Offense
Acronyms
Good Practices
The Enemy
Defense
100

Unsolicited emails sent to many addresses. The purpose is often to make money through advertising or identity theft.

What is SPAM?

100

PII

Personally Identifiable Information

100

It is a word or phrase that verifies that you and only you have access to the account.

What is a Password?

100

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

Who are hackers?

100

Computer programs that can block, detect, and remove viruses and other malware.

What is Anti-Virus?

200

Software that harms computers, networks, or people. Includes viruses, worms, and other computer programs.

What is Malware?

200

DDoS

Distributed Denial of Service

200

Extra copies of computer files that can be used to restore files that are lost or damaged. 

What is a Backup?

200

Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

What is Insider threat?

200

A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.

What is a Patch?

300

Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.

What is Phishing?

300

IoT

Internet of Things

300

A connection method, most often used by remote workers, to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. 

What is Virtual Private Network (VPN)?

300

The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

Who is Social Engineering?

300

A hardware device or specific software that sits at the front line of a network, acting as a communications liaison between internal and external devices. The only traffic allowed on the network is defined via policies – unauthorized traffic is blocked. 

What is a Firewall?

400

A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a compensation if the victim wants his or her files back.

What is Ransomware?

400

NIST

National Institute of Standards and Technology

400

A legal notification directing you or the bureau/office to preserve any documentary material that may be relevant to a pending or foreseeable lawsuit or administrative adjudication.

What is a Litigation Hold?

400

Once the cyber-criminal gets into one computer, he/she can then attack the network and tunnel his/her way to confidential company data.

What is Data Exfiltration?

400

The process of using codes to make readable information unreadable. This information cannot be read without using a secret key.

What is Encryption?

500

A program that records every key struck on a keyboard and sends that information to an attacker.

What is a Keylogger?

500

CAPTCHA

Completely Automated Public Turing Test to Tell Computers and Humans Apart

500

A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.

What is Standardization?

500

Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.

What is a Hacktivist?

500

To maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.

What is Access Control?

M
e
n
u