Definitions
Information
Bad Guys
Am I infected?
Red Flags
100
Taking someone else's Social Security Number, date of birth or other important personal information to establish false credentials and commit fraud.
What is Identity Theft?
100
The "do's" and "don'ts" a user must follow in order to keep themselves and their company safe from threats.
What is Security Policies?
100
A person who illegally breaks into or tries to break into networks and/or computers.
What is a Hacker?
100
Unwanted emails and some consider to be good canned meat.
What is spam?
100
How to determine where a hyperlink web address is.
What is hover your mouse over the link?
200
A Warning or danger or a problem - something doesn't seem quite right.
What is a red flag?
200
The intentional or unintentional release of secure information to an untrusted environment.
What is data breach?
200
When an attacker takes control of an established connection while it's in progress.
What is Hijacked?
200
Powerful malware that hides itself on your computer and allows those bad guys to run software on your computer.
What is a Trojan horse (shortened to be Trojan).
200
Name a Red Flag hyperlink concern when the link appears to be from a known website.
What is misspelling of a word or bad grammar?
300
Malicious Software
What is Malware?
300
Convert information using an unreadable code to prevent unauthorized access.
What is Encryption?
300
Steal your documents, Spy on you, Record your keystrokes, Encrypt your files, Break into other computers
What are possible consequences if you click on a malicious link?
300
A small bit of malware that looks at what someone types on their keyboard and creates a log of all keystrokes.
What is a keylogger?
300
Contact the source of a message through a different medium to confirm if the message is legitimate.
What is how you can act if you spot a red flag in an e-mail?
400
Small malicious software program that gives an attacker unauthorized access to a workstation so they can control it remotely.
What is Backdoors?
400
What attachment file extension is safe to open?
What is .txt
400
Denies access to a device until money has been paid.
What is Ransomware?
400
Copies itself to another computer and infects files on that computer.
What is a virus?
400
Deleting an excel file without opening it.
What is best way to protect yourself from an infected excel file?
500
Digital Currency (also called crypto-currency).
What is Bitcoin?
500
The Onion Router - network and browser developed to enhance internet traffic which cannot be easily tracked.
What is TOR?
500
E-mails that look like they are from a vendor. Try to lure you into clicking or filling out something.
What is Phishing?
500
Copies itself to other computers - mostly a nuisance.
What is a worm?
500
Visiting a compromised website with an old or un-patched browser or vulnerable software.
What is drive by downloads?
M
e
n
u