Vocab
Hackers et al.
Case Studies
Prevention
Hacker techniques
100

What is overwhelming one’s internet connection, causing them network to go offline?

DDos Attack

100

Can anyone get hacked online?

Y e s

100

Why did CNN target "Han----Solo"?

They posted a meme that they thought was mean 

100

How can VPN's prevent hackers from getting your information? 

Logs your data on a 3rd party server.

Hides your internet data

Hides your IP

100

If you use public wifi, what should you use to secure your connection?

VPN

200

What does ISP stand for?

Internet Service Provider 

200

What are some commonly hacked accounts online?

Social Media, Financial websites, Game accounts, etc

200

SPECULATE 

How did CNN get the reddit user's personal info

Several Answers, found their IP address, found user's personal account that had personal info, etc.

200

Once you login, you'll be sent a second code directly to your email or phone. What is that called?

2 Factor Authentication

200

What is a computer virus?

a piece of code which is capable of copying itself and typically has a detrimental effect

300

What is leaking a user’s real name, address, phone number, and other personal information?

Doxxing

300

What is a Hacker?

Someone who steals others info online

300

Jeff Bezos' private messages were being blackmailed. Why?

Blackmailing is an effective method to stop critics 

300

Why is having different passwords for different websites crucial for online security? 


Some websites get hacked, if so, it makes your passwords vulnerable



300

Why is unencrypted wifi easily exploitable? 

If its not encrypted, then all data is able to be seen by EVERYONE 

400

What is an IP adress?

Your unique code that identifies your internet  router/wifi

400

True or False:

If you have any online accounts, they are never at risk of being hacked into

false

400

How did Bezos get hacked

He clicked a shady link on a messaging app 

400

What is Click Restraint? 

Its when you do not click on shady links

400

What are Malicious Hotspots?

These “rogue access points” trick victims into connecting to what they think is a legitimate network because the name sounds reputable.

Example. "McWifi" vs. "Mcdonalds_Wifi"

500

What does VPN stand for?

virtual private network.

500

What are the 3 generalizations of someone hacking?

Profit, grudge/vendetta, wrong place wrong time

500

Both Bezos and CNN case studies involved what hacking generalization? 

Grudge/Vendetta 

500

When you get a popup add that looks shady, what should you do?

Force close the web browser. Use CTRL+Shift+Esc on Windows or Command+Option+Esc on your Mac

DO NOT PRESS THE "X" BUTTON

500

What is Man-In-The- Middle-Attacks?

Essentially, a MitM attack is a form of eavesdropping. All data is sent to both router and hackers personal terminal