A1 Level – Elementary
1. Do you use a strong password?
2. Do you share photos with strangers?
3. What is a common internet danger?
4. What do you do if you see a bad message?
5. Do you need a firewall on your computer?
6. What information is private?
7. Do you like turning off the camera during video calls?
8. What is the difference between a real friend and an online friend?
9. Do you click on links from unknown emails?
10. What makes a good anti-virus program?
11. What is the job of a hacker?
12. Do you use the same password for everything?
13. What is the most important rule for children online?
14. Do you accept friend requests from strangers?
15. What are common scams you see online?
A2 Level – Pre-Intermediate
1. What are the key elements of a strong, memorable password?
2. Describe what you would do if you suspected your email account had been hacked.
3. What is the difference between phishing and a regular spam email?
4. What are the pros and cons of using two-factor authentication?
5. Have you ever been a victim of an online scam or misinformation?
6. What specific privacy settings should people check on their social media accounts?
7. What role does a VPN (Virtual Private Network) play in protecting online activity?
8. What is the difference between private browsing and a completely secure connection?
9. How can parents educate their children about the dangers of cyberbullying?
10. What are the most common ways people accidentally give away personal information?
11. What is the importance of regularly backing up your personal data?
12. Do you think older people face different types of online security risks than younger people?
13. What are the challenges of legally prosecuting someone for an online crime?
14. What are the best ways to verify the source of information you see online?
15. What is the difference between sharing information publicly and sharing it privately with a group?
B1 Level – Intermediate
1. Discuss the psychological effects of having private data or photos leaked online.
2. How can schools and companies implement effective training programs for basic internet safety?
3. What are the ethical issues surrounding large tech companies collecting and selling user data?
4. Do you agree that most people are too trusting of the information and people they encounter online?
5. Describe a time when a simple safety measure (e.g., closing a popup) prevented a serious problem.
6. To what extent should governments have the right to monitor or regulate online communication?
7. What role do international organizations play in setting global standards for cybersecurity?
8. How does the rise of deepfake technology challenge the concept of authenticity and trust online?
9. Discuss the psychological need for anonymity and pseudonymity in certain online spaces.
10. What are the challenges of maintaining secure digital files across multiple devices (phone, laptop, cloud)?
11. How does the legal concept of “right to be forgotten” apply to information posted online?
12. Should social media platforms be responsible for immediately removing verified hate speech or threats?
13. What is the difference between sharing an opinion and engaging in online harassment?
14. Discuss the concept of “digital citizenship” and the responsibilities it entails.
15. What is the long-term impact of constant online surveillance on individual freedom and creativity?
B2 Level – Upper-Intermediate
1. How does the structure of online platforms (e.g., echo chambers) make users more vulnerable to targeted scams?
2. What are the ethical arguments about the automatic and non-consensual tracking of user location and activity?
3. Should internet service providers be required to offer mandatory basic security features to all customers?
4. What are the psychological reasons why people willingly give up privacy for convenience or personalized services?
5. How has the dominance of a few large tech companies created a single point of failure for global data security?
6. Discuss the idea that a high level of internet safety is incompatible with the design of a truly “open” internet.
7. What is the role of white-hat hackers and bug bounty programs in finding and fixing security flaws?
8. How do our online behaviors (clicking, liking) create a digital profile that can be used against us?
9. What are the challenges of implementing strong online safety measures while preserving freedom of expression?
10. Discuss the concept of “sovereign data”—the idea that a country’s citizen data should be stored within its borders.
11. What is the difference between a data breach and a targeted spear-phishing attack?
12. Should social media companies be required to implement stricter age verification protocols for minors?
13. What is the impact of ransomware attacks on essential public services like hospitals and infrastructure?
14. How does the lack of uniformity in global data protection laws (e.g., GDPR vs. US laws) affect consumers?
15. Discuss the idea that total internet safety is an illusion, and risk must simply be managed.
C1 Level – Advanced
1. Analyze the socioeconomic factors that correlate with higher rates of cybercrime victimization (e.g., lack of digital literacy).
2. To what degree should the legal system punish technology companies for gross negligence leading to massive data breaches?
3. Discuss the philosophical concept of “informed consent” in the context of endless, complex terms and conditions agreements.
4. Evaluate the impact of quantum computing on current encryption standards and future digital security.
5. How does the strategic use of propaganda and misinformation online pose a threat to democratic processes?
6. Examine the historical process by which governments shifted from regulating physical media to attempting to control digital content.
7. What ethical guidelines should govern the use of facial recognition and biometric data for public security purposes?
8. Discuss the concept of “surveillance capitalism” and its impact on user autonomy and privacy.
9. How do international treaties address the issue of state-sponsored cyber warfare and intellectual property theft?
10. Analyze the interplay between the need for internet safety and the principle of net neutrality.
11. What ethical challenges arise when security researchers discover major vulnerabilities but delay public disclosure?
12. Debate whether a system based on complete blockchain decentralization could eliminate the need for centralized security authorities.
13. How does the architecture of the deep web and dark web facilitate or inhibit illegal online activity?
14. Discuss the concept of “information asymmetry” and how it is exploited by cybercriminals.
15. To what extent does the reliance on AI to filter harmful content create new problems of censorship and algorithmic bias?
C2 Level – Proficiency
1. How do you analyze the idea that privacy is fundamentally a public good, not just a private individual concern?
2. Formulate a critique of the current international legal jurisdiction over crimes committed across multiple sovereign cyber domains.
3. Analyze the intersection of political dissent, digital anonymity, and the state’s power to suppress online organization.
4. Discuss the philosophical distinction between “digital presence” (online activity) and “digital essence” (who a person truly is).
5. Critically evaluate the effectiveness of global cooperation in dismantling organized international cybercrime syndicates.
6. Propose a new, globally enforced regulatory framework for data ownership that gives total control back to the individual user.
7. Examine the psychological function of “security theater”—visible but ineffective security measures—in reassuring the public.
8. How does the semiotics of a website’s design (e.g., trust signals, certifications) subconsciously influence a user’s security perception?
9. Discuss the ethical responsibilities of cryptography experts concerning the development of tools that could be used for malicious purposes.
10. Analyze the historical evolution of “trust” from face-to-face interaction to reliance on complex, invisible digital protocols.
11. Articulate the inherent tension between the technical requirement for backdoors for law enforcement and the need for universal, unbreakable encryption.
12. Debate whether the global internet should fragment into smaller, nationally controlled digital ecosystems for enhanced security.
13. Assess the long-term societal effects of widespread digital fatigue and disengagement due to continuous security risks.
14. Discuss the philosophical definition of ‘transparency’ when applied to the secretive and complex world of cybersecurity.
15. How might the principles of network defense be used to model processes of organizational resilience and crisis management?


