Facebook and Twitter are two examples of these that are used by UCO to connect with student
What are social networking sites?
I spread harm by attaching myself to a program, file, or disk
What is Virus?
The Hacker's mindset that combines deliberate and intuitive thinking and relies on intensive experimentation.
What is exploration mindset?
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
I can detect malware and destroy it before any damage is done
What is Anti-Virus software? (or Anti malware)
It is the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.
What is Social Networking?
I'm an independent program that can replicate myself.
What is Worm?
I'm the first of the four steps in the hacking process
What is "identifying vulnerabilities"?
Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is Insider threat?
I can filter packets that enter or leave your computer
What is FireWall?
Social networking scams, vulnerability exploits, mobile malware, malicious spam runs, and targeted attacks are all examples of these.
What are looming trends in online threats? (Provided by www.gmanews.tv)?
Look like a genuine email from your banking and ask for your online banking username, password, and SSN.
What is Phishing?
In the hacker world this term refers to exploiting security vulnerabilities.
What is "Owning the system"?
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
Who are organized crime groups?
You should have it long and combining upper cases, lower cases, numbers and symbols.
What is a (strong) password?
Sexual solicitations, U R Cute messages, secret details about Michael Jackson's death, Test your IQ quiz, and "You won a lottery" message are all social networking examples of these things that you should avoid.
What are scams?
The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
Flash drive with classified data on it left in a public computer is an example of this.
What is a potential cyber security breach?
They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
What is state sponsored hacking?
In connecting to a secure site, I need to look for this one in front of the URL address.
What is https?
An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email.
What is social engineering?
I am a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack.
What is Botnet? (or zombies)
This is an example of information provided by the United States Computer Readiness Team regarding cyber security breaches around the country, and which is available at http://www.us-cert.gov/.
What is a Cyber Security Bulletin or announcement?
The weakest link in every computer system that could cause harm through thoughtlessness, unawareness or accident.
What is human/people/person?
A document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
What is Acceptable Use Policy?