This is most often introduced to a system through email attachments, software downloads or operating system vulnerabilities.
What is Malware?
If using a windows-based PC, you can quickly lock your computer with this keyboard combination before stepping away.
What is Windows + āLā?
he rack
What is Hacker?
This is who passwords should be shared with.
Who is no one?
Something done on information security policies, standards, procedures, and guidelines at least every two years.
What is a review?
This type of attack encrypts files and prevents legitimate users from accessing files without a decryption key.
What is Ransomware attack?
Highlight / select the message you wish to report and click the
"Report Phish" button in Outlook
What should you do in case you receive a suspicious email?
rod swaps
What is Password?
Creation, modification or termination of these must always be followed by a relevant and approved request in the ticketing system.
What are user accounts?
This policy applies to all employees, management, contractors, and any other third parties who perform business with or on behalf of our company.
Who does the Information Security Policy apply to?
Smishing and Vishing.
What are forms of phishing attacks that are done through SMS messages and phone calls?
I love P@st@ Very Much!
What is an example of a strong passphrase?
bye crusty rice
What is Cyber Security ?
This principle states that you give each person the minimum access necessary to do his/her job.
What is Least privilege principle?
This internal standard defines rules and requirements for connecting to corporate network or Information Systems from any host (especially in remote access and working from home).
What is defined by Teleworking standard?
The weakest link in every computer system. Those who can through thoughtlessness, unawareness or accident cause loss of work products through deletion, corruption or improperly safeguarding data.
Who are we / What are human / Who are people?
Raise a ticket to helpdesk ASAP, choosing Security as a category and selecting the corresponding Subcategory.
What should you do in case of a security incident?
burial tin levy
What is Vulnerability?
Something you know (e.g., password)
Something you have (e.g., token)
Something you are (e.g., biometric)
What are authentication examples?
This internal standard defines the activities needed for managing code vulnerabilities.
What is defined by the Secure Code Review Standard?