{"id":1524,"date":"2026-02-01T23:43:18","date_gmt":"2026-02-01T22:43:18","guid":{"rendered":"https:\/\/scpo-cybersecurityassociation.com\/?page_id=1524"},"modified":"2026-02-01T23:46:42","modified_gmt":"2026-02-01T22:46:42","slug":"cybersecurity-purity-test","status":"publish","type":"page","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/about-us-2\/cybersecurity-purity-test\/","title":{"rendered":"Cybersecurity Purity Test"},"content":{"rendered":"\n<p class=\"has-small-font-size\"><em>The Cybersecurity Purity Test is a voluntary self-assessment developed by the SCA. It is an opportunity to reflect on your cybersecurity hygiene, inspired by the infamous <a href=\"https:\/\/ricepuritytest.com\/\">Rice Purity Test<\/a> and Tina Tarighian&#8217;s <a href=\"https:\/\/www.aipuritytest.org\/\" data-type=\"link\" data-id=\"https:\/\/www.aipuritytest.org\/\">AI Purity Test<\/a>.<\/em><\/p>\n\n\n\n<p class=\"has-small-font-size\"><strong>Caution: this is not a bucket list. Completion of all items on this test will likely result in death.<\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\">Click on every item you have done.<\/p>\n\n\n\n<form id=\"cyberTest\" style=\"max-width:600px;\">\n  <ol>\n    <!-- Questions 1\u201350: Normal risky habits -->\n    <li><label><input type=\"checkbox\" name=\"q1\"> Have you ever reused the same password across multiple accounts?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q2\"> Have you ever clicked a suspicious link in an email or message?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q3\"> Have you ever shared your password with someone else?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q4\"> Have you ignored software updates for more than a month?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q5\"> Have you ever logged into an account on public Wi-Fi without a VPN?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q6\"> Have you ever downloaded software from unofficial sources?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q7\"> Have you ever ignored two-factor authentication prompts?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q8\"> Have you ever posted your home address or phone number online?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q9\"> Have you used weak passwords like &#8220;123456&#8221; or &#8220;password&#8221;?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q10\"> Have you ever ignored browser security warnings?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q11\"> Have you connected your accounts to apps without reviewing permissions?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q12\"> Have you saved passwords in your browser without encryption?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q13\"> Have you ever ignored privacy settings on social media?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q14\"> Have you ever shared sensitive info like credit card details in chat?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q15\"> Have you clicked \u201cI agree\u201d without reading privacy policies?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q16\"> Have you ever shared your Wi-Fi password publicly?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q17\"> Have you ignored software license warnings?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q18\"> Have you reused PINs or security codes for multiple accounts?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q19\"> Have you connected a USB drive from an unknown source?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q20\"> Have you ignored antivirus warnings?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q21\"> Have you used the same email for dozens of accounts?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q22\"> Have you opened attachments without checking the sender?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q23\"> Have you ignored password expiration warnings?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q24\"> Have you used \u201cadmin\u201d as a username or password?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q25\"> Have you ever shared your location publicly online?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q26\"> Have you used an outdated browser knowingly?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q27\"> Have you clicked \u201cremind me later\u201d indefinitely on security prompts?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q28\"> Have you used your phone on public charging stations without a data blocker?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q29\"> Have you shared passwords in plain text chat or email?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q30\"> Have you ignored popups warning of malware or ransomware?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q31\"> Have you connected a personal device to your work network without permission?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q32\"> Have you left accounts logged in on public computers?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q33\"> Have you ignored HTTPS warnings on websites?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q34\"> Have you used the same password across personal and work accounts?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q35\"> Have you ignored account breach alerts?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q36\"> Have you installed browser extensions without reviewing permissions?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q37\"> Have you used default passwords on devices?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q38\"> Have you ignored cookie consent warnings without reading?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q39\"> Have you shared screenshots containing sensitive data?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q40\"> Have you ignored encryption prompts on messaging apps?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q41\"> Have you installed unverified mobile apps?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q42\"> Have you logged into public kiosks or library computers without clearing history?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q43\"> Have you ignored firmware update prompts on IoT devices?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q44\"> Have you connected smart home devices without changing default passwords?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q45\"> Have you shared cloud storage links without permissions?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q46\"> Have you ignored anti-phishing warnings in email?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q47\"> Have you used an unsecured public printer?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q48\"> Have you used the same password across personal, work, and school accounts?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q49\"> Have you forwarded sensitive emails without encryption?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q50\"> Have you ignored security warnings on mobile apps?<\/label><\/li>\n\n    <!-- Questions 51\u201380: Absurd but semi-plausible -->\n    <li><label><input type=\"checkbox\" name=\"q51\"> Have you connected to a company server without authorization?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q52\"> Have you accidentally deleted your own hard drive with malware?