Personal
Cyber Crime
Authentication
Attacks
Miscellaneous
100

Your home's wireless router is the primary entrance for cyber criminals to access all of your connected devices. To prevent a cyber criminal access to your devices, what should you do?

Secure your Wi-Fi network and devices, by changing the default password and username.

100

What is a cyber crime?

Some forms include identity theft, financial fraud, stalking, online bullying, and hacking.

100

What is Authentication?

Verifying a user has authorized access.

100

What is a Phishing attack?


An email used to collect personal an financial information or infect your machine with malware and viruses.

100

If you lose your CAC card, what immediate step would you take?

Report that it is lost as soon as it's confirmed to be missing.

200

What are some examples of sensitive information?

Full name, phone numbers, address, school, work location

200

What is cyber crime at its best?

Causes major inconvenience and annoyance for a Vitim.

200

What is a strong and complex password?

Has 8 characters or more and a combination of upper and lowercase letters, numbers and symbols.

200

What is Identity theft?

Illegal use of someone else's personal information in order to obtain money or credit.

200

Spillage occurs when there's an unauthorized disclosure of classified information. To prevent this from occurring, what website do you use?

300

what are some ways to keep yourself safe on the internet?

Disable geo-tagging features, only friend/ accept request from people you know in real life, and set your privacy preferences to the strictest settings.

300

What is Cyber Crime at its worse?

Results in financial ruin or threaten a Vitim's reputation or personal safety.

300

Why do you have multiple passwords?

So cybercriminals don't have access to all your accounts.

300

What is shoulder surfing?

Some on watching over your shoulder to gain authentication codes, personal information, and mission sensitive information.

300

Which address prefix (HTTP or HTTPS) encrypts a website?

HTTPS

400

How often should you change your password?

90 Days

400

What does reporting cybercrime help with?

Playing a role in making the internet safer and more secure for all.

400

What dose your CAC and pin demonstrate?

Two part Authentication. Something you have and Something you know.

400

What is a tailgating attack? 

Someone that lacks proper authentication following an employee into a restricted area. 

400

Name a type of malware that can infect your computer.

Adware, botnets, ransomware, rootkit, spyware, Trojan, virus, worm.

500

Examples of conducting sensitive activity over a public wireless network.

Online banking or shopping and entering sensitive work that requires passwords or credit card information.

500

When do you notify your cyber security officer?

Once you discover that you have become a victim of cybercrime.

500

What does biometrics authentication demonstrate?

Something you are.

500

What is spyware?

Software that enables a user to obtain covert information about another's computer activities. 

500

When a current or former employee, contractor, or business partner who has or had authorized access to an organization's network, system, or data, intentionally misuses that access in a manner to commit a cyber crime.

Insider Threat

M
e
n
u