Information Technology
Physical Security
Cyber Security
The Enemy
Internet
100

The first line of support at a Help Desk 

What is Tier One Support?

100

An approach in which a series of defensive mechanisms are layered in order to protect valuable data and information. 

What is Defense in Depth?

100

A security technique that regulates who or what can view or use resources in a computing environment. 

What is Access Control?

100

People who traditionally try to gain unauthorized access to computers systems remotely to learn more and/or for intellectual curiosity. They currently make up only 17% computer intrusions.

Who are Hackers?

100
A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox and Safari are examples of these.
What is a browser? (or web browser)
200

This company created the following products, Newton, Pippin and the QuickTake Camera _____________

Who is Apple?

200

A list of computers, laptops, software, equipment owned by an organization.

What is an Asset Inventory?

200

Users use this along with their password to gain access to their computer.

What is an Account? (or Login ID)

200

The risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

What is Insider threat?

200
Easily readable programs that automate or provide extra function on a computer system or in an application or browser. ActiveX and JavaScript are examples of this type of language.
What is Scripting? (or Scripting Code or Scripting Language)
300

TIME Magazine' selection for  the “Man of the Year” in 1982.

The computer

300

The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

What is Social Engineering?

300

Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

What is PII? (or Personally Identifiable Information)

300

These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.

Who are organized crime groups?

300

What month is "Computer Security Day" on? 

What is November. 

400

What device went by "Electronic Brains" before being renamed to this

What are PCs?

400

30-50% of all data loss due to people already within the organization.

What is Insider Threat?

400
As a result of the VA breach in 2006 where PII of over a million veterans was lost, it is now a requirement to delete all sensitive data extracts on individual computers after this number of days.
What is 90 days?
400

 Structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.

What is state sponsored hacking?

400

The first U.S. President to officially use email

Who is Bill Clinton?

500

The original name of the Windows OS

What is Interface Manager?

500
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.
What is Standardization?
500

It is a word or phrase that verifies that you and only you have access to the account.

What is a Password?

500

The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.

Who are you? (Who am I?)

500

Mozilla Firefox gets its name from this animal 

What is a red panda?

M
e
n
u