Popcorn Hack 1: which of the following is considered PII
A. fingerprint B. favorite color C. zip code D. job title
Answer: a fingerprint would be considered PII because it contains biometric data, which is very sensitive.
Pop Quiz: Multifactor Authentication
Which of the following is NOT an example of a multifactor authentication (MFA) factor?
A. A password used to log into an email account. B. A verification code sent to a user’s phone. C. A fingerprint scan on a smartphone. D. A username required to log in.
Answer: a password and a username are not examples of MFA because both of these are the basic requirements for logging into an account. A verification and a fingerprint scan are both a second layer of security, but a username and password are required.
Popcorn Hack 2: Encryption Quiz
Which of the following is an example of symmetric encryption?
A. Evy buys a locked box that operates using two different codes. When the first code is entered, a slot opens that allows a message to be put in the box. When the second code is entered, the door to the box opens. Evy gives the first code to her friends so they can leave messages for her and keeps the second code to herself so that she is the only one who can retrieve the messages.
B. Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.
C. Hannah writes a message to send to Isabel and hides the message under a rock behind the soccer field. Hannah gives Isabel the exact location of the rock so that only Isabel can find the message.
D. Juan writes a message to send to Kelly and slides the message through a slot in the front of Kelly’s locker. Juan knows that Kelly has not shared her locker combination with anyone, so no one other than Kelly will be able to read the message.
Answer: Choice B is a good example of symmetric encryption because Finn and Gwen map each letter to a unique symbol using a key, which means the same key can be used for both encryption and decryption.
Popcorn Hack: Password Security
Go to security.org/how-secure-is-my-password and make a secure password.
Write and discuss with the people around you about what makes a good password.
A good password must be long and contain a variety of characters (eg. both uppercase and lowercase letters, numbers, and special characters). This makes the password harder to decrypt because it would take much longer for a computer to iterate and get to this password. The password must especially not be a common word or phrase (eg. password123
) because these passwords could be in a wordlist of most common passwords that a computer could use to decrypt it quickly.