Cyber Crime
Privacy
Online Security
The Enemy
Internet
100

The use of digital devices or social media to Send threatening, or offensive information about a person or a group with the intent to cause harm. 

What is Online Harassment? (What is Cyber Bullying?) 

100

People who send unsolicited or irrelevant messages over the internet for the purpose of advertising, phishing, and spreading malware.

Who is a Spammer?

100

Side effects of the freedom and ease of communicating online that leave your system open to any type of attacks.

What are cyber vulnerabilities?

100

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

Who are hackers?

100

A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. Internet Explorer, Firefox and Safari are examples of these.

What is a browser? (or web browser)

200

You receive an email that directs you to a look a like, though fake, version of your bank's website.

What is a phishing attack?

200

The necessity to preserve and protect any personal information, collected by any organization, from being accessed by a third party.

What is Data or Information Privacy?

200

A protocol that allows you to know that the website you are visiting is secure.

what is HTTPS?

200

Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

What is Insider threat?

200

Messages that web servers pass to your web browser when you visit internet sites to store what sites you've visited.

What are Cookies?

300

Phishing attacks and malicious software packages that exploit unpatched software vulnerabilities.

What is Malware?

300

Information about an individual that can be used to distinguish or trace their identity.

What is PII? (Personally Identifiable Information)

300

It is a complex set of characters you create that verifies that you and only you have access to your account.

What is a Password?

300

These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.

Who are organized crime groups?

300

A service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions.

What is a VPN?

400

 Uses some key bits of information about you to convince a bank or a customer service representative that they're you.

What is Identity Theft?

400

This Adds additional protection by requiring an additional step in verifying a login.

What is Two-factor authentication?

400

As a result of the VA breach in 2006 where PII of over a million veterans was lost, it is now a requirement to delete all sensitive data extracts on individual computers and suggested that you change your password after this number of days.

What is between 90 to 180 days?

400

They use personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

What is  Social Engineering?

400

Apps that internet uses to interact with web content like videos or games. Toolbars and extensions are a type of this.

What are Add-ons? ?

500

 Conveying an enticing offer that in many cases attempts to trick users into sending over money. Of course, those offers are baseless, and victims end up losing money in the process.

What is a Scam?

500

The law that governs the personal information handling practices of federal government institutions. This applies to all information the federal government collects, uses and discloses.

What is the Privacy Act?

500

A system or set of steps that helps keep data from prying eyes by utilizing passwords, encryption, and hiding data.

What is Security?

500

The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.

Who are you? (Who am I?)( Who is me?) (who is the user?)

500

This small lock () in the corner of your browser window or next to the address bar. This means that your data has been concealed by a code to prevent unauthorized access.

What is Encrypted?

M
e
n
u