Skip to the content.

elliot team teach

team teaach

Popcorn Hack: Identify PII

Question: Which of the following is considered PII (Personally Identifiable Information)?

A. Fingerprint B. Favorite Color
C. Zip Code D. Job Title

Correct Answer: A. Fingerprint

Explanation: A fingerprint is biometric data that uniquely identifies an individual and is therefore considered PII. While zip codes can sometimes be used as part of a larger data set to identify individuals, they are not inherently PII on their own. Favorite colors and job titles are generally not unique enough to identify specific individuals.

Pop Quiz: Multifactor Authentication

Question: Which of the following is NOT an example of a multifactor authentication (MFA) factor?

A. A password used to log into an email account. B. A verification code sent to a user’s phone. C. A fingerprint scan on a smartphone. D. A username required to log in.

Correct Answer: C. A fingerprint scan on a smartphone.

Explanation: A username is an identifier that tells the system which account you’re trying to access, but it doesn’t authenticate that you are the rightful owner of that account. The three main factors of authentication are:

  1. Something you know (like passwords) - Option A
  2. Something you have (like a phone receiving verification codes) - Option B
  3. Something you are (like biometric data) - Option C

Usernames are identifiers, not authentication factors, as they’re often publicly known and don’t verify identity.

Popcorn Hack: Encryption Quiz

Question: Which of the following is an example of symmetric encryption?

A. Evy buys a locked box that operates using two different codes. When the first code is entered, a slot opens that allows a message to be put in the box. When the second code is entered, the door to the box opens. Evy gives the first code to her friends so they can leave messages for her and keeps the second code to herself so that she is the only one who can retrieve the messages.

B. Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.

C. Hannah writes a message to send to Isabel and hides the message under a rock behind the soccer field. Hannah gives Isabel the exact location of the rock so that only Isabel can find the message.

D. Juan writes a message to send to Kelly and slides the message through a slot in the front of Kelly’s locker. Juan knows that Kelly has not shared her locker combination with anyone, so no one other than Kelly will be able to read the message.

Correct Answer: B. Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key.

Explanation: This is symmetric encryption because both parties use the same secret key for both encryption and decryption. In symmetric encryption, the same key is used to encrypt the plaintext into ciphertext and decrypt the ciphertext back into plaintext. Option A describes asymmetric encryption (using different keys), while options C and D don’t involve encryption at all, just secure delivery methods.

🔑 Popcorn Hack: Password Security

Activity

  1. Visit the Password Strength Checker:
    Go to security.org/how-secure-is-my-password to test the strength of your current passwords.

  2. Create a Secure Password:
    Use the tool to generate a strong, unique password for your accounts.

  3. Discuss with Peers:
    Share and discuss with those around you about what makes a good password and strategies for maintaining password security.


🔐 What Makes a Good Password?

A strong password is crucial for protecting your personal information online. Here are key characteristics of a secure password:

  • Length: Aim for at least 12 characters; longer passwords are generally more secure.
  • Complexity: Use a mix of uppercase and lowercase letters, numbers, and special symbols.
  • Uniqueness: Avoid reusing passwords across multiple accounts. Each account should have its own distinct password.
  • Avoid Personal Information: Do not include easily guessable details like birthdays, names, or common words.

✅ Additional Tips

  • Use Passphrases:
    Consider creating a passphrase—a sequence of random words or a sentence that’s easy for you to remember but hard for others to guess.

  • Enable Two-Factor Authentication (2FA):
    Add an extra layer of security by requiring a second form of verification.

  • Utilize a Password Manager:
    These tools can generate, retrieve, and store complex passwords securely, reducing the burden of remembering multiple passwords.

By following these guidelines and engaging in discussions about password security, you can significantly enhance your online safety. 🔒