Authentication Methods
Password Attacks
Password Best Practices
Data Breaches
AAA Reveiw
100

Name the three ways to authenticate yourself

Something you know, something you have, something you are

100

The #1 method hackers use to steal passwords?

What is -Steal it directly (shoulder surfing, keylogger, written down password)

100

True/False:  It takes several hours to crack a password that is 8 characters and is all numbers

False - It can be cracked instantly

100

When a database is exposed or stolen, making user data at risk 

What is a data breach?

100

The AAA stands for this in cybersecurity?

Authentication, Authorization (Access Control), Accounting (Auditing)

200

What type of authentication is a password?

Something you know

200

Software that rapidly tests all possible character combinations to guess a password

What is a brute force attack?

200

True/False:  Women tend to use hobbies for their passwords

False

200

When your account or data has been compromised in a breach 

What does "pwned" mean in cybersecurity?

200

Authentication proves WHO you are; ____________ determines WHAT you can access 

authorization

300

Smart card, ID card, phone with code, security token are examples of 


What is "something you have" authentication

300

Tries one weak password on many accounts; brute force tries many passwords on one account

What is password spraying

300

True or False: It's okay to use the same password for multiple accounts if it's a strong password

FALSE - Always use unique passwords for each account

300

What should you do if you find out your email was in a data breach?

Change your password immediately, especially on any other accounts using the same password

300

System logs, login history, security camera footage, transaction records, audit trails  are real-world example of  

accounting/auditing

400

Something you are - uses physical characteristics like fingerprint, face scan, retina scan 

What is biometric authentication? 

400

Using stolen username/password pairs from one breach to access accounts on other sites. Works because 52% of people reuse passwords


What is credential stuffing

400

Name three things a strong password should include

Uppercase letters, lowercase letters, numbers, symbols, 8 +

400

This is a main target for hackers.  It contains thousands or millions of user credentials at once, which can then be used for credential stuffing attacks instead of attacking individual accounts.

Databases 

400

It tracks what happened, helps detect breaches or suspicious activity, provides evidence for investigations, and holds users accountable

ccounting/auditing

500

Combines two or more authentication methods, so even if one is compromised, the account is still protected  

What is multi-factor authentication

500

Uses a database of common words, phrases, names, and character substitutions that people likely use, making it faster than trying every possible combination

What is a dictionary attack 

500

The minimum recommended password length?  Should be more than ____ - _______ characters long

  •  At least 8-12 characters (12+ is better!)

500

According to research, what percentage of people reuse their passwords across multiple accounts?

52% have a "favorite" password they use on multiple accounts

500

This is the most secure authentication method combining two or more methods to access an account

Multifactor Authentication