What is overwhelming one’s internet connection, causing them network to go offline?
DDos Attack
Can anyone get hacked online?
Y e s
Why did CNN target "Han----Solo"?
They posted a meme that they thought was mean
How can VPN's prevent hackers from getting your information?
Logs your data on a 3rd party server.
Hides your internet data
Hides your IP
If you use public wifi, what should you use to secure your connection?
VPN
What does ISP stand for?
Internet Service Provider
What are some commonly hacked accounts online?
Social Media, Financial websites, Game accounts, etc
SPECULATE
How did CNN get the reddit user's personal info
Several Answers, found their IP address, found user's personal account that had personal info, etc.
Once you login, you'll be sent a second code directly to your email or phone. What is that called?
2 Factor Authentication
What is a computer virus?
a piece of code which is capable of copying itself and typically has a detrimental effect
What is leaking a user’s real name, address, phone number, and other personal information?
Doxxing
What is a Hacker?
Someone who steals others info online
Jeff Bezos' private messages were being blackmailed. Why?
Blackmailing is an effective method to stop critics
Why is having different passwords for different websites crucial for online security?
Some websites get hacked, if so, it makes your passwords vulnerable
Why is unencrypted wifi easily exploitable?
If its not encrypted, then all data is able to be seen by EVERYONE
What is an IP adress?
Your unique code that identifies your internet router/wifi
True or False:
If you have any online accounts, they are never at risk of being hacked into
false
How did Bezos get hacked
He clicked a shady link on a messaging app
What is Click Restraint?
Its when you do not click on shady links
What are Malicious Hotspots?
These “rogue access points” trick victims into connecting to what they think is a legitimate network because the name sounds reputable.
Example. "McWifi" vs. "Mcdonalds_Wifi"
What does VPN stand for?
virtual private network.
What are the 3 generalizations of someone hacking?
Profit, grudge/vendetta, wrong place wrong time
Both Bezos and CNN case studies involved what hacking generalization?
Grudge/Vendetta
When you get a popup add that looks shady, what should you do?
Force close the web browser. Use CTRL+Shift+Esc on Windows or Command+Option+Esc on your Mac
DO NOT PRESS THE "X" BUTTON
What is Man-In-The- Middle-Attacks?
Essentially, a MitM attack is a form of eavesdropping. All data is sent to both router and hackers personal terminal