The waves make it happen
Someone told me there would be hats
Are you secure?
Country Roads
Insecurities
100

Click this in your browser to see the security and certification status of a webpage

What is the padlock icon?

100

The windows shortcut to lock your computer

What is Win-L?

100

Used to prevent vehicles from accessing a property or area otherwise not allowed

What are bollards?

100

Networking device responsible for connecting networks to each other

What is a router?

100

The weakest link in any company's security

What is a user?

200

These are often in control of a botnet responsible for DDOS attacks on websites

What is a C2 or Command and Control server?

200

This is implemented to ensure that all work is put away and no sensitive information is left accessible

What is a clean desk policy?

200

Use these to ensure only one person enters a premises at a time with the opportunity to identify them while inside this

What is an access control vestibule?

200

This service should be disabled if not used, runs on routers to automatically configure port forwarding rules, associated with many vulnerabilities

What is UPNP universal plug and play?

200
Sometimes referred to as Hacking the Human, relies on subterfuge and manipulation to gain information or access

What is social engineering?

300

Once you have quarantined an infected system, you should do this (at least in Windows)

What is Disable system restore points?

300

This is what happened when someone is able to see your screen without your knowledge (just the act described guys)

What is shoulder surfing?

300

The most flexible security control you can ever have

What is a security guard?

300

You do this to expose an internal network port through the router to the outside network ie the internet

What is port forwarding?

300

No longer used as a wireless protection method; the encryption behind this was broken and this was the earliest consumer wifi protection

What is WEP? Wired Equivalent Protection

400

You were called to training because you opened an email that you thought was legitimate from a former coworker of yours

What is anti-phishing training?

400

These are electronic tokens that give access to entryways in buildings

What are smart cards or key fobs?

400

The primary purpose of a camera system that records

What is detect?

400

Enable and configure this on a router to allow or deny devices from your network based on known MAC addresses

What is MAC filtering?

400

You need to do these things to harden your networking devices (name 3)

What is change default passwords, update firmware, disable unused ports logical and physical, disable unused services, use implicit deny in your ACL...

500

A user calls you reporting malware, this is the very first thing you should do when responding to the call

What is verify the infection?

500

These take your fingerprint, palmprint, retina or iris scan to unlock a device or doorway

What is a biometric scanner?

500

Use one of these at an entry point to detect the possible presence of weapons on people entering your facility

What is a magnetometer?

500

We use these to create security zones or segments within a network, with the goal of controlling access to networks and data

What is a screened subnet/dmz?

500

This physical button should be disabled to prevent unauthorized access to your network

What is WPS?

M
e
n
u