Random seemingly unrelated facts, numbers, words or statistics.
What is Data?
A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites.
What is a Web Browser?
An identifier that uniquely tracks actions to individuals.
What is an Account or Login ID?
Structured groups funded by governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
What are nation states?
This core principle of information security ensures information is available only to authorized persons.
What is Confidentiality?
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
What is PII? (or Personally Identifiable Information)
Making the right information available to the right people.
What is Access Control?
It is a word or phrase that verifies that you and only you had access to the account.
What is a Password or Passphrase?
People who traditionally try to gain access to computers remotely to learn more and for intellectual curiosity.
What are Hackers?
This core principle of information security ensures information is not accidentally or maliciously changed.
What is Integrity?
The worth of data compiled into documents, maps, charts, and other forms of information.
What is Value
Easily readable programs that automate or provide extra function on a computer system or in an application or browser.
What is Scripting?
This action can prevent unauthorized access to your computer session when you must step away.
What is Lock your screen?
One who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.
Who are Script Kiddies?
This core principle of information security ensures computers and information are effective in supporting the mission.
What is Availability?
Any document (paper or electronic, including video and audio files) created or received by you or your department that allows you to conduct business.
What are Records?
Encryption key is public, but decryption key is private.
What is Public-Key Cryptography?
This can prevent loss of data in case of hard drive failure or Ransomware.
What are Backups?
Finding security vulnerabilities that a malicious hacker could potentially exploit.
What is Ethical Hacking or Penetration Testing?
Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....
What is Defense in Depth?
All documents, information, and data should contain this marked on it.
What is a Classification Rating?
The combination/code used to encrypt and decrypt a coded message.
What is a cipher?
These privileges should only be used when necessary, not for daily computer use.
What are Elevated or Admin Privileges?
A security solution that helps organizations recognize potential security threats and vulnerabilities before they have a chance to disrupt business operations.
Who is a SIEM or Security Incident and Event Management?
The process of evaluating vulnerabilities and threats, identifying countermeasures, and applying mitigating actions to reduce risk.
What is Risk Management?