Using deception to manipulate individuals into disclosing information is also known as
What is social engineering?
Looking at the URL on an email you notice it's abbreviated to bit.ly/20aadf. Would you click it?
What is No? (You don't know where it goes)
The protection of personnel, hardware, software, networks, and data from physical attack is also known as...
What is physical security?
All information owned by Trend Micro and entrusted to it by its customers is considered by default ___________ information.
What is confidential?
This currency offers anonymity and does not have a central authority of control—that is why cybercriminals commonly utilize this as a mode of payment.
What is Bitcoin?
A social engineering tactic where a person uses online communication to deceive the victim into clicking a link.
What is phishing?
Looking at the URL on an email you notice it leads to HTTPS://SECURE.YAH00.COM. Would you click it?
What is No. (it has zeroes, not o's)
The selective restriction of access to a place or resource.
What is access control?
This security policy says sensitive materials are to be removed or locked away when not in use.
What is clean desk policy?
Famous ransomware targeting Windows, encrypted files and demanded payment by bitcoin.
What is Wannacry?
Two major consequences of a breach would be a loss of reputation and ….
What is a financial loss?
Looking at the URL on an unsolicited email you see a link to https://google.com . Would you click it?
What is No?
These are pocket-sized plastic cards with embedded integrated circuits, used for authentication.
What are smart cards?
This policy says company information must be properly identified to prevent improper dissemination.
What is the information classification policy?
Government agency that was responsible for developing Eternal Blue exploit.
What is NSA?
Sending emails from an apparently-trusted sender in order to induce specific individuals into clicking.
What is spear phishing?
Looking physically in garbage bins for company-specific data for future phishing attacks is called.
What is dumpster diving?
In the event of power disruption, doors unlocked so people are not trapped, this refers to a _____ -setting
What is fail-safe setting?
This regulation standardizes data protection law across all 28 EU countries.
What is the General Data Protