Types of Policies
Hacking
Types of Scams
Network Security
Identity Theft
200

What is a Policy?

A course or principle of action adopted or proposed by a government, party, business, or individual.

200

What is Hacking?

The act of identifying and then exploiting weaknesses in a computer system or network, usually to gain unauthorized access to personal or organizational data.

200

What is a Scam?

Fraud or deceptive act or operation.

200

What is Network Security?

Any activity designed to protect the usability and integrity of your network and data.

200

What is Identity Theft?

When someone steals your personal information to commit fraud such as applying for credit, filing taxes, or obtaining medical services 


400

What is a Privacy Policy? 

A policy that indicates what kind of information a website will take from you and what they intend to do with it.

400

What is a "Black Hat Hacker"?

A computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice.

400

What is the "Unexpected Winnings" Scam? 

Trick you into giving money upfront or your personal information to receive a prize from a lottery or competition that you never entered which includes prize and lottery.

400

What is Authentication? 

The process of validating the identity of an individual to the system

400

What is Forgery? 

An item that is falsely made or copied in order to deceive people.

600

What are the "Terms Of Service"?

The legal agreements between a service provider and a person who wants to use that service.

600

What is a "White Hat Hacker"?

An ethical hacker that tests systems and networks by trying to break into them.

600

What is the "Fake Charities" Scam? 

This is when Scammers collect money by pretending for a legitimate cause or charity, or a false one that was created.

600

What is an Algorithm(s). 

A rule or mechanism used to encrypt data.

600

What is an Imposter? 

Someone pretending to be another person.

800

What is a Privacy Policy?

A thorough explanation of how you plan to use any personal information that you collect through your mobile app or website.

800

What is an Attacker? 

A person with malicious intent?

800

What is a Romance Scam? 

This is when scammers target people based on a desire to form romantic relationships with others.

800

What is Access Control? 

A method for determining and assigning privileges to resources.

800

What is Fraud?

The crime of using dishonest methods to take something valuable from another person 


1000

True or False?: A Privacy Policy is the legal agreement between a service provider and a person who wants to use that service.

False

1000

What is a "Gray Hat Hacker"

A computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker.

1000

What are some clues that you can use to determine if someone is trying to scam you? 

Some clues could include a Sense of urgency, Spelling and grammar errors, Alert! Alert!, "Friend" in trouble, Shortened URL, Too good to be true, and Generic or missing greeting. 

1000

What is Authorization? 

The process of determining the level of access that is going to be granted to a user based on their identity.

1000

What is Dumpster Diving? 

Going through a person's trash for documents that can be used for identity theft. 

M
e
n
u