The Cyber Scene
Security Scramble
Name That Acronym
Past Presentations
Authentication
100

When a password is limited strictly to numeric characters, the secret is often referred to as a PIN. What does that acronym stand for?

What is Personal Identification Number 

100

ciestryu

What is security?

100

AI

What is artificial intelligence?

100

Who is required to take our company's annual security awareness training?

Who is EVERYONE!!!
100

The most common authentication method that uses a username paired with THIS in order to gain access to their account

What is Password-based authentication / Password


200

What professional social networking site announced a theft of 6.5 million usernames and passwords in 2012, and an even bigger hack of 117 million passwords in 2016?

What is LinkedIn

200

tdaa recbha

What is a Data Breach

200

MSP

What is Managed Service Provider?

200

This type of cybersecurity threat in which attackers create QR codes to redirect victims into visiting or downloading malicious content.

What is Quishing?

200

THIS requires users provide at least one additional authentication factor beyond a password 

What is Two-Factor/multifactor Authentication or 2FA

300

A cyberattack in which the attacker intercepts and alters data as it is transmitted between two parties is known as an MitM attack - what do the letters MitM stand for?

What is Man-in-the-middle 

300

lbeuntvlraiiy

What is a vulnerability?

300

VPN

What is Virtual Private Network?

300

Amazon Alexa, Fitbit, and Google Home are all examples of this. 

What is an IoT device.

300

This type of authentication uses something that the user IS.

What is Biometric authentication

400

What term is given to a software application that automatically downloads or displays marketing banners or pop-ups when a user is online?

What is Adware

400

saciol enrgenenigi

What is Social Engineering?

400

IAM

What is Identity and Access Management?

400

What is the difference between authentication and authorization? 

Authentication verifies an identity

Authorization is the process of identifying what resources a user can access. 

400

This enables an employee to use a single set of credentials to access multiple applications or websites.

What is Single sign-on / SSO

500

Which term is used to describe the “cargo” that malware brings with it when it infects a device?

What is a Payload

500

ineetntr of itsghn

What is Internet of Things?

500

GDPR

What is General Data Protection Regulation

500

What are some ways to prevent Man in the Middle attacks?

- Secure connections

- Avoid phishing emails

- VPN encryption

- Endpoint Security

500

This type of authentication enables users to log in to accounts using a physical device, such as a smartphone, security key or smart card. 

What is Token-based authentication.

M
e
n
u