A factor that a city needs to take into account when dealing with ransomware.
What is...
Will Paying The Ransom Encourage Others?
Who Will Suffer From The Decision and Who Will Benefit?
Would It Be Worth It To Wait It Out?
A common attack where a person sends a fake email with a fraudulent link.
What is Phishing?
a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
What is a Computer Virus?
The ability to clearly express your thoughts to others both verbally and written.
What are Communication Skills?
These people combine law enforcement and tech knowledge to solve crimes.
Who are Cyberinvestigators?
Once an organization has contained an attack. They should let these people know about it.
Who is
Customers
The Public
?
A type of malware that denies you access to your data until you pay a ransom.
What is Ransomware?
3 Warning Signs That Your Computer Might Be Hacked
What is/are...
The Appearance Of Apps You Didn't Install
Friends and Family Receiving Strange Messages From You
Passwords not working
Unwanted Browser Tool Bars/Search Engines (pop up ads and redirecting search engines)
Unwanted Software Installation
?
Thoroughness in accomplishing a task through concern for all the areas involved, no matter how small.
What is Attention to Detail?
These people try to break into secure computer programs with the consent of the company they are breaking into.
Who are...
Penetration Testers
Ethical Hackers
White Hat Hackers
PenTesters
?
This strategy is developed in case of an incident occuring.
What is...
Response Strategy
Incident Response Strategy
?
Ways To Spot a Phishing Attack
What is...
Bad Grammar
Urgency in Emails
Changing of Web Addresses
Emails Asking For You To Confirm Your Username And Password
?
In order to find a hacker you may need to do this.
What is
Think like a hacker
Retrace steps
Look for clues
?
The capacity to accept or tolerate delay, trouble, or suffering without getting angry or upset.
What is Patience?
These people write the encryption programs companies use to protect their data.
What are Cryptographers?
Ways Government Services could be affected if a hacker shut down their computer system.
What is
Stoplights could stop working
Police and Firefighters communication could be interrupted
People could be unable to conduct city business (pay parking tickets, doing taxes online)
City Courts would have to use paper for all trials
Computers that monitor water safety might stop working
?
The amount of time passed before you should change your password
What is 3 months?
Bits of information left on the internet
What are Data Packets?
Sets of abilities or knowledge used to perform practical tasks in the areas of science, the arts, technology, engineering, and math.
What are Technical Skills
These people do the same thing as penetration testers/ethical hackers, but they look for threats happening in real-time. These people monitor a company's computer system to watch for signs that someone is trying to hack in.
Who are Threat Hunters?
Understanding the extent of the attack, the source, and determining what further action might need to happen.
What is Identify the Threat?
The process cell phone companies use to know the location of your devices
What is Geolocation?
The route or path data packets take to get from your computer to a website.
What are Traceroutes?
The excitement, need, and desire, to continue educating yourself and your professional skills.
What is Aspiration to Learn?
These people design cybersecurity systems. They test a company's security plan to look for weaknesses. Then they create a plan to make the computer systems more secure.
Who are Security Architects?