Social Engineering
Cyber 101
Cyber Threats
Confidentiality, Integrity, and Availability (CIA)
Fun Facts
100

This is happening when you get an email with malicious intent to deceive the recipient.

What is Phishing?

100

Who do you call when your computer is acting up and could have viruses

Should I call the help desk?

100

What is the art of exploiting human psychology to manipulate individuals into divulging confidential information or performing actions that compromise security. 

What is social engineering?

100

These are used to facilitate encryption and digital signing

What are digital certificates?

100

This is the first state to enact a breach notification law

What is California?

200

These are malicious SMS Text Messages with the intent to deceive.

What are Smishing Attacks?

200

Someone who can infiltrate your company's computer network and steal information 

What is a Hacker?

200

This term refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.

What is Malware?

200

This is a secure, encrypted "tunnel" for your internet traffic, protecting your online privacy and security by hiding your IP address and scrambling your data.

What is a VPN?

200

The President to first issue an executive order on Cyber Security 

Who is Barack Obama?

300

These are voice calls with the intent to deceive, usually by spoofing the phone number or voice of the person they are pretending to be.

What are Vishing Attacks?


300

This stands for BCSI.

What is Bulk electric system Computer Security Information?

300

This is a user within the organization that may be purposely exfiltrating data without authorization.

What is known as an Insider Threat?

300

This is the process of converting information or data into a code, especially to prevent unauthorized access.

What is Encryption?

300

This is the cybersecurity conference held annually in Las Vegas.

What is Def Con?

400

These are pictures of links in a quick response format that can be scanned by smart phones and used to deceive the end user into visiting malicious sites.

What are QR codes?

400

This is information that can be used to identify an individual.

What is Personally Identifiable Information or PII?

400

This is a password guessing attack that attempts all known passwords.

What is a brute force attack?
400

This sits between your corporate network and the internet, providing protected internet access.  

What is a firewall?

400

You have to buy your coworkers tacos tomorrow morning because you failed to do this

Lock your computer

500

This person is widely considered to be the first person to use social engineering attacks against help desks to breach company computer networks

Who is Kevin Mitnick?

500

This is software that encrypts a person's computer and then asks for digital payment to unencrypt the computer.  

What is Ransomware?

500

This is a weakness or flaw in a system's software, hardware, configuration, or human element that can be exploited to compromise security, gain unauthorized access, disrupt services, or steal data.

What is a Vulnerability?

500

Proactive prevention measures, ensuring services and workflows continue to function both before, during, and immediately after a disaster by maintaining operational processes is known as

What is Business Continuity?

500

This is the first major computer virus back in 2000 that was disguised as a love letter.

What is the ILoveYou Virus?

M
e
n
u