The three pillars of cybersecurity are confidentiality, integrity, and _________.
what is availability
Cybersecurity refers to the protection of hardware, software, and data from ___________
what are attackers
Illegal copying and selling of DVDs and CDs is called____________
what is Piracy
A Creative Commons license lets people use an entire piece of work for educational purposes. True or False?
what is True
What is the name of Bank of Hawaii's CEO?
Who is Peter Ho
Internet, video games, videos, and cell phones are examples of ________ _________.
what is digital media
One result of posting incorrect material/items online is that you could lose your job. True or False?
what is True
This is a common term used to describe a worm, digital virus, or other dangerous program.
What is malware.
Blowfish is an example of ______________
What is a symmetric encryption algorithm
Bank of Hawaii has a total of _________ branches
what is 67
What is the opposite of F2F?
what is online
What is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet?
what is Caesar cipher
I want to protect my song legally from being copied or used without my permission. This is an example of:
what is copyright
Asking someone personal questions in order to be used for fradulent or malicious purposes is known as __________ ___________
what is social engineering
Bank of Hawaii has been open for ____________ years.
what is 125
Giving someone a hard time online and being mean is called:
what is cyberbullying
A responsible way to use other people's work is to:
what is give credit to the creator.
The person being harassed or upset by the bully is often called a _____________
what is a Target
_________ is someone who sees cyberbullying happening, but does nothing to help.
who is a bystander
The Bank of Hawaii slogan is ________ ________ __________
What is live your happy
________________refers to a network security vulnerability in which malicious scripts are injected into websites.
What is cross-site scripting
A(n) ________ helps to de-escalate, or lessen the impact of online cruelity by supporting and standing up for the person who is bullied. *
who is an upstander
The crime that involves copying someone else's creative work and claiming it's your own work is known as ____________
What is plagiarism
A ______'s mean-spirited comments can spread widely through instant messaging (IM), phone texting, and by posts on social networking sites.
who is a bully
Bank of Hawaii is own by _____________ percentage of mutual fund holders.
what is 47