Your home's wireless router is the primary entrance for cyber criminals to access all of your connected devices. To prevent a cyber criminal access to your devices, what should you do?
Secure your Wi-Fi network and devices, by changing the default password and username.
What is a cyber crime?
Some forms include identity theft, financial fraud, stalking, online bullying, and hacking.
What is Authentication?
Verifying a user has authorized access.
What is a Phishing attack?
An email used to collect personal an financial information or infect your machine with malware and viruses.
If you lose your CAC card, what immediate step would you take?
Report that it is lost as soon as it's confirmed to be missing.
What are some examples of sensitive information?
Full name, phone numbers, address, school, work location
What is cyber crime at its best?
Causes major inconvenience and annoyance for a Vitim.
What is a strong and complex password?
Has 8 characters or more and a combination of upper and lowercase letters, numbers and symbols.
What is Identity theft?
Illegal use of someone else's personal information in order to obtain money or credit.
Spillage occurs when there's an unauthorized disclosure of classified information. To prevent this from occurring, what website do you use?
what are some ways to keep yourself safe on the internet?
Disable geo-tagging features, only friend/ accept request from people you know in real life, and set your privacy preferences to the strictest settings.
What is Cyber Crime at its worse?
Results in financial ruin or threaten a Vitim's reputation or personal safety.
Why do you have multiple passwords?
So cybercriminals don't have access to all your accounts.
What is shoulder surfing?
Some on watching over your shoulder to gain authentication codes, personal information, and mission sensitive information.
Which address prefix (HTTP or HTTPS) encrypts a website?
HTTPS
How often should you change your password?
90 Days
What does reporting cybercrime help with?
Playing a role in making the internet safer and more secure for all.
What dose your CAC and pin demonstrate?
Two part Authentication. Something you have and Something you know.
What is a tailgating attack?
Someone that lacks proper authentication following an employee into a restricted area.
Name a type of malware that can infect your computer.
Adware, botnets, ransomware, rootkit, spyware, Trojan, virus, worm.
Examples of conducting sensitive activity over a public wireless network.
Online banking or shopping and entering sensitive work that requires passwords or credit card information.
When do you notify your cyber security officer?
Once you discover that you have become a victim of cybercrime.
What does biometrics authentication demonstrate?
Something you are.
What is spyware?
Software that enables a user to obtain covert information about another's computer activities.
When a current or former employee, contractor, or business partner who has or had authorized access to an organization's network, system, or data, intentionally misuses that access in a manner to commit a cyber crime.
Insider Threat