Passwords
Social Engineering
Cloud Computing
Potpourri
InfoSec Terms
100
Your name, your birthday, your children’s names or birthdays, your spouse’s name or birthday or any information that can be easily tied back to you. Common words such as ‘password’, ‘summer’, ‘football’, or simple number sequences.
What types of information should not be used in passwords?
100
Making sure that your credentials aren’t available when you are finished accessing a social networking site.
What is logging off or signing out of a public site?
100
The firm's private-cloud secure file transfer and collaboration application.
What is Accellion?
100
Something you should do on a regular basis to ensure you can restore your computer to a previous state if something goes wrong.
What is backup?
100
Using electronic messaging as a social engineering technique in an attempt to gain fraudulent access to information.
What is phishing?
200
A password that contains special characters, numbers, letters and more than eight characters.
What is a strong password?
200
The one social networking site that the firm encourages joining.
What is LinkedIn?
200
Resources or services provided over the Internet.
What are cloud services?
200
Federal law that governs personal health information management.
What is HIPAA?
200
A type of malicious software designed to block access to a computer system until a sum of money is paid.
What is ransomware?
300
The firm's time increment for changing passwords.
What is 90 days.
300
One of the most popular social networking sites.
What is Facebook?
300
The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
What is cloud computing?
300
Psychological manipulation of people into performing actions or divulging confidential information.
What is social engineering?
300
The conversion of electronic data into another form which cannot be easily understood by anyone except authorized parties.
What is encryption?
400
A safe place to store your passwords securely.
What is a password safe?
400
When activity appears on your social media wall or account that you did not initiate.
What is getting hacked?
400
Used to describe an Internet location where information and data can be stored or shared.
What is the cloud?
400
You do this to often and should do it always when leaving your computer before stepping away.
What is Windows + L or Ctrl+Alt+Delete and choosing Lock this Computer?
400
The process of confirming the correctness of the claimed identity.
What is authentication?
500
The firms recommended password safe application.
What is KeePass?
500
Hidden details in photos you see online to find out where they were taken, if proper security settings are not selected.
What are GPS coordinates?
500
-Potential unauthorized access by the providers or hackers to your information. -Inability to permanently delete information. -Not knowing where your data is stored. -Potential to lose access to your data if provider goes out of business.
What are some of the risks of using cloud services?
500
Disconnect your computer from the network and contact Technical Support are steps you should take if this situation occurs.
What should I do if I suspect Malware?
500
A gateway that limits access between networks.
What is a firewall?
M
e
n
u