This is the name of someone that breaks into computers, and applications
Hacker
You receive an email from some one you don’t know and it looks suspicious
Report the email as Phishing
This is a security gap or flaw that can be exploited
Vulnerability
This is is commonly used to secure remote and mobile communication.
Hint: 3 words or initials, the first begins with "V"
Virtual Private Network or VPN
This is the name for a coworker that discloses confidential information
Insider
You see someone you don't know inside City Hall after business hours without a Union City Badge
Ask if they have a badge
Report them
Approximate percentage of data breaches that could be easily prevented through simple training:
a) 10%
b) 40%
C) 80%
80%
This common security product is used to block unwanted and malicious network traffic
Firewall
This is the name of the location where cyber criminals can buy, sell, and share illegal or stolen data with little fear
Dark Web
You're hosting a Zoom meeting an see an unfamiliar name requesting to join
Ask who they are or Deny access
You're hosting a Zoom meeting an see an unfamiliar name requesting to join
Ask who they are
Deny access
This technology renders data unreadable unless a key is used to make it readable
Encryption
Name of hacker group that uses this is this image of an infamous person:
Anonymous
Most common password used globally?
a) 123456
b) qwerty
c) abcdef
123456
This is the modern approach to comprehensive Cybersecurity Protection
Options:
a) Defense In Depth
B) Global Security
C) Dynamic Protection
Defense In Depth
Or
Layered Security