Be Sociable
Phishing
Cyber Breach
Malware
Cyber Facts
100
Facebook and Twitter are two examples of these
What are social networking websites?
100
You received an email from a Nigerian prince asking you to give him your bank account information so he can that he can transfer a million dollars to you.
What is an email scam?
100
Something you should do on a regular basis to ensure you can restore your computer to a previous state if something goes wrong.
What is backup your computer/data?
100
This is a computer program that spreads or self-replicates and requires user interaction to activate.
What is a virus?
100
If using a windows-based PC, you do this to quickly lock your computer before stepping away.
What is press the Windows key and the letter L? (Ctrl+Alt+Del and select "Lock this Computer" also would be correct.)
200
The features within a laptop that limit who sees what.
What is privacy settings?
200
Bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, or a request for personal information are all examples of these.
What are things you should look for in an email that may indicate it is a scam?
200
This image in a web browser indicates a secure mode where communications between browser and web server are encrypted. This type of connection is designed to prevent anyone from reading or modifying the data that is exchanged across the internet.
What is a padlock icon or lock icon?
200
It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is deisgned to give hackers access to your computer or files.
What is a Trojan Horse?
200
Contact Desktop Support (x1891) and your department supervisor, and power off your computer are steps you should take if this occurs.
What is a computer malware infection?
300
This malicious technique tricks web users into revealing confidential information or takes control of their computer when they click on seemingly innocent webpages.
What is clickjacking or likejacking?
300
1: The message contains a mismatched URL 2: URLs contain a misleading domain name 3: The message contains poor spelling and grammar 4: The message asks for personal information 5: The message contains unrealistic threats
What are things you might see in an email if it is a phishing scam?
300
Carried with you and not properly password protected can result in a cyber security breach.
What are mobile devices, such as laptops, cell phones, and flash drives?
300
This program self-replicates (can download automatically), but requires you to do something, such as click on an email link, to actually activate it.
What is a virus?
300
Eight to twelve characters consisting of upper- and lower-case letters, numbers as well as symbols, easy to remember but hard to guess, never shared with anyone, and never written down and left near your computer.
What are guidelines to follow to make sure your passwords are secure?
400
Sexual solicitations, U R Cute messages, Secret details about Michael Jackson's death, Test your IQ quiz, and "Join State University's Class of 2013 Facebook group" are all social networking examples of these things that you should avoid.
What are scams?
400
When you receive an email with a link, instead of clicking it, you are advised to open a separate browser and type the URL you already know for the website.
What is one way to verify a scam email link?
400
Flash drive with classified data on it left in a public computer is an example of this.
What is a potential cyber security breach?
400
A program that tracks where you go on the Internet and what you type into your keyboard.
What is spyware?
400
Watching what you do on your computer (either in person or via a recording device) by looking at a reflection of or the actual screen of your computer or mobile device.
What is shoulder surfing?
500
An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email.
What is social engineering?
500
The physical procedure whereby an unauthorized person gains entrance to an area by following an authorized user
What is tailgating?
500
This is an example of information provided by the United States Computer Readiness Team regarding cyber security breaches around the country, and which is available at http://www.us-cert.gov/.
What is a Cyber Security Bulletin or announcement?
500
Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual are potential symptoms of this.
What is a malware infection?
500
The security method in which the user provides two means of identification for validation.
What is Two Factor Authentication?
M
e
n
u