I make your programing code to misbehave. Who am I?
Bug
I hack for a social cause. Who am I?
Hacktivist
rsvui
VIRUS
What process asks you to prove who you are?
Authentication
What does NDPR stand for?
Nigerian Data Protection Regulation - NDPR
I steal information from you and send them to my creator. What am I?
Spyware/Backdoor
I am well funded and hack to bring nations down. Who am I?
State Sponsored Hackers
vsedpo
DEVOPS
What process provides you the required privileges for your role?
Authorization
What area of information security does NDPR address?
Data protection/ Privacy
I am a troublesome program that can survive a disk format. What am I?
Rootkit
I am a privileged user that can cause harm to my company. Who am I?
Administrator / Malicious insider
vcyrpai
What process asks you to present one or more ways to prove who you are?
Multi-factor authentication - MFA
What is the minimum period to report a breach under the NDPR?
90 days
I take your computer and data hostage. Who am I?
Ransomware
I gain unauthorized access to your computer system using ready made code. Who am I?
Script kiddies
nowarsrmae
RANSOMWARE
What process provides details of all activities on a computing resource?
Auditing
What authority manages the implementation of Nigeria's NDPR?
NITDA
I use computer resources to deny companies and countries access to internet. Who am I?
Bot/Botnet
I provide service to you but can steal information about your company. Who am i?
Third party/ Vendors/ Suppliers/ Service Providers
rhyrtyppcoag
CRYPTOGRAPHY
What process ensures that computing resources are always available and remains resilient?
Disaster recovery/business continuity - DR/BCP
Which organization manages the implementation of the Nigeria's Cybersecurity Strategy?
Office of National Security Adviser - ONSA