Introduction
Creating strong Passwords
Storing Passwords
Password Supplements
Cybersecurity
Principles
100

What is my first name?

What is Andrew.

100

True or False: Passwords should be all lowercase letters.

What is False. Passwords should include Upper-Case and lower-case letters.

100

What is the first thing you should do once you create a password?

What is write it down.

100

True or false, your fingerprints can be used as a supplement to your passwords.

What is true.

100

Finish this sentence, EASY PASSWORDS ARE EASY TO _____ ?

What is STEAL.

200

What Degree do I have?

What is Cybersecurity.

200

Someone's password is "A whale in Sky 158%" (AwhaleinSky158%). 

What type of password creation scheme does this password use?

What is Phrases.

200

What are the two ways you can store a password?

What is digitally or on paper.

200
True or False: Your hair can be used as a Biometric Supplement to your password.

What is false.

200
This Cybersecurity principle reminds us of an action we should take a few times a year and IMMEDIATELY if our passwords are hacked. What is this principle?

What is UPDATE YOUR PASSWORDS.

300

What is my email?

What is Seclabs115@gmail.com.

300

How long should your password be?

Passwords should be at least 12 characters long.

300

This is a safe and secure option for storing a physical password list so no one can accidentally toss it away or misplace it.

What is putting it in a safe or a safe area.

300

True or False: All computers have Biometrics built into them.

False, only modern phones, laptops, computers etc.. have biometrics built in.

300

True or False: If I keep a notebook with me at all times with my passwords, am I storing my passwords correctly?

What is False. You should ALWAYS HAVE A BACK-UP COPY OF YOUR PASSWORDS.

400

Name one goal I have for this class, there were three different goals, just name one.

What is:

- To make you more aware of Cybersecurity principles in general.

  - To make you aware of specific Cybersecurity issues that target seniors.

  - To give you simple solutions to these issues.

400

@, & and * are all examples of what kind  symbols required for a strong password?

What is a special character.

400

Whether it’s for your phone, your bills, or your social media, this method helps you keep passwords easy to find and not all jumbled together.

What is passwords should be organized.

400

What type of password supplement sends confirmation via email, text or phone call?

What is Two Factor Authentication.

400
This principle refers to something which helps add more security to our passwords. It also alerts us when someone else tries to access our accounts. What is this principle?

What is USE MULTI-FACTOR AUTHENTICATION WHEN YOU CAN.

500

Name a future class from our Outline. There were three, just name one.

What is:

3.Safe Online Shopping & Banking

4.Social Media Privacy & Security

5.How to Keep Personal Information Private

500

Someone likes saying "1 Red apples and 5 purple grapes".

They want a shorter password from it, so they create the password "1Ra&5pg".

What type of password creation scheme are they using? 

What is a Mnemonic Phrase.

500

Adding this to how you store your password helps you distinguish between your Facebook account and your Phone account. It also includes things like the phone number that will be texted after you enter this password.

What are labels.

500

This cybersecurity term describes the practices and principles involved in creating, managing, and protecting your passwords to enhance security. What is it called?

What is Password Hygiene.

500

It’s not spooky, but it haunts families when no one can access your email, bills, or phone. What Cybersecurity principle does this refer to?

What is SOMEONE NEEDS TO KNOW.

M
e
n
u