Facebook, Twitter, and LinkedIn are two examples of these
What is social media?
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
What is a phishing email?
A documented, structured approach with instructions for responding to unplanned incidents.
What is a disaster recovery/incident response plan?
This is a computer program that spreads or self-replicates and requires user interaction to activate.
What is a virus?
Eight to twelve characters, upper- and lower-case letters, numbers as well as special characters, easy to remember but hard to guess, never shared with anyone, and never written down and left near your computer.
What are strong passwords?
These types of attacks involve someone who lacks the proper authentication following an employee into a restricted area.
What is tailgating?
The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.
What is Spear-phishing?
Examples include password protection or encryption to prevent a cyber breach.
What are the most common forms of securing a device?
Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual.
What are symptoms of a malware infection?
Tasks includes reviewing and investigating enterprise security threats, and providing best practices to assist agencies
What is State of Arizona Security Operations Center?
Social networking scams, vulnerability exploits, mobile malware, malicious spam runs, and targeted attacks are all examples of these.
What are online threats?
The email asks you to confirm personal information, the web and email addresses do not look genuine, it’s poorly written, there’s a suspicious attachment, the message is designed to make you panic.
What are ways to identify a potential phishing email?
Prepare, Identify, Contain, Respond, Recover
What are the incident response steps?
A type of malicious software designed to block access to a computer system until a sum of money is paid.
What is Ransomware?
Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.
What is shoulder surfing?
Examples include: IRS threatening arrest, Social Security number being suspended, you have a legal issue pending, Car warranty, Swapping payroll and direct deposit information, and Sending gift cards.
What are scams?
A claim that there is a "problem" with your account, notice that you have been "suspected violations of the USA Patriot Act," request to "verify your identity," request from an IT department that you provide passwords or other information, or a request to fax information to a number are all examples of this.
What are things you might see in an email if it is a phishing scam?
Examples include, public, health, tax, credit card, banking, criminal, and educational.
What are ways to classify data?
It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is designed to give hackers access to your computer or files.
What is a Trojan Horse?
**** VIDEO DAILY DOUBLE! **** https://drive.google.com/file/d/1MjVGoWVUFmw_eFsbm3ZDp5h5dbAbbqUj/view
Who is State CISO Tim Roemer?
An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email.
What is social engineering?
A term used to describe a phishing attack that is specifically aimed at wealthy, powerful, or prominent individuals.
What is Whale Phishing?
Using unauthorized applications, having un-encrypted data storage, emailing confidential data to your personal account, downloading or printing sensitive data.
What is a potential cyber security breach?
Defined as programs that track where you go on the Internet and what you type into your keyboard.
What is spyware/keylogger?