email |
+-------+-------+ +--------+-------+
| |
v v
+-------------------------------+
| Follow security best practices |
+---------------+---------------+
|
v
+---------+
| End |
| Stay |
| safe |
| online |
+---------+This flowchart starts with the user beginning their cybersecurity actions. It first checks if the user is using a strong password. If not, it advises changing the password. Then it moves to updating software, which is important to fix security holes. Next, it checks if an email is safe before opening it; if the email is suspicious, it should be deleted. Finally, it reminds the user to follow security best practices overall. This shows how each person's actions help keep themselves and others safe online, emphasizing that cybersecurity is everyone's responsibility.
Variations - 2 Challenges
[intermediate] Draw a flowchart showing how a company employee can help keep the company safe from cyber threats by following security steps like locking their computer, reporting suspicious activity, and using secure Wi-Fi.
[advanced] Draw a detailed flowchart explaining how a family can work together to maintain cybersecurity at home, including steps for parents monitoring kids' online activity, updating devices, and setting strong passwords for all accounts.