The use of digital devices or social media to Send threatening, or offensive information about a person or a group with the intent to cause harm.
What is Online Harassment? (What is Cyber Bullying?)
People who send unsolicited or irrelevant messages over the internet for the purpose of advertising, phishing, and spreading malware.
Who is a Spammer?
Side effects of the freedom and ease of communicating online that leave your system open to any type of attacks.
What are cyber vulnerabilities?
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. Internet Explorer, Firefox and Safari are examples of these.
What is a browser? (or web browser)
You receive an email that directs you to a look a like, though fake, version of your bank's website.
What is a phishing attack?
The necessity to preserve and protect any personal information, collected by any organization, from being accessed by a third party.
What is Data or Information Privacy?
A protocol that allows you to know that the website you are visiting is secure.
what is HTTPS?
Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is Insider threat?
Messages that web servers pass to your web browser when you visit internet sites to store what sites you've visited.
What are Cookies?
Phishing attacks and malicious software packages that exploit unpatched software vulnerabilities.
What is Malware?
Information about an individual that can be used to distinguish or trace their identity.
What is PII? (Personally Identifiable Information)
It is a complex set of characters you create that verifies that you and only you have access to your account.
What is a Password?
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
Who are organized crime groups?
A service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions.
What is a VPN?
Uses some key bits of information about you to convince a bank or a customer service representative that they're you.
What is Identity Theft?
This Adds additional protection by requiring an additional step in verifying a login.
What is Two-factor authentication?
As a result of the VA breach in 2006 where PII of over a million veterans was lost, it is now a requirement to delete all sensitive data extracts on individual computers and suggested that you change your password after this number of days.
What is between 90 to 180 days?
They use personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
Apps that internet uses to interact with web content like videos or games. Toolbars and extensions are a type of this.
What are Add-ons? ?
Conveying an enticing offer that in many cases attempts to trick users into sending over money. Of course, those offers are baseless, and victims end up losing money in the process.
What is a Scam?
The law that governs the personal information handling practices of federal government institutions. This applies to all information the federal government collects, uses and discloses.
What is the Privacy Act?
A system or set of steps that helps keep data from prying eyes by utilizing passwords, encryption, and hiding data.
What is Security?
The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.
Who are you? (Who am I?)( Who is me?) (who is the user?)
This small lock (
) in the corner of your browser window or next to the address bar. This means that your data has been concealed by a code to prevent unauthorized access.
What is Encrypted?