Attempts to acquire personal information such as usernames, passwords, bank account or credit card information via email.
What is Phishing?
When a person seeks unauthorized access to a secure area by closely following behind an authorized person.
What is Tailgating?
You should do this to quickly lock your computer before stepping away.
What is press the Windows key and the letter L? (Ctrl+Alt+Del and select "Lock this Computer" would also be correct.)
irdeins tretha
What is Insider Threat?
VPN
What is Virtual Private Network?
A program or file specifically developed for the purpose of doing harm.
What is Malware?
Going through trash to look for sensitive documents.
What is Dumpster Diving?
This security approach involves “double-checking” your identity with two or more verification factors.
What is Multi Factor Authentication (MFA)?
ecybr tyeurics
What is Cyber Security?
MFA
What is Multi Factor Authentication?
This type of malicious software is designed to block access to a computer system or data until a sum of money is paid.
What is Ransomware?
A security risks originating from within an organization, typically from individuals with authorized access, such as employees or contractors, who misuse their privileges or access to harm the organization.
What is an Insider Threat?
Must be at least fourteen characters, upper- and lower-case letters, numbers as well as special characters, easy to remember but hard to guess, never shared with anyone, never written down or left near your computer, and changed at least every 180 days.
What are Passwords/Passphrases?
iacols geenerni
What is Social Engineering?
AUP
What is Acceptable Use Policy?
A security device that monitors and controls incoming and outgoing network traffic.
What is a Firewall?
Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.
What is Shoulder Surfing?
This two-word term refers to an armed person who is using deadly physical force on other persons while continuing to seek out additional victims and may be targeting specific individuals.
What is a Hostile Intruder?
scesac ntcrloo
What is Access Control?
PII
What is Personally Identifiable Information?
This information includes financial transactions, medical, criminal and employment history, name, social security number, date and place of birth, mother's maiden name, biometric records, and any other personal information which is linked or linkable to an individual including credit/debit card information.
What is Personally Identifiable Information (PII)?
This non-technical intrusion technique relies heavily on human interaction in order to trick people into violating their own security procedures.
What is Social Engineering?
All persons who have these are responsible for the proper use and safekeeping and will wear them at all times while in secured spaces or other KDOR facilities.
What are Key Cards? (Badges would also be correct.)
retiycsu eanswsrae
What is Security Awareness?
USB
What is Universal Serial Bus?