Name the four types of big data.
Attitudinal Data, Behavioral Data, Engagement Data, and Personal Data
When a hacker uses emails, fake links, or attachments to gain access.
Phishing
White hat, Gray hat, and Black hat hackers.
List one example of a professional greeting.
Dear, Hello, Greetings, Good morning, Good afternoon, Good Evening, etc.
Name one of the most common passwords
000000, qwerty, password, 123456789, abcdefg, etc.
Personally and non-personally identifiable information like your phone number or computer's IP Address.
What is Personal Data?
When an individual or group of individuals gain unauthorized access to another's information.
Hacking
A hacker that looks for vulnerabilities in an organization's system without permission and reports it to them .
What is Gray Hat Hacker?
Give one example of a professional signature.
Sincerely, Respectfully, Best, Best Wishes, Best Regards, Regards, etc.
Turn "Red lights, stop signs, I still see your face in the white cars, front yards" into a strong password.
Ex. rL$(x2)I$(2)yFI7WcFy
Data that is concerned customer satisfaction, purchase criteria, and product desirability
What is Attitudinal Data?
Hackers use a program to record the pattern and order of keys typed on the user's device.
Keylogging
Explain the difference between white hat, gray hat, and black hat hackers.
white good and permission, grey good no permission, black bad no permission.
What two things should go in the first paragraph of a professional email?
Introduce yourself, and state the reasoning for contacting them.
List a technique for creating strong passwords.
update, use uppercase, lowercase, numbers, and symbols, don't use personal information, etc.
When a company collects information like what you have saved in your cart for checkout or a bill you've paid online.
What is Behavioral Data?
A fake program downloaded on a computer which compromises the computer system, replicates itself and locks the user out of files and other information.
Virus
Name the six steps to Ethical hacking.
What is Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks, and Reporting?
What two things should go in the second paragraph of a professional email?
Thank the person for help, time, consideration, etc. and give contact information.
List a technique for keeping your information safe, other than passwords.
Use a VPN, anti-virus program, read social media site terms and use
When a company collects information on following, likes, comments, shares, or how often you click on someone's content.
What is Engagement Data?
When a hacker uses and algorithmic program to crack the user's password; the program begins with dictionary word then goes character by character
Brute Force
This step in ethical hacking is when the hacker installs "back doors" or holes in security so they can access it for future attacks.
If you do not have job experience, what should you write about instead?
Your skills, or characteristics that make you professional like on time, organized, works well with others, etc.
List another technique for keeping information safe other than passwords.
set up privacy settings, keep up to date on updates, make sure sites are secure, etc.