Big Data
Processing Data
Data Privacy and Cybersecurity
Encryption
Passwords and Phishing
100

This is the term for a large or massive amount of data.

Big Data?

100

A location is this kind of data

What is sensor data?

100
A good business uses their privacy policies as a way of maintaining this with their customers. 

What is Transparency?

100

This person is in charge of protecting data

Who is the person receiving and collecting the data

100

This type of attack involves trying every possible combination of password characters

Brute Force Attack

200

List 3 types of data

Answers may vary

200

Getting rid of duplicate data would occur in this step

What is data cleaning?

200

This document is required to disclose information about your datas collection and use

Privacy Policy

200

A Cesar cipher creates keys using this 

What is an alphabet shift?

200
This is a type of password attack which involves guessing personal information.

What is guessing?

300
The trash bin on a computer would be an example of this kind of data

What is unstructured data?

300
The term for collecting data from a large group of people to generate ideas is this. 

What is crowdsourcing?

300

Describe the difference between a man-in-the-middle attack and an eavesdropping attack.

How the data is taken. 

300

This is a real world cipher still used today

What is the AES-128?

300

List ALL 6 ways that a password can be strengthened

Length, Complexity, Avoid Personal, Avoid Common, Unique, Passphrases

400

What are the 3 V's of Big Data and how do they relate to big data?

Volume (high) Velocity (high) Variety (wide)
400

This statistical method makes predictions about future data

What is regression analysis?

400

A data breach can affect both the customer and businesses in these ways.

Identity theft, financial loss, reputation. 

400

The main difference between these two things is the number and type of keys used. 

What are symmetric and asymmetric encryption?

400

Describe one phishing scam and how it relates to each characteristic of a phishing scam

Answer will vary..
500

What is the difference between a data warehouse and a distributed file system?

One place for data vs. many places for data

500

Give 2 reasons that metadata is collected

Searchability, organiation, data integrity, data sharing

500

A method used to protect data is this, possibly another category in this jeopardy. 

What is Encryption?

500

Define all 3 of the following terms. Encryption, Decryption, Hacking.

Answers will vary...

500

Define keylogging

Malware keeps track of keystrokes on the computer