Grand Theft Data
Breach Me Baby
Hackers Gonna Hack
Let's Get Social
It's Risky Business
100

Restricted, Confidential, Internal Use and Public

What are Information Classification Levels?

100

To apply or maintain permissions to prevent an account from getting information they are notauthorized to see while making the information available to those who are authorized.

What is Access Control?

100

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

Who are hackers?

100

This tactic relies on human interaction and often involves tricking people into breaking security protocols to obtain access to, or compromise information and systems.

What is social engineering?

100

An approved online cloud storage service being used by UTP.

What is Microsoft OneDrive?

200
The process of scrambling messages or information in such a way that only authorized parties can read it.
What is encryption?
200

An identifier that uniquely tracks actions to individuals.

What is an Account? (or Login ID)

200

A person who breaks into a computer system for politically or socially motivated purposes.

Who is a hacktivist?

200
An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.
What is phishing?
200
A cyber attack targeting an individual or entity for the purpose of maliciously controlling or disrupting a computing environment to destroy or steal data.
What is a cyber breach?
300

Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

What is Insider threat?

300

* * * DOUBLE JEOPARDY * * * Functional managers classify data and grant approval to those whose jobs require access to the information.

Who are Data Managers?

300
Type of software specifically designed to gain access or damage a computer without the knowledge of the owner.
What is malware?
300

* * * DOUBLE JEOPARY!!! * * * Linked In or Facebook are channels that are often used for this targeted attack on specific individuals, or organizations which seeks unauthorized access to confidential data.

What is spear phishing?

300

If you are leaving your computer unattended, you must Ctrl-Alt-Delete + Enter to lock your screen, but this is another, shorter key sequence to do the same thing.

What is Windows button+ L key sequence?

400

Any combination of your name,your home address or phone number, credit card or account numbers or social security number.

What is PII? (or Personally Identifiable Information)

400

It is a word or phrase that verifies that youand only you had access to the account.

What is a Password?

400

*** DOUBLE JEOPARDY*** A technique used to attack data-driven applications in which nefarious SQL statements are inserted into an entry field for execution

What is an SQL injection?

400

A technique used to retrieve information from a garbage bin and/or trash can, that could be used to carry out an attack against an organization.

What is dumpster diving?

400

Performing this action after opening an email from an unknown source could compromise your computer.

What is clicking on a link / opening an attachment?

500

A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.

What is Standardization?

500

Action you take to protect your information against threats and vulnerabilities.

What is a countermeasure?

500
A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.
What is ransomware?
500

What two-word term refers to the hidden shares that happen through private channels that can’t be tracked by web analytics?

What is Dark Social?

500

What is the first step in protecting systems from attack?

What is identifying vulnerabilities?

M
e
n
u