Name the four types of big data.
Attitudinal Data, Behavioral Data, Engagement Data, and Personal Data
When a hacker uses emails, fake links, or attachments to gain access.
Phishing
White hat, Gray hat, and Black hat hackers.
List 2 examples of info that Spotify collects.
Name one of the most common passwords
000000, qwerty, password, 123456789, abcdefg, etc.
Personally and non-personally identifiable information like your phone number or computer's IP Address.
What is Personal Data?
When an individual or group of individuals gain unauthorized access to another's information.
Hacking
A hacker that looks for vulnerabilities in an organization's system without permission and reports it to them .
What is Gray Hat Hacker?
List one example of the activity that Google collects.
search terms, videos watched, views and interactions with content and ads, people you communicate and share content with, etc.
Turn "Red lights, stop signs, I still see your face in the white cars, front yards" into a strong password.
Ex. rL$(x2)I$(2)yFI7WcFy
Data that is concerned customer satisfaction, purchase criteria, and product desirability
What is Attitudinal Data?
Hackers use a program to record the pattern and order of keys typed on the user's device.
Keylogging
Explain the difference between white hat, gray hat, and black hat hackers.
white good and permission, grey good no permission, black bad no permission.
List an example of the type of personal info Amazon collects.
payment info, address, SSN, and Driver's license
List a technique for creating strong passwords.
update, use uppercase, lowercase, numbers, and symbols, don't use personal information, etc.
When a company collects information like what you have saved in your cart for checkout or a bill you've paid online.
What is Behavioral Data?
A fake program downloaded on a computer which compromises the computer system, replicates itself and locks the user out of files and other information.
Virus
Name the six steps to Ethical hacking.
What is Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks, and Reporting?
List 3 examples of info that twitter collects.
phone type, banking info, friends/ contacts, image and voice recognition.
List a technique for keeping your information safe, other than passwords.
Use a VPN, anti-virus program, read social media site terms and use
When a company collects information on following, likes, comments, shares, or how often you click on someone's content.
What is Engagement Data?
When a hacker uses and algorithmic program to crack the user's password; the program begins with dictionary word then goes character by character
Brute Force
This step in ethical hacking is when the hacker installs "back doors" or holes in security so they can access it for future attacks.
List 3 examples of personal info that Instagram collects.
location, address, phone type, height, weight, employment info, pet ownership, contacts, image and voice recognition.
List another technique for keeping information safe other than passwords.
set up privacy settings, keep up to date on updates, make sure sites are secure, etc.