ID&AM
Cyber
The Enemy
Risk
Scott
100

Validate the identity of the user

What is authentication?

100

What are the three common controls to protect the availability of data?

Redundancy, backups and access controls.

100

The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

What is Social Engineering?

100

Who is ultimately responsible for accepting information security risks?

Who is the CEO?

100

What city did I move from?

What is Greenville, SC?

200

An electronic version of Noah's boat.

What is Cyberark?

200

Both are programs that self-replicate (can download automatically), but only this one requires you to do something, such as click on an email link, to actually activate it.

What is a virus?

200

Someone watching what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.

What is shoulder surfing?

200

Management has a default responsibility to protect valuable information assets under their care.

What is Due Diligence?

200

What hospital did I work at previously?

What is Mission Health?

300

An open standard for user authentication by third parties e.g. Google, Microsoft, and Yahoo.

What is OpenID?

300

What is the missing incident response step

1. PREPARATION 2. DETECTION AND REPORTING 3.  4. CONTAINMENT AND NEUTRALIZATION 5. POST-INCIDENT ACTIVITY

TRIAGE AND ANALYSIS

300

30-50% of all data loss due to the people already within the organization

What is insider threat?

300

Three types of information security threats.

What is external threats, environmental or physical threats, and internal threats?

300

What city do I live in?

What is Westfield, Indiana?

400

Systems used for identity and access management include single sign-on systems, multi-factor authentication and

Privileged access management (PAM)

400

What are the 5 pillars of the NIST Cyber Security Framework?

Identify, Protect, Detect, Respond & Recover.

400

What are the two major means phishing is done through?

What is email and domain phishing?

400

Given the following: a.)  The impact of a single laptop being lost or stolen is estimated at $50,000. b.)  Because of inadequate security controls, it is estimated that three laptops will be lost or stolen per year. What is the annual loss expectancy from lost or stolen laptops?

What is $150,000

400

How many children do I have?

What is 4?

500

Random value used to periodically authenticate the receiving system

What is a nonce?

500

Information provided by the United States Computer Readiness Team regarding cyber security breaches around the country.

What is a cyber security bulletin?

500

If you receive any suspicious email in Outlook, where should you report it to?

What is the PhishMe button?

500

Fact Analysis of Information Risk

What is the FAIR process

500

How many branches of the military did I serve in?


Daily Double, what are they?

Two. What is the Army and Navy?

M
e
n
u