0
0
Intro to Computingfundamentals~10 mins

Why cybersecurity is everyone's responsibility in Intro to Computing - Draw It to Prove It

Choose your learning style9 modes available
Draw This - beginner

Draw a flowchart that shows why cybersecurity is everyone's responsibility. Include steps showing how a person can protect themselves and others by following simple security actions like using strong passwords, updating software, and being careful with emails.

10 minutes
Hint 1
Hint 2
Hint 3
Hint 4
Grading Criteria
Start and End symbols present
Decision diamonds used for yes/no questions
Actions like 'Change password' and 'Delete email' included
Flow logically shows steps to protect cybersecurity
Clear paths for both positive and negative decisions
Solution
  +-------+
  | Start |
  +---+---+
      |
      v
+-----------------+
| Is password      |
| strong?         |
+--------+--------+
         |
    +----+----+
    |         |
   Yes       No
    |         |
    v         v
+--------+  +----------------+
| Update |  | Change password |
| software|  +--------+-------+
+----+---+           |
     |               v
     v         +-------------+
+-------------------------+  
| Is email safe?          |
+------------+------------+
             |
        +----+----+
        |         |
       Yes       No
        |         |
        v         v
+---------------+  +----------------+
| Open email    |  | Delete email    |
+-------+-------+  +--------+-------+
        |                 |
        v                 v
  +-------------------------------+
  | Follow security best practices |
  +---------------+---------------+
                  |
                  v
             +---------+
             |  End    |
             | Stay    |
             | safe    |
             | online  |
             +---------+

This flowchart starts with the user beginning their cybersecurity actions. It first checks if the user is using a strong password. If not, it advises changing the password. Then it moves to updating software, which is important to fix security holes. Next, it checks if an email is safe before opening it; if the email is suspicious, it should be deleted. Finally, it reminds the user to follow security best practices overall. This shows how each person's actions help keep themselves and others safe online, emphasizing that cybersecurity is everyone's responsibility.

Variations - 2 Challenges
[intermediate] Draw a flowchart showing how a company employee can help keep the company safe from cyber threats by following security steps like locking their computer, reporting suspicious activity, and using secure Wi-Fi.
[advanced] Draw a detailed flowchart explaining how a family can work together to maintain cybersecurity at home, including steps for parents monitoring kids' online activity, updating devices, and setting strong passwords for all accounts.