What are 3 examples of things in a digital footprint?
Emails, comments, pictures, posts, searches, app use, history, purchases, etc.
The 's' in https:// stands for...
Secure
"Secure by design" is a preventative or reactive measure against cybersecurity breaches?
Preventative
Using an online search engine, how would you group the words ANOTHER ONE BITES THE DUST into a single search term?
Use quotation marks:
"ANOTHER ONE BITES THE DUST"
True or False: Distributing copyrighted materials over file-sharing networks is a violation of the law.
True
What are the three major types of hackers?
White hat, black hat, and grey hat
Fill in the blank. Your digital footprint is always ____.
growing
What is 2-factor authentication?
A login process that requires 2 pieces of information
"Security by design" means companies address security risks and concerns when?
At the beginning of a project
Using an online search engine, how do you search for hats but exclude cowboy hats from the results?
Use a minus sign (-):
hats -cowboy
What is copyright?
A form of protection for intellectual property, usually applying to artistic works
Which of the following describes an instance of legal hacking?
A) Looking for security risks on a product that is excluded from a bug bounty program.
B) Penetration testing for a company
C) Grey hat hacking
D) Security hacking is never legal
B
Who looks at your digital footprint?
Schools, colleges, employers, friends, family, the list goes on
Apps must ask for ____ to access and use hardware (camera, mic) and files.
Permission
Fill in the blank. A privacy policy discloses how a company u____, s____, and g____ your data. (First letters given as hints)
USES, SHARES, and GATHERS
Fill in the blanks. Information literacy is having the ability to ____, ____, and ____ information effectively.
FIND, EVALUATE, and USE
Write the 3 types of copyright licenses from most restrictive to least restrictive.
1 - All Rights Reserved
2 - Some Rights Reserved
3 - Public Domain
What is NOT true of white hat hackers?
A) They contribute to robust security systems
B) They use the same methods as black hat hackers
C) They alert companies of security vulnerabilities
D) They are breaking the law and are at risk of legal repercussions
D
What happens when you delete something?
The storage directory marks the place where it is saved as "empty" or free to be rewritten, but the actual data remains. Any shared content that is deleted is only removed from your access but still exists on servers.
What is phishing?
Method to gather personal info; uses deceptive emails and websites
Write as many ways to make a strong password as possible.
8+ characters; capitals + lowercase; mix letters, numbers, & symbols; different passwords for different accounts; etc.
Give 2 examples of ways advertisers must disclose (label or announce) sponsored content (ads).
VERBALLY: YouTube creator says "this video is sponsored by..."
VISUALLY: Label on search result or under video title
When determining Fair Use, group the following into relevant and irrelevant factors to consider? Be ready to justify your answers.
A) Creativity of the secondary work
B) Platform/distributor of the original work
C) Degrees & certifications held by the original author
D) Financial impact of the secondary work on the original work
Relevant: D
Irrelevant: C
Arguable: A, B
What is "hacktivism" and is it legal?
Hacking to promote a political agenda or social change. It is illegal.
What are 4 ways you can maintain your digital footprint?
Which of the following is/are good ways to store passwords? Be prepared to justify your answers.
A) In an unencrypted text file
B) On a piece of paper
C) Use a password manager
D) Use "Login with Google"
E) Reset your password everytime (use "Forgot your password")
Good: B,C,D
Bad: A,E
Answers may vary depending on justifications
1) How does Google get info from you?
2) What info does Google collect?
3) What is Google's reasoning for collecting your personal info?
1) Monitoring app, browser, & device usage & interaction
2) Search terms, browsing activity & history, purchases, people with whom you communicate/share content, location, device data & settings
3) Maintain & improve Google apps & services, make new services, personalize, measure performance, communicate, protect users
List 5 things to look for when judging a source's legitimacy and credibility. (100 pts per item)
Author, date, sources, domain, site design, writing style
When determining if something is Fair Use, four factors can be used. Fill in the blanks with either "original" or "secondary"
1) Purpose of the ____ work
2) Nature of the ____ work
3) Amount (or portion) of the ____ work used
4) Effect of the ____ work on value of the ____
1) SECONDARY
2) ORIGINAL
3) ORIGINAL
4) SECONDARY ... ORIGINAL
What is a "Bug Bounty" initiative?
Companies pay individuals to find and report vulnerabilities. This strengthens their security.