Security
This name for portable equipment includes laptops, smartphones, tablets, and wearables.
What are Mobile Devices?
This modern method of remote communication using a webcam allows people to interact through audio and visual means, eliminating the need for physical presence.
What is a Video Conferencing?
I guard the entrance with numbers and codes, Press my buttons in the right mode. With sequence precise, you'll gain access.
What is a Keypad?
A fraudulent email pretending to be from your bank and asking for your login information is a classic example of what kind of simple cyberattack, which is by far the most common form of social engineering.
What is Phishing?
Make sure you have this feature turned on so that after a period of inactivity the screen is blocked from unwanted use.
What is Auto-lock or Screen-lock?
Commonly called as a network name, is a sequence of characters that uniquely names a Wi-Fi network.
What is SSID (Service Set Identifier)?
I'm a security measure, simple but profound. No connections allowed, no digital sound. I keep systems apart, ensuring isolation, protecting them from cyber infestation.
What is Air Gap?
This “sense” is often manipulated by threat actors in order to have a victim perform an action without fully analyzing the situation.
What is Sense of Urgency?
This occurs when an unauthorized person steals, moves or transfers data from a device or network.
What is Data Exfiltration?
Most home network devices are pre-configured with _____ administrator passwords to simplify setup. These _____ credentials are not secure. They may even be physically labelled on the device itself.
What is default?
This traffic control device shares its name with a common electrical component. This device represented by a triangular icon restricts network traffic to a single direction.
What is a data diode?
Threat actors attempt to obtain account credentials for this commonly used computer stored messaging system in order to impersonate the victim.
What is an Email?
These two features should be disabled on your computer so that any malware on removable media does not automatically spawn its payloads.
What are Autorun and Autostart?
This is a common term for annoying and unnecessary software pre-loaded on many computers and phones. If you don’t remove these, your device might feel a bit too full.. like it ate too much at a buffet.
What is Bloatware?
These two types of cyber assets represent the most critical digital devices at OPG Nuclear plants and RG sites, requiring extra controls to protect them (Two answers).
What is a CEA (Cyber Essential Asset) and a BES Cyber Asset?
This artificial intelligence tool uses an audio sample from a victim to impersonate them.
What is AI Voice Cloning?
Attackers will commonly exploit the most vulnerable asset on a network and use this type of movement to get deeper into the network.
What is Lateral Network Movement?
Don’t forget to disable this networking feature when not needed, that allows networked devices to play nice and seamlessly discover and establish communication with each other on the network.
What is Universal Plug and Play?
I am a technology is built into most network traffic control devices, scanning traffic to detect malicious actors and code, and alerting cyber security.
What is an IDS (Intrusion Detection System)?
This term refers to artificial intelligence technology that can create convincing pictures or video hoaxes
What is Deepfake Technology?