What does the CIA Trida stand for?
DAILY TRIPLE
Confidentiality
Integrity
Availability
What is considered private information? Name three.
Birthday, Address, Birthdate, Full Name, Social Security Number, Credit Card Number, School You Attend, etc.
The Internet is wireless...
False
What is cybersecurity?
Protecting electronic networks and devices
When people look through garbage in order to find personal information...
DAILY TRIPLE
Dumpster Diving
Luke logs into Infinite Campus and sees not only his grade but everyone else's. What part of the CIA Triad was compromised?
Confidentiality
Devices can be tracked through the Internet by its...
IP Address
How fast could light travel around the world in one second?
6 1/2 or 7 times
DAILY DOUBLE
About 60% (60.1)
What does VPN stand for?
DAILY DOUBLE
Virtual Private Network
Faith logs into Infinite Campus and she is able to change other people's grades. What part of the CIA Triad was compromised?
Integrity
If the product is free then...
DAILY DOUBLE
You are the producT
What is the big concern if the Internet was wireless only?
DAILY DOUBLE
Latency
What does IoT stand for?
Internet of Things
Unscramble this binary code: 1011 0011
DAILY DOUBLE
179
CJ tries to log into Infinite Campus but the site won't display for some reason. What part of the CIA Triad was compromised?
Availability
Bill is working on his computer on a Delta flight, but Larry sitting in the seat near Bill sees his information. This is known as...
Shoulder Surfing
Name three PROS and three CONS of the Internet
Answer Vary
How fast does light travel per second?
186,282 miles per second
Extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Like your own private tunnel that allows you to use public wifi.
VPN
A model that represents the three pillars of information security
The CIA Triad
This is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
Ransomware
An electronic communications network that connects computer networks and organizational computer facilities around the world.
The Internet
Cables that carry electrical signals...
Fiber Optic Cables
A method of protecting data by scrambling it into a secret code that can only be unlocked with a unique digital key.
Encryption