{"id":33,"date":"2026-03-29T23:54:06","date_gmt":"2026-03-29T21:54:06","guid":{"rendered":"https:\/\/dev.kidsnetguard.com\/en\/?page_id=33"},"modified":"2026-03-31T06:38:27","modified_gmt":"2026-03-31T04:38:27","slug":"cyber-abc","status":"publish","type":"page","link":"https:\/\/kidsnetguard.com\/en\/cyber-abc\/","title":{"rendered":"Cyber ABC"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"1080\" src=\"https:\/\/kidsnetguard.com\/en\/wp-content\/uploads\/sites\/2\/2026\/03\/CyberABC-EN.jpg\" alt=\"\" class=\"wp-image-72\" style=\"width:800px\" srcset=\"https:\/\/kidsnetguard.com\/en\/wp-content\/uploads\/sites\/2\/2026\/03\/CyberABC-EN.jpg 1080w, https:\/\/kidsnetguard.com\/en\/wp-content\/uploads\/sites\/2\/2026\/03\/CyberABC-EN-300x300.jpg 300w, https:\/\/kidsnetguard.com\/en\/wp-content\/uploads\/sites\/2\/2026\/03\/CyberABC-EN-1024x1024.jpg 1024w, https:\/\/kidsnetguard.com\/en\/wp-content\/uploads\/sites\/2\/2026\/03\/CyberABC-EN-150x150.jpg 150w, https:\/\/kidsnetguard.com\/en\/wp-content\/uploads\/sites\/2\/2026\/03\/CyberABC-EN-768x768.jpg 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Explore the Cyber ABC, a visual cybersecurity glossary that explains digital concepts in a clear and accessible way for children, families, and educators.<\/p>\n\n\n\n<p>From terms like phishing or malware to topics such as cyberbullying or secure passwords, Cyber ABC helps explain digital risks and how to deal with them.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--70);margin-bottom:var(--wp--preset--spacing--70)\">\n<h2 class=\"wp-block-heading\">Explore the concepts<\/h2>\n\n\n\n<p>Select a concept to learn about digital safety in a simple and practical way.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group kng-abc-section has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\">DIGITAL SAFETY<\/h2>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul style=\"border-style:none;border-width:0px;\" class=\"columns-3 wp-block-post-template is-layout-grid wp-container-core-post-template-is-layout-4142fc9f wp-block-post-template-is-layout-grid\"><li class=\"wp-block-post post-271 post type-post status-publish format-standard hentry category-cyber-abc tag-digital-security\">\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"min-height:50px;margin-top:0;margin-bottom:0\"><h3 style=\"padding-bottom:var(--wp--preset--spacing--20);margin-top:var(--wp--preset--spacing--30);margin-bottom:var(--wp--preset--spacing--30);\" class=\"has-text-align-center wp-block-post-title\">Phishing<\/h3><\/div>\n\n\n\n<div class=\"wp-block-group is-style-default has-global-padding is-layout-constrained wp-container-core-group-is-layout-55918c90 wp-block-group-is-layout-constrained\" style=\"border-style:none;border-width:0px;border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:0px;border-bottom-right-radius:0px;min-height:100px;margin-top:0;margin-bottom:0\"><div style=\"padding-top:0;padding-bottom:0;margin-top:0;margin-bottom:0;\" class=\"has-text-align-center wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\"> <\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-group has-global-padding is-content-justification-center is-layout-constrained wp-container-core-group-is-layout-59f5ff69 wp-block-group-is-layout-constrained\" style=\"padding-right:var(--wp--preset--spacing--70);padding-left:var(--wp--preset--spacing--70)\"><a style=\"border-width:0px; padding-top:var(--wp--preset--spacing--20);padding-right:var(--wp--preset--spacing--20);padding-left:var(--wp--preset--spacing--20);margin-top:var(--wp--preset--spacing--30);margin-bottom:var(--wp--preset--spacing--30);\" class=\"wp-block-read-more\" href=\"https:\/\/kidsnetguard.com\/en\/2026\/03\/31\/phishing\/\" target=\"_self\">Explore<span class=\"screen-reader-text\">: Phishing<\/span><\/a><\/div>\n\n<\/li><\/ul>\n\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group kng-abc-section has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\">INTERACTION AND RISKS<\/h2>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\">\n\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group kng-abc-section has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\">IDENTITY AND PRIVACY<\/h2>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\">\n\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group kng-abc-section has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\">DIGITAL ENVIRONMENT<\/h2>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\">\n\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group kng-abc-section has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\">DIGITAL WELL-BEING<\/h2>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\">\n\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Explore the Cyber ABC, a visual cybersecurity glossary that explains digital concepts in a clear and accessible way for children, families, and educators. From terms like phishing or malware to topics such as cyberbullying or secure passwords, Cyber ABC helps explain digital risks and how to deal with them. Explore the concepts Select a concept [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-33","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/kidsnetguard.com\/en\/wp-json\/wp\/v2\/pages\/33","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kidsnetguard.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kidsnetguard.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kidsnetguard.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kidsnetguard.com\/en\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":4,"href":"https:\/\/kidsnetguard.com\/en\/wp-json\/wp\/v2\/pages\/33\/revisions"}],"predecessor-version":[{"id":367,"href":"https:\/\/kidsnetguard.com\/en\/wp-json\/wp\/v2\/pages\/33\/revisions\/367"}],"wp:attachment":[{"href":"https:\/\/kidsnetguard.com\/en\/wp-json\/wp\/v2\/media?parent=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}