Risk and Risk Management
Information Security
Cyber Threats
Computer Networks
Miscellaneous
100

The possibility of something bad/damage happening to an information system.

What is a risk?

100

The state of keeping or being kept secret or private.

What is confidentiality?

100

This person performs malicious acts on computers and/or networks for their personal gain.

What is a hacker?

100

A wireless technology used to share data over a short distance. E.g., connecting earphones or a watch to a cellphone.

What is Bluetooth?

100

A type of social engineering where an attacker sends a fraudulent email designed to trick a human victim into revealing sensitive information to the attacker.

What is Phishing?

200

A flaw or weakness in a system’s design or operation that could be exploited to attack the system.

What is a vulnerability?

200

Double Jeopardy: "I'm a hip old granny who can hip-hop, bebop, dance til ya drop and yo-yo, make wicked cup of cocoa."

What is Mrs. Doubtfire (1993)?

200

It is a program used by hackers to crack passwords.

What is a password cracker?

200

A form of digital currency, which operates without the involvement of banks or clearinghouse. 

What is bitcoin?

200

You need to have this to gain access to the GRC.

What is a badge?

300

An insurance company may offer this type of insurance to help protect companies from losses related to cyber incidents.

What is cyber insurance?

300

A document that contains a set of rules and standards that a company publishes to protect its assets.

What is a Policy?

300

A malicious actor seeks to steal this and sell it on the dark web.

What is personal data or Personally Identifiable Information (PII)?

300

A network security system that monitors, blocks and controls incoming and outgoing network traffic based on pre-determined security rules.

What is a firewall?

300

This process converts plaintext data into an alternative form known as ciphertext, making the message unreadable.

What is Encryption?

400

Reducing the likelihood of the risk.

What is risk mitigation/control?

400

Requires users to provide two authentication factors that includes a combination of something the user knows --like a password or PIN; something the user has -- like an ID card, security token or smartphone; or something the user is --biometrics.

What is two-factor authentication/multi-factor authentication?

400

Malware that holds a computer captive until the owner pays the demanded ransom.

What is ransomware?

400

Double Jeopardy: "Show me the money!”

What is Jerry Maguire (1996)?

400

Double Jeopardy: "I got thrown out of a window, man!"

What is Beverly Hills Cop (1984)? 

500

An exercise performed to assess the risk and determine its impact to an organization.

What is a Risk Assessment?

500

You should report suspicious emails to this mailbox.

What is infosec@lcecorp.com?

500

Hacker group that pays employees for their credentials. This group also hacked Uber. 

What is Lapsus$?

500

It is a secure connection for users to work remotely and access corporate systems. It is abbreviated as VPN.

What is Virtual Private Network?

500

It has "HTTPs”, and it has a lock showing on the URL.

What is secure website?

M
e
n
u