Phishing and Incidents
Malware
Protection
Passwords
Work Remotely
100

I would email them in case of a security incident

When do I need to email itsecurity@Gilead.com?

100

This type of a program hides malicious or harmful code inside a program that appears to be harmless.

What is A Trojan Horse?

100

The application or tool deployed on a desktop / laptop is used to checks all software before allowing it to run or installed

What is a GSEC - Gilead Software Execution Control?

100

To protect your account, these should contain at least one number and should not match a natural language word.

What are passwords?

100

A virtual staging area in Zoom that prevents people from joining a meeting until the host is ready 

What is Waiting Room?

200

privacy@Gilead.com

Who do I need to contact when there is a privacy issue or incident?

200

A computer that’s been infected with malware so it can be controlled remotely by a hacker.

What are Bots or Botnets?

200

This software is used to encrypt all data stored on your laptop / desktop

What is BitLocker?

200

You use this system to reset your password reset or unlock your account

200

An encrypted connection over the Internet for corporate network traffic

what is VPN?

300

This non-technical intrusion technique relies heavily on human interaction in order to trick people into violating their own security procedures.

What is social engineering?

300

Unintentional download of a virus

What does drive-by-download mean?

300

A product installed on all laptops / desktops to protect them from signature based malware

What is a Symantec End-point?

300

An electronic authentication method in which a computer user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors)


Who is Multi-Factor Authentication or Two Factor Authentication?

300

The act of secretly or stealthily listening to the private conversation of others without their consent.

What is eavesdropping?

400

Fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity

What is Phishing?

400

This type of malware is used to encrypt all contents of your system

What is Ransomware?

400

This software is used to set a label on documents or emails

What is Data Classification?

400

You need to get a specific type of account that can be shared with multiple users

What is a Generic or a Service account?

400

A wireless standard that devices use to exchange data between one and another

What is bluetooth?

500

Compromise physical security by following somebody through a door

What does tailgating mean?

500

This process is used to mitigate the potential vulnerabilities on your system

What is Patching?

500

The process is used to conduct a review of the vendor's policies, procedures, controls of their systems and determines any potential gaps or risks

What is Vendor Security Assessment?

500

This account is used to manage or perform administrative actions

What is Administrative Account?

500

A wireless networking protocol that devices use to communicate without direct cable connections

What is WI-FI?

M
e
n
u