Information
Physical Security
Availability
The Enemy
Internet
100
Random seemingly unrelated facts, numbers, words or statistics.
What is Data?
100
Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....
What is Defense in Depth?
100

This is a computer program that spreads or self-replicates and requires user interaction to activate.

What is a virus?

100
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
100

Facebook and Twitter are two examples of these that are used by UCO to connect with students

What are social networking websites?

200
Data compiled into documents, maps, charts, and other forms of information gives assets dollar _____________
What is Value?
200
The list of computers, laptops, software, equipment owned by an organization.
What is Inventory?
200
An identifier that uniquely tracks actions to individuals.
What is an Account? (or Login ID)
200

This type of cyberattack uses social engineering tactics to trick people into revealing sensitive information, such as passwords or credit card numbers.

What is phishing?

200

A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox and Safari are examples of these.

What is a browser?

300

This type of security assessment involves testing the security of a system or network by simulating a real-world attack.

What is a penetration test?

300
The use of personality, inowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
300
Functional managers classify data and grant approval to those whose jobs require access to the information.
Who are Data Managers?
300
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
Who are organized crime groups?
300
A type of a program that takes scripting language and reads it so it can be acted on by a browser or an application. These are found in almost all operating systems, web browsers and many commercial off the shelf application programs.
What is an Interpreter?
400

Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

What is PII? (or Personally Identifiable Information)

400

Something you should do on a regular basis to ensure you can restore your computer to a previous state if something goes wrong.

What is backup your computer/data?

400

This type of cybersecurity control is used to restrict access to a system or network to authorized users.

What is access control?

400

Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

What is insider threat?

400
The contents of electronic documents that can carry out or trigger actions automatically, on a computer platform, without the intervention of a user. Active content includes built in macro processing, scripting languages, or virtual machines. A significant share of today’s malware involves this type of programs.
What is Active Content?
500
A legal notification directing you or the bureau/office to preserve any documentary material that may berelevant to a pending or foreseable lawsuit or administrative adjudication.
What is Litigation Hold?
500
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.
What is Standardization?
500
It is a word or phrase that verifies that you and only you had access to the account.
What is a Password?
500

This type of cyberattack uses a botnet to generate a large amount of traffic to a website or server, causing it to become unavailable.

What is a denial-of-service (DoS) attack?

500
A program, script, macro or other portable instruction, that can be shipped unchanged to a variety of platforms and executed with the same result. Some of the most common forms of mobile code are JavaScript, Asynchronous JavaScript and eXtended Markup Language (XML) or AJAX, Java applets, ActiveX, and Flash. It is being adapted to run on cell phones, PDAs, and other devices.
What is Mobile Code?
M
e
n
u