This acronym stands for information like your full name, address, SSN, and email that can identify you.
PII (Personally Identifiable Information)
These are the three factors of authentication: something you know, something you have, and this.
Something you are (biometrics)
This type of malicious program copies itself once it gains access to your computer.
A virus
This is the term for wireless access points installed without the authorization of a network administrator.
Rogue access points
This form of surveillance records every keystroke a user makes on their keyboard.
A keylogger
This crime, enabled by stolen PII, involves someone pretending to be you to open accounts or make purchases.
Identity fraud
Using your bank card plus a PIN is an example of combining which two authentication factors?
Something you have + something you know
This ancient encryption technique shifts each letter in a message a fixed number of places down the alphabet.
The Caesar cipher
These are two ways the internet helps society that don't involve social media.
Storing massive amounts of information and enabling technological advancement
In a phishing scam, this is what the initial email or message is compared to — just like in the sport it's named after.
Bait (phishing uses bait like fishing)
In 2011, hackers accessed names, birth dates, passwords, and credit card info from this gaming network.
The PlayStation Network (PSN)
A password under this many characters is considered short and weak.
8 characters
Unlike a Caesar cipher, this encryption method uses two keys — one public, one private.
Asymmetric encryption (public key encryption)
This term describes information overload, especially when misinformation is hard to weed out.
Infobesity
Phishing scams sometimes include deliberate spelling errors for this strategic reason.
To filter for less savvy (easier to trick) targets
These are two benefits of sharing PII online — one involving purchases, one involving personalized suggestions.
Seamless transactions (saved payment info) and tailored recommendations
This is the recommended minimum length for a strong password.
12–16 characters
This digital credential works like an ID for a website, proving its legitimacy and encrypting your data.
A digital certificate
Rogue access points are dangerous partly because of this "snowball" effect — describe it.
Once someone enters via a rogue access point, they can create more, rapidly expanding the security problem
Keyloggers are hardware- or software-based. Name two other types of malware they are often combined with.
Adware, spyware, and/or ransomware
These are the four main privacy risks of sharing PII online.
Data breaches, manipulation and exploitation, privacy invasion, and identity fraud
This practice — using a different password for every account — protects your other accounts if one gets hacked.
A: Password uniqueness / using unique passwords per account
A Caesar cipher can be cracked even without knowing the shift by using this method to try all possibilities.
Brute force
: These are three physical/personal risks of misusing internet-connected equipment listed in the presentation.
Electrocution, burning, and cyberbullying
In asymmetric encryption, this key is used to encrypt a message, while the other key is used to decrypt it.
The public key encrypts; the private key decrypts