Skip to the content.

BI 5 Safe Computing

Popcorn Hack #1: Identifying PII

Which of the following is considered PII? A. Fingerprint B. Favorite Color C. Zip Code D. Job Title

Correct Answer: A –> A fingerprint is unique to each user.

Popcorn Hack #2: Encryption Quiz

Which of the following is an example of symmetric encryption? A. Evy buys a locked box that operates using two different codes. When the first code is entered, a slot opens that allows a message to be put in the box. When the second code is entered, the door to the box opens. Evy gives the first code to her friends so they can leave messages for her and keeps the second code to herself so that she is the only one who can retrieve the messages. B. Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter. C. Hannah writes a message to send to Isabel and hides the message under a rock behind the soccer field. Hannah gives Isabel the exact location of the rock so that only Isabel can find the message. D. Juan writes a message to send to Kelly and slides the message through a slot in the front of Kelly’s locker. Juan knows that Kelly has not shared her locker combination with anyone, so no one other than Kelly will be able to read the message.

Correct Answer: B –> Finn and Gwen are able to decrypt an encrypted message using the same key.

Popcorn Hack: Password Security

The passwords I tested were my personal passwords, which I found were only moderately strong, and some would take only a couple of days to crack. What makes a password secure is its uniqueness and unrelatability to the user. If a user were to put their full name as their password, it would not be a strong password since hackers will guess your password very easily. Meanwhile, if a user were to put a more cryptic piece of information, like their second cousin’s last name with multiple unique symbols / numbers such as 4, 8, !, @, etc., it would be much harder for hackers to guess.