Social Media
Tactics
Insider Threat
Internet
Cybersecurity
100

Settings to restrict access to your profile.

What are privacy settings?

100

Someone gives you a USB drive that is preloaded with malware in the hope you will use the device and enable them to hack your computer.

What is Baiting?

100

An Insider's use of IT for unauthorized modification, addition, or deletion of sensitive data for personal gain, or theft of information.

What is Fraud?

100

Anti-virus, anti-spam, and firewall software. 

What are protections?

100

A system designed to prevent unauthorized access to private systems.

What is a Firewall?
200

Prime targets and venues for hackers to distribute malicious code. 

What are Social Networking sites?

200
A fake deal that tricks people into providing money, information, or service in exchange for the deal. 

What is a Scam?

200
Downloading and installing malicious code, unauthorized access to systems, disabling anti-virus software.

What are Insider Threat Indicators?

200

An identifier that tracks actions to individuals. Unique to each person.

What is an Account?

200

Malicious software that infects the computer and displays messages demanding a fee to be paid to access the system again. Many times the messages will say they will delete all data if not paid. 

What is Ransomware? 

300

It is okay to use your DoD email address on your Facebook. True or False.

What is False?

300

The strategic use of conversation to extract information from people without giving them the feeling they are being interrogated.

What is Elicitation? 

300

An insider's use of IT to steal confidential or sensitive information from the organization

What is Theft of Intellectual Property?

300

A software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

What is Malware?

300

Weakness the adversary can exploit to get critical information. 

What is vulnerability?

400

Social security number, full birth date, home address, bank account, passwords, credit card information.

What are things you shouldn't post!?!?!?

400

Publicly releasing PII retrieved from social networking sites.

What is Doxing?

400

Mental disorders, personality problems, history of rule violations, and lacking social skills

What are Insider Threat indicators?

400

The means in which information is converted into a secret code that hides the information's true meaning. The only way to read the information is to be able to unlock the code.

What is Encryption?

400

A word or phrase only you should have access to.

What is a Password?
500

Setting that logs coordinates of pictures taken on phone that could be uploaded. 

What is geotagging?

500

Usually an email that looks like it is from a legitimate organization or person. Usually contains malware through a link or file. 

What is Phishing?

500

An insider's use of IT to directly harm the organization or individual

What is Sabotage?

500

Combination of home address, phone number, banking information, medical information, social security number

What is PII?

500
Somebody who tries to gain access to a computer system remotely for personal gain.

Who is a Hacker?

M
e
n
u