What devices are not allowed to be plugged into government computers?
What is personal devices?
The list of computers, laptops, software, equipment owned by an organization.
What is Inventory?
A strong password includes.
What is Numbers, Symbols, lower case and capital Letters, and adequate length?
What is required to access government Computers?
What is a Common Access Card (CAC)?
Part of a computer system that is designed to block unauthorized access.
What is the Firewall?
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
What is PII? (or Personally Identifiable Information)
Encrypted connection over the Internet between a computer or remote network and a private network.
What is a VPN (Virtual Private Network)?
Malicious software programs designed to disrupt or harm a computer, network, smartphone, or other device.
What is Malware?
What does the Common Access Card (CAC) contain?
What is Certificates for identification, encryption, and digital signature?
Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....
What is Defense in Depth?
A process of encoding messages to keep them secret, so only "authorized" parties can read it.
What is encryption?
Imagine someone pretending to be a trustworthy company or person, like a friend or a favorite store. They send you a message, like an email or text, asking for your personal information, like your password or credit card number. But in reality, they are trying to trick you into giving away your private details, so they can use it for bad things.
What is Phishing?
Who is ACU-1's Information Systems Security Manager (ISSM)?
What is ITC?
Bonus question: How do you spell his last name? 100
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.
What is Standardization?