PII
Authentication & Passwords
Viruses & Encryption
Internet Safety
Threats & Scams
100

This acronym stands for information like your full name, address, SSN, and email that can identify you.

PII (Personally Identifiable Information)

100

These are the three factors of authentication: something you know, something you have, and this.

Something you are (biometrics)

100

This type of malicious program copies itself once it gains access to your computer.

A virus

100

This is the term for wireless access points installed without the authorization of a network administrator.

Rogue access points

100

This form of surveillance records every keystroke a user makes on their keyboard.

A keylogger

200

This crime, enabled by stolen PII, involves someone pretending to be you to open accounts or make purchases.

Identity fraud

200

Using your bank card plus a PIN is an example of combining which two authentication factors?

Something you have + something you know

200

This ancient encryption technique shifts each letter in a message a fixed number of places down the alphabet. 

The Caesar cipher

200

These are two ways the internet helps society that don't involve social media.

Storing massive amounts of information and enabling technological advancement

200

In a phishing scam, this is what the initial email or message is compared to — just like in the sport it's named after.

Bait (phishing uses bait like fishing)

300

In 2011, hackers accessed names, birth dates, passwords, and credit card info from this gaming network.

The PlayStation Network (PSN)

300

A password under this many characters is considered short and weak.

8 characters

300

Unlike a Caesar cipher, this encryption method uses two keys — one public, one private.

Asymmetric encryption (public key encryption)

300

This term describes information overload, especially when misinformation is hard to weed out.

Infobesity

300

Phishing scams sometimes include deliberate spelling errors for this strategic reason.

To filter for less savvy (easier to trick) targets

400

These are two benefits of sharing PII online — one involving purchases, one involving personalized suggestions.

Seamless transactions (saved payment info) and tailored recommendations

400

This is the recommended minimum length for a strong password.

12–16 characters

400

This digital credential works like an ID for a website, proving its legitimacy and encrypting your data.

A digital certificate

400

Rogue access points are dangerous partly because of this "snowball" effect — describe it.

Once someone enters via a rogue access point, they can create more, rapidly expanding the security problem

400

Keyloggers are hardware- or software-based. Name two other types of malware they are often combined with.

 Adware, spyware, and/or ransomware

500

These are the four main privacy risks of sharing PII online.

Data breaches, manipulation and exploitation, privacy invasion, and identity fraud

500

This practice — using a different password for every account — protects your other accounts if one gets hacked.

A: Password uniqueness / using unique passwords per account

500

A Caesar cipher can be cracked even without knowing the shift by using this method to try all possibilities.

Brute force

500

: These are three physical/personal risks of misusing internet-connected equipment listed in the presentation.

Electrocution, burning, and cyberbullying

500

In asymmetric encryption, this key is used to encrypt a message, while the other key is used to decrypt it.

The public key encrypts; the private key decrypts

M
e
n
u