Data you leave behind whenever you use the internet.
Digital Footprint
What types of information do people commonly overshare on social media that attackers find valuable?
Relationships, Personal Information, Locations
Gavin shares on Instagram his current location and tags everyone he is with. What vocab term is this?
Oversharing
How many different numbers can you represent with 5 bits.
32 numbers.
Which blood type is a universal donor?
O Negative
Sharing too much information about someone's or your personal life.
Oversharing
What is OSINT and how would an attacker use public social media profiles to target someone?
Open-source intelligence is where you gather information and include social media platforms. Hackers use it to collect information on people, so they can target that with more personal attacks.
Kevin goes to his settings in Tik Tok to manage what personal information is given. What vocab term is this?
Privacy Settings
The separation of a program into independent modules that are each responsible for one aspect of the program's functionality.
Modularity
What is the largest country in the world?
Russia
Stealing someone's personal information to impersonate them.
Identity Theft
How can photo metadata (EXIF data) reveal your location without you knowing?
Hidden information in EXIF data of an image can show hackers where you are which can be used to track you in real life. It can reveal spots you frequent or even your home address.
Karen leaves a comment on a video. What vocab term is this?
Digital Footprint
The repetition of steps in an algorithm or program for a certain amount of times or until a certain condition is met.
Iteration
In 1863, what memorable speech did Abraham Lincoln give during the dedication of the Soldiers’ National Cemetery?
The Gettysburg Address
Psychological manipulation into preforming actions or giving confidential information/data.
Social Engineering
What are the most important privacy settings on Instagram, TikTok, or Snapchat — and what do they actually do?
On Instagram and TikTok you can make your account private and can limit who can follow you and who can see your content.
Grandma Jane receives an AI generated call with her granddaughters voice telling her she needs $1000. What vocab term is this?
Social Engineering
Famous undecidable problem proved by Alan Turing.
Halting Problem.
What is Avogadro's Number?
6.022 x 10^23
Collecting and using publicly available information for decision making in business, security, and research.
Open Source Intelligence (OSINT)
How can attackers use information from social media to guess security questions or reset passwords?
Attackers can use information from your personal life and following on social media to guess security questions like “What is your mother's maiden name?” or “What is your childhood pets name?” Answers to these questions can easily be found on social media and then be used to access your information.
Sara trusts her friend Mina a lot so, she sends her credit card information through Instagram DM's to treat Mina for her birthday. True or False. Is this a safe Social Media Practice?
False
Who are the co-creators of the Internet?
Vint Cerf and Bob Kahn
What is the longest river in Europe?
Volga