Secure It!
Hacked!
Managing Access
Certifiable
Strictly Security
100
When using this popular type of communication, you should use good judgment when identifying yourself as an employee.
What is Social Media?
100
This type of attack tricks unsuspecting people into opening infected attachments or clicking on malicious links sent via email.
What is Phishing?
100
Our BU is the first to adopt this product to manage privileged access to system and database accounts.
What is CyberArk?
100
The frequency in which we are required by policy to perform reviews of associate access.
What is Annually?
100
200
This data classification for information includes SSN's and system credentials.
What is Highly Confidential Information?
200
A type of threat that refers to someone who adversely impacts an organization, intentionally or unintentionally.
What is Insider Threat?
200
Access to our resources requires everyone to be coded as this by the Ethics Office.
What is Fund Access?
200
Communication method used by associates to get assistance with anything certification related.
What is eMail the Access Certifications Mailbox?
200
You can trust this application to encrypt confidential data in an email message.
What is Entrust?
300
This information security policy establishes the requirements for classifying, labeling, handling, and disposing of information.
What is the Securing Private and Proprietary Information Policy (SP2I)?
300
This term is used to describe the theft of data from your mobile device when using public charging stations.
What is Juice Jacking?
300
This application is used by associates to request access to applications, servers, databases, etc.
What is MyAccess?
300
Associates, managers, and resource owners perform these to review access appropriateness across applications and databases.
What are Access Certifications?
300
The product onboarding program is used by our BU and ensures the integration of information security.
What is SRR?
400
When storing information electronically during off-site travel, you may edit and save documents here.
What is a Corporate Owned Laptop?
400
This describes a type of unintended flaw in software code, that leaves it open to the potential for exploitation and can result in unauthorized access or malicious behavior.
What is a Security Vulnerability?
400
Everyone in our BU is assigned one of these when hired in order to gain the access required for their role.
What is an Access Role?
400
Often referred to as "Your Master of Certifications".
Who is Jason Graham?
400
The process designed to protect the company from the loss of sensitive data?
What is data loss prevention (DLP)?
500
If your device is lost or stolen, you should contact this group immediately.
What is Corporate Security?
500
A type of malicious software that prevents or limits users from accessing their system as it forces its victims to compensate the hacker through certain online payment methods first.
What is Ransomware?
500
This unique identifier is issued to every associate and used to assign access.
What is a Corp ID?
500
The tool used by associates, managers, and resource owners to certify access.
What is ACT?
500
The level of approval required on all Custodian Bank access requests to avoid the bank rejecting the request.
What is the requesting group's VP?
M
e
n
u