This is happening when you get an email with malicious intent to deceive the recipient.
What is Phishing?
Who do you call when your computer is acting up and could have viruses
Should I call the help desk?
What is the art of exploiting human psychology to manipulate individuals into divulging confidential information or performing actions that compromise security.
What is social engineering?
These are used to facilitate encryption and digital signing
What are digital certificates?
This is the first state to enact a breach notification law
What is California?
These are malicious SMS Text Messages with the intent to deceive.
What are Smishing Attacks?
Someone who can infiltrate your company's computer network and steal information
What is a Hacker?
This term refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
What is Malware?
This is a secure, encrypted "tunnel" for your internet traffic, protecting your online privacy and security by hiding your IP address and scrambling your data.
What is a VPN?
The President to first issue an executive order on Cyber Security
Who is Barack Obama?
These are voice calls with the intent to deceive, usually by spoofing the phone number or voice of the person they are pretending to be.
What are Vishing Attacks?
This stands for BCSI.
What is Bulk electric system Computer Security Information?
This is a user within the organization that may be purposely exfiltrating data without authorization.
What is known as an Insider Threat?
This is the process of converting information or data into a code, especially to prevent unauthorized access.
What is Encryption?
This is the cybersecurity conference held annually in Las Vegas.
What is Def Con?
These are pictures of links in a quick response format that can be scanned by smart phones and used to deceive the end user into visiting malicious sites.
What are QR codes?
This is information that can be used to identify an individual.
What is Personally Identifiable Information or PII?
This is a password guessing attack that attempts all known passwords.
This sits between your corporate network and the internet, providing protected internet access.
What is a firewall?
You have to buy your coworkers tacos tomorrow morning because you failed to do this
Lock your computer
This person is widely considered to be the first person to use social engineering attacks against help desks to breach company computer networks
Who is Kevin Mitnick?
This is software that encrypts a person's computer and then asks for digital payment to unencrypt the computer.
What is Ransomware?
This is a weakness or flaw in a system's software, hardware, configuration, or human element that can be exploited to compromise security, gain unauthorized access, disrupt services, or steal data.
What is a Vulnerability?
Proactive prevention measures, ensuring services and workflows continue to function both before, during, and immediately after a disaster by maintaining operational processes is known as
What is Business Continuity?
This is the first major computer virus back in 2000 that was disguised as a love letter.
What is the ILoveYou Virus?