What is my first name?
What is Andrew.
True or False: Passwords should be all lowercase letters.
What is False. Passwords should include Upper-Case and lower-case letters.
What is the first thing you should do once you create a password?
What is write it down.
True or false, your fingerprints can be used as a supplement to your passwords.
What is true.
Finish this sentence, EASY PASSWORDS ARE EASY TO _____ ?
What is STEAL.
What Degree do I have?
What is Cybersecurity.
Someone's password is "A whale in Sky 158%" (AwhaleinSky158%).
What type of password creation scheme does this password use?
What is Phrases.
What are the two ways you can store a password?
What is digitally or on paper.
What is false.
What is UPDATE YOUR PASSWORDS.
What is my email?
What is Seclabs115@gmail.com.
How long should your password be?
Passwords should be at least 12 characters long.
This is a safe and secure option for storing a physical password list so no one can accidentally toss it away or misplace it.
What is putting it in a safe or a safe area.
True or False: All computers have Biometrics built into them.
False, only modern phones, laptops, computers etc.. have biometrics built in.
True or False: If I keep a notebook with me at all times with my passwords, am I storing my passwords correctly?
What is False. You should ALWAYS HAVE A BACK-UP COPY OF YOUR PASSWORDS.
Name one goal I have for this class, there were three different goals, just name one.
What is:
- To make you more aware of Cybersecurity principles in general.
- To make you aware of specific Cybersecurity issues that target seniors.
- To give you simple solutions to these issues.
@, & and * are all examples of what kind symbols required for a strong password?
What is a special character.
Whether it’s for your phone, your bills, or your social media, this method helps you keep passwords easy to find and not all jumbled together.
What is passwords should be organized.
What type of password supplement sends confirmation via email, text or phone call?
What is Two Factor Authentication.
What is USE MULTI-FACTOR AUTHENTICATION WHEN YOU CAN.
Name a future class from our Outline. There were three, just name one.
What is:
3.Safe Online Shopping & Banking
4.Social Media Privacy & Security
5.How to Keep Personal Information Private
Someone likes saying "1 Red apples and 5 purple grapes".
They want a shorter password from it, so they create the password "1Ra&5pg".
What type of password creation scheme are they using?
What is a Mnemonic Phrase.
Adding this to how you store your password helps you distinguish between your Facebook account and your Phone account. It also includes things like the phone number that will be texted after you enter this password.
What are labels.
This cybersecurity term describes the practices and principles involved in creating, managing, and protecting your passwords to enhance security. What is it called?
What is Password Hygiene.
It’s not spooky, but it haunts families when no one can access your email, bills, or phone. What Cybersecurity principle does this refer to?
What is SOMEONE NEEDS TO KNOW.