Cyber Security
Physical Security
TISA
Security Policies & Practices
Miscellaneous
100

This utility examines and blocks Internet traffic on your computer or network.

What is a firewall?

100

This is a common security breach that gives passive unauthorized access to controlled areas or company property.

What is "tailgating?"

100

Weakness that has not been protected against threats

What is a vulnerability?

100

See Something, Say Something

210-353-4000

What is the Security Operations Center (SOC)?

100

A collection of numbers, letters and punctuation marks that are created by taking a sentence and reducing it to significant letters, and replacing some letters with numerical representations.  (I-Iluv2danZ!)

What is a pass phrase?

200

An individual who uses computers to commit crimes

What is a hacker?

200

Any act or threat of physical violence, harassment, intimidation, or other threatening disruptive behavior that occurs at the work site.

What is Workplace Violence?

200

Email-based social engineering attack where the victim is specifically targeted to open malicious links, attachments or extract access information.

What is spear-phishing?

200

The practice is designed to prevent fraud and errors by disseminating tasks and privileges for specific business processes among multiple users.

What is Segregation of Duties?

200

The risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

What is Insider Threat?

300

Infected computers that work together to send out illegitimate messages creating a huge volumes of network traffic creating this type of attack.

What is DDoS (Distributed Denial of Service)?

300

The process to verify qualified and appropriately suited Contract Workers before allowing them to provide services for CPS Energy.

What is Contractor Attestation?

300

The conscious knowledge of the immediate environment and all of the events happening in it.

What is Situational Awareness?

300

Get Out, Hide Out, Take Out

How to handle an Active Shooter Situation?

300

This CPS Energy team coordinates all activities with organizational, emergency and governmental personnel upon initiation of an emergency?

What is the Crisis Management Team?

400

A security concept assuming that each device is responsible for its own security.

What is Endpoint Security?

400

Measures taken to discourage theft, or make it more difficult to attempt. Examples of this include signs and physical barriers, like fencing or door locks

What is Deterrence?

400

Following a ransomware attack, this U.S. city has been reported as having the worst cyber breach recorded to date.

What is the City of Atlanta?

400

The CPS Energy policy that contains language covering how its employees and contractors should represent the company on social media.

What is the Information Systems Use policy?

400

This NY Times bestselling book by Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.

What is "Lights Out!"

500

This tool manage physical and cyber access privileges and ensures the right individuals have the right access to the right resources (facilities, systems and databases), at the right times and for the right reasons.

What is MyID?

500

According to NERC CIP-006-6, Physical Access Control Systems (PACS) allow unescorted physical access into this area to only those individuals who have authorized unescorted physical access.

What is a Physical Security Perimeter?

500

This malicious attack takes place low & slow, uses custom made code, and tries to remain in place for an extended period of time.

What is an Advanced Persistent Threat (APT)?

500

Information that can be directly or indirectly linked to an individual’s identity (e.g. Financial, Identity, Relationships, etc.) are especially sensitive because if it is disclosed or compromised without authorization, presents an increased security risk to the individual.

What is Personally Identifiable Information (PII)?

500

This "car movie" has a scene where the villain "Cipher" hacks into the electronics systems of a large number of cars, causing them to drive automatically and taking out a convoy so that the accomplice can steal a "nuclear football." 

What is "The Fate of the Furious?" 

(or Fast & Furious 8)

M
e
n
u