Cyber Threats
What Should I do?
Scramble
Access Controls
InfoSec Policies and Standards
100

This is most often introduced to a system through email attachments, software downloads or operating system vulnerabilities.

What is Malware?

100

If using a windows-based PC, you can quickly lock your computer with this keyboard combination before stepping away.

What is Windows + ā€œLā€?

100

he rack

What is Hacker?

100

This is who passwords should be shared with.

Who is no one?

100

Something done on information security policies, standards, procedures, and guidelines at least every two years.

What is a review?

200

This type of attack encrypts files and prevents legitimate users from accessing files without a decryption key.

What is Ransomware attack?

200

Highlight / select the message you wish to report and click the

"Report Phish" button in Outlook

What should you do in case you receive a suspicious email?

200

rod swaps

What is Password?

200

Creation, modification or termination of these must always be followed by a relevant and approved request in the ticketing system.

What are user accounts?

200

This policy applies to all employees, management, contractors, and any other third parties who perform business with or on behalf of our company.

Who does the Information Security Policy apply to?

300

Smishing and Vishing.

What are forms of phishing attacks that are done through SMS messages and phone calls?

300

I love P@st@ Very Much!

What is an example of a strong passphrase?

300

bye crusty rice

What is Cyber Security ?

300

This principle states that you give each person the minimum access necessary to do his/her job.

What is Least privilege principle?

300

This internal standard defines rules and requirements for connecting to corporate network or Information Systems from any host (especially in remote access and working from home).

What is defined by Teleworking standard?

400

The weakest link in every computer system. Those who can through thoughtlessness, unawareness or accident cause loss of work products through deletion, corruption or improperly safeguarding data.

Who are we / What are human / Who are people?

400

Raise a ticket to helpdesk ASAP, choosing Security as a category and selecting the corresponding Subcategory.

What should you do in case of a security incident?

400

burial tin levy

What is Vulnerability?

400

Something you know (e.g., password)

Something you have (e.g., token)

Something you are (e.g., biometric)

What are authentication examples?

400

This internal standard defines the activities needed for managing code vulnerabilities.

What is defined by the Secure Code Review Standard?

M
e
n
u