Big Data
Hacking Terms and Techniques
Types of Hacking/ Ethical Hacking
Big Companies and Access
Keeping Information Secure
100

Name the four types of big data.

Attitudinal Data, Behavioral Data, Engagement Data, and Personal Data

100

When a hacker uses emails, fake links, or attachments to gain access.

Phishing

100
Name the three types of hackers. 

White hat, Gray hat, and Black hat hackers.

100

List 2 examples of info that Spotify collects.

address, phone type, bank account info, friends, and voice recognition
100

Name one of the most common passwords

000000, qwerty, password, 123456789, abcdefg, etc.

200

Personally and non-personally identifiable information like your phone number or computer's IP Address. 

What is Personal Data?

200

When an individual or group of individuals gain unauthorized access to another's information.

Hacking

200

A hacker that looks for vulnerabilities in an organization's system without permission and reports it to them . 

What is Gray Hat Hacker?

200

List one example of the activity that Google collects.

search terms, videos watched, views and interactions with content and ads, people you communicate and share content with, etc. 

200

Turn "Red lights, stop signs, I still see your face in the white cars, front yards" into a strong password. 

Ex. rL$(x2)I$(2)yFI7WcFy

300

Data that is concerned customer satisfaction, purchase criteria, and product desirability

What is Attitudinal Data?

300

Hackers use a program to record the pattern and order of keys typed on the user's device.

Keylogging

300

Explain the difference between white hat, gray hat, and black hat hackers. 

white good and permission, grey good no permission, black bad no permission.

300

List an example of the type of personal info Amazon collects.

payment info, address, SSN, and Driver's license

300

List a technique for creating strong passwords.

update, use uppercase, lowercase, numbers, and symbols, don't use personal information, etc. 

400

When a company collects information like what you have saved in your cart for checkout or a bill you've paid online. 

What is Behavioral Data?

400

A fake program downloaded on a computer which compromises the computer system, replicates itself and locks the user out of files and other information.

Virus

400

Name the six steps to Ethical hacking.

What is Reconnaissance, Scanning, Gaining Access, Maintaining Access, Clearing Tracks, and Reporting?

400

List 3 examples of info that twitter collects.

phone type, banking info, friends/ contacts, image and voice recognition.

400

List a technique for keeping your information safe, other than passwords. 

Use a VPN, anti-virus program, read social media site terms and use

500

When a company collects information on following, likes, comments, shares, or how often you click on someone's content. 

What is Engagement Data?

500

When a hacker uses and algorithmic program to crack the user's password; the program begins with dictionary word then goes character by character

Brute Force

500

This step in ethical hacking is when the hacker installs "back doors" or holes in security so they can access it for future attacks. 

Maintaining Access
500

List 3 examples of personal info that Instagram collects.

location, address, phone type, height, weight, employment info, pet ownership, contacts, image and voice recognition.

500

List another technique for keeping information safe other than passwords. 

set up privacy settings, keep up to date on updates, make sure sites are secure, etc.