Security 101
Scams
Audit Security
Cyber Attacks
Cyber Facts
100
When you delete data
What is NO
100
Received from a Nigerian prince via email asking you to give him bank account information so he can share the million dollars he has in an account that he must transfer somewhere to retrieve.
What is an email scam?
100
100
What is a clean desk policy
100
This is a computer program that spreads or self-replicates and requires user interaction to activate. Both are programs that self-replicate (can download automatically), but only this one requires you to do something, such as click on an email link, to actually activate it.
What is a virus?
100
If using a windows-based PC, you do this to QUICKLY lock your computer before stepping away.
What is press the Windows key and the letter L?
200
What Social Networking software is allowed for use in the office
What is Microsoft Lync IM?
200
Bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, or a request for personal information are all examples of these.
What are things you should look for in an email that may indicate it is a scam?
200
200
What is locking my computer
200
It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screen saver or photograph, but is deisgned to give hackers access to your computer or files.
What is a Trojan Horse?
200
This image in the lower-right corner of your web browser indicates you are on a secure website.
What is the lock icon?
300
300
What is who owns my office email
300
A claim that there is a "problem" with your account, request to "verify your identity," request from an IT department that you provide passwords or other information, or a request to fax information to a number are all examples of this.
What are things you might see in an email if it is a phishing scam?
300
300
What is a potential data breach
300
Defined as programs that track where you go on the Internet and what you type into your keyboard.
What is spyware?
300
Eight to twelve characters, upper- and lower-case letters, numbers as well as alphanumeric characters, easy to remember but hard to guess, never shared with anyone, and never written down and left near your computer.
What is a strong passwords?
400
400
What is 400
400
When you receive an email with a link in it, you are advised to open a separate browser and type (or retrieve from favorites) the URL you already know for the website instead of clicking on the link in the mail.
What is one way to verify a scam email link?
400
400
What is locking down a caseware file
400
Piece of code that automatically reproduces itself over the network. It doesn't need the user intervention to propagate (autonomous)
What is a worm?
400
Flash drive with classified data on it left in a public computer is an example of this
What is a potential cyber security breach?
500
An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email.
What is social engineering?
500
500
What is never allow someone else to make changes to/delete files using my credentials
500
Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual are potential symptoms of this. Contact the Technology Support help desk and your department supervisor, and power off your computer are steps you should take if this occurs.
What is a malware infection?
500
Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.
What is shoulder surfing?
M
e
n
u