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q53\"> Have you shared root access with a pet?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q54\"> Have you installed software on someone else\u2019s computer without permission?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q55\"> Have you bypassed firewall protections just to see what happens?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q56\"> Have you ever \u201ctested\u201d malware in production by mistake?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q57\"> Have you run a brute-force attack on your own router?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q58\"> Have you sniffed network traffic of a public place without consent?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q59\"> Have you plugged an unknown device into your network to \u201csee what happens\u201d?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q60\"> Have you reset someone else\u2019s device remotely for fun?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q61\"> Have you run a script to collect passwords from coworkers as a prank?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q62\"> Have you ever logged into a server just to explore without permission?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q63\"> Have you tried SQL injection on a test database?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q64\"> Have you created a virus in a sandbox for curiosity?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q65\"> Have you installed monitoring software on someone else\u2019s device without consent?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q66\"> Have you attempted to guess someone\u2019s email password for fun?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q67\"> Have you ever accessed hidden features of an app or system without authorization?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q68\"> Have you attempted to break your own phone\u2019s security?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q69\"> Have you tried phishing a friend to see if they would click?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q70\"> Have you intentionally ignored security policies at work?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q71\"> Have you ever copied a colleague\u2019s credentials for testing?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q72\"> Have you tampered with security settings in an office environment?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q73\"> Have you explored network traffic of someone else\u2019s device?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q74\"> Have you accessed restricted files without permission?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q75\"> Have you intentionally disabled antivirus software for testing?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q76\"> Have you installed malicious scripts in your own sandbox environment?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q77\"> Have you explored deep system logs out of curiosity?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q78\"> Have you accidentally triggered a security alert?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q79\"> Have you tried bypassing account locks for fun?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q80\"> Have you explored open Wi-Fi networks without permission?<\/label><\/li>\n\n    <!-- Questions 81\u2013100: Ridiculous \/ impossible -->\n    <li><label><input type=\"checkbox\" name=\"q81\"> Have you hacked into the International Space Station?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q82\"> Have you stolen the source code of Skynet?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q83\"> Have you sold your biometric data on the dark web while blindfolded?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q84\"> Have you created a self-aware AI that tried to take over your computer?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q85\"> Have you accessed classified military servers for fun?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q86\"> Have you stolen cryptocurrency wallets from a government account?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q87\"> Have you launched a DDoS attack on a space satellite?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q88\"> Have you accessed the mainframe of an international bank?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q89\"> Have you bypassed airport security systems digitally?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q90\"> Have you triggered a nuclear launch simulation accidentally?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q91\"> Have you deleted the entire internet of a small country?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q92\"> Have you impersonated a government official to access data?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q93\"> Have you \u201chacked\u201d the world\u2019s largest AI in a day?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q94\"> Have you stolen classified AI research from a top university?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q95\"> Have you taken over someone\u2019s self-driving car remotely?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q96\"> Have you modified your city\u2019s traffic lights digitally?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q97\"> Have you crashed a drone fleet by hacking the control system?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q98\"> Have you accessed secret AI government files for fun?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q99\"> Have you hacked into a Mars rover?<\/label><\/li>\n    <li><label><input type=\"checkbox\" name=\"q100\"> Have you caused a global internet outage accidentally?<\/label><\/li>\n  <\/ol>\n\n  <button type=\"button\" onclick=\"calculateScore()\" style=\"margin-top:15px;\">Calculate My Score<\/button>\n<\/form>\n\n<div id=\"result\" style=\"margin-top:20px; font-weight:bold;\"><\/div>\n\n<script>\nfunction calculateScore() {\n  const checkboxes = document.querySelectorAll('#cyberTest input[type=\"checkbox\"]');\n  let checkedCount = 0;\n  checkboxes.forEach(cb => { if(cb.checked) checkedCount++; });\n  let score = 100 - checkedCount;\n  document.getElementById('result').innerHTML = `Your Cyber Purity Score: ${score}\/100`;\n}\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>The Cybersecurity Purity Test is a voluntary self-assessment developed by the SCA. It is an opportunity to reflect on your cybersecurity hygiene, inspired by the infamous Rice Purity Test and Tina Tarighian&#8217;s AI Purity Test. Caution: this is not a bucket list. Completion of all items on this test will likely result in death. Click [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":1478,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1524","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/pages\/1524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=1524"}],"version-history":[{"count":6,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/pages\/1524\/revisions"}],"predecessor-version":[{"id":1533,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/pages\/1524\/revisions\/1533"}],"up":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/pages\/1478"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=1524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}