The teacher locks the computers in a storage closet at the end of the day
Physical
__ is protection against unauthorized access or misuse of information
Confidentiality
Asking for feedback is an example of
Soft skills
This cyberattack involves sending out a lot of emails pretending to be someone else, like a bank or big company like Amazon or Best Buy
phishing
The intersection between confidentiality, integrity, and availability can be represented by this kind of graphic device
Venn Diagram
To visit my island in Animal Crossing, you need to have the Dodo Code (a special password that is new each time you visit)
Digital
___ is protection against unauthorized alteration of information
Integrity
A ___ examines code for the parts that have been changed by a hacker.
a) programmer
b) mathematician
c) linguist
a) programmer
This attack involves a network of computers that has been taken over and is being controlled
botnets
This is a good tool to spread awareness on a social media site
A hashtag
My ring doorbell alerts me when someone is on my porch
Physical- deters intruders because of camera
Digital- provides an alert & digital record
___ refers to who has access to what tools/data at what time
Accessibility
A ___ detects language patterns in encoded materials.
a) political scientist
b) programmer
c) linguist
c) linguist
This attack prevents legitimate users from accessing a device or system
denial of service
Who is the most responsible for your cybersecurity?
You!
A smart lock that is connected to Amazon Alexa
Physical - the lock
Digital - Alexa/wifi connection
Leslie is very careful to make sure her social media profiles are all set to private, and that her friends never tag her in their public posts. She is concerned about the ___ of her information.
Accessibility
A ___ understands what regions in the world might be interested in developing a cyberattack.
a) mathematician
b) linguist
c) political scientist
c) political scientist
In this attack, hackers collect information from messages that are sent across a network without the sender or recipient realizing what is going on
eavesdropping
How many open cybersecurity jobs were there this year in the world?
3 million!
A guard dog protecting a herd of goats
Physical
Jose says he will never post anything that contains his geolocation tag, and puts his photos through a special "scrubber" program before he posts them on social media. This is a good strategy that focuses on protecting the location's _______.
Confidentiality
Imagine you are working on a group project but you have a group member who has not contributed any work and is not responding to the group text.
What kind of approach would demonstrate strong soft skills?
a) Take their editing permissions away and kick them out of the group chat
b) Ask the teacher to move them out of the group
c) Ask the teacher for advice
d) Ignore them and finish the project without them
c) ask the teacher for advice
In this attack, code is injected into a database through a form (like a login form) and the information stored in the database is leaked out
SQL Injection
There’s a one-story house in which everything is yellow.
Yellow walls, yellow doors, yellow furniture.
What color are the stairs?
There are no stairs, it's a one story house!