Risk and Risk Management
Information Security
Cyber Threats
Computer Networks
Miscellaneous
100

The possibility of something bad/damage happening to an information system.

What is risk?

100

The state of keeping or being kept secret or private.

What is confidentiality?

100

This person performs malicious acts on computers and/or networks for their personal gain.

What is a hacker?

100

A wireless technology used to share data over a short distance. E.g., connecting earphones or a watch to a cellphone.

What is a Bluetooth?

100

A type of social engineering where an attacker sends a fraudulent email designed to trick a human victim into revealing sensitive information to the attacker.

What is Phishing?

200

A flaw or weakness in a system’s design or operation that could be exploited to attack the system.

What is a vulnerability?

200

Daily Double: "You can't handle the truth!"

What is A Few Good Men (1992)?

200

It is a program used by hackers to crack passwords.

What is a password cracker?

200

A form of digital currency, it is not an official currency, however, which means that it operates without the involvement of banks or clearinghouse. There is no control over it.

What is bitcoin?

200

Online storage that allows us to access our files/folders anywhere with an Internet connection.

What is cloud storage?



300

An insurance company may offer this type of insurance to help protect companies from losses related to cyber incidents.

What is cyber insurance?

300

A document that contains a set of rules and standards that a company publishes to protect its assets.

What is a Policy?

300

A malicious actor seeks to steal this and sell it on the dark web.

What is personal data or Personally Identifiable Information (PII)?

300

A network security system that monitors, blocks and controls incoming and outgoing network traffic based on pre-determined security rules.

What is a firewall?

300

This process converts plaintext data into an alternative form known as ciphertext, making the message unreadable.

Who is Encryption?

400

Reducing the likelihood of the risk.

What is risk mitigation/control?

400

Requires users to provide two authentication factors that includes a combination of something the user knows --like a password or PIN; something the user has -- like an ID card, security token or smartphone; or something the user is --biometrics.

What is two-factor authentication/multi-factor authentication?

400

It is stealing discarded bank statements, checks, phone numbers, and so on from the garbage can.

What is dumpster diving?

400

"Toto, I've a feeling we're not in Kansas anymore"

What is The Wizard of Oz (1939)?

400

Daily Double: "One ring to rule them all, One ring to find them, One ring to bring them all, and in the darkness bind them"



What is The Lord of the Rings Trilogy (2001- 2003)?

500

An exercise performed to assess the risk and determine its impact to an organization.

What is a Risk Assessment?

500

Confidentiality, Integrity, Availability

What is the CIA Triad?

500

Malware that holds a computer captive until the owner pays the demanded ransom.

What is ransomware?

500

It is a secure connection for users to work remotely and access corporate systems. It is abbreviated as VPN.

What is Virtual Private Network?

500

It has "HTTPs”, and it has a lock showing on the URL.

What is secure website?

M
e
n
u