Information
Physical Security
Availability
The Enemy
Internet
100

What is Data?


Random seemingly unrelated facts, numbers, words or statistics.

100

What is Defense in Depth?


Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....

100

What is Access Control?


To apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.

100

Who are hackers?


They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

100

What is a browser? (or web browser)


A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox and Safari are examples of these.

200

What is Value?


Data compiled into documents, maps, charts, and other forms of information gives assets dollar _____________

200

What is Inventory?


The list of computers, laptops, software, equipment owned by an organization.

200

What is an Account? (or Login ID)


An identifier that uniquely tracks actions to individuals.

200

What is Insider threat?


Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

200

What is Scripting? (or Scripting Code or Scripting Language)


Easily readable programs that automate or provide extra function on a computer system or in an application or browser. ActiveX and JavaScript are examples of this type of language.

300

What is PII? (or Personally Identifiable Information)


Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

300

What is Social Engineering?


The use of personality, inowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

300

Who are Data Managers?


Functional managers classify data and grant approval to those whose jobs require access to the information.

300

Who are organized crime groups?


These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.

300

What is an Interpreter?


A type of a program that takes scripting language and reads it so it can be acted on by a browser or an application. These are found in almost all operating systems, web browsers and many commercial off the shelf application programs.

400

What are Federal Records?


The evidence of daily decisions and operations within DOI and its bureaus/offices.

400

What is Insider Threat?


30-50% of all data loss due to the people already within the organization.

400

What is 90 days?


As a result of the VA breach in 2006 where PII of over a million veterans was lost, it is now a requirement to delete all sensitive data extracts on individual computers after this number of days.

400

What is state sponsored hacking?


They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.

400

What is Active Content?


The contents of electronic documents that can carry out or trigger actions automatically, on a computer platform, without the intervention of a user. Active content includes built in macro processing, scripting languages, or virtual machines. A significant share of today’s malware involves this type of programs.

500

What is Litigation Hold?


A legal notification directing you or the bureau/office to preserve any documentary material that may berelevant to a pending or foreseable lawsuit or administrative adjudication.

500

What is Standardization?


A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.

500

What is a Password?

It is a word or phrase that verifies that you and only you had access to the account.


500

Who are you? (Who am I?)


The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.

500

What is Mobile Code?

A program, script, macro or other portable instruction, that can be shipped unchanged to a variety of platforms and executed with the same result. Some of the most common forms of mobile code are JavaScript, Asynchronous JavaScript and eXtended Markup Language (XML) or AJAX, Java applets, ActiveX, and Flash. It is being adapted to run on cell phones, PDAs, and other devices.

M
e
n
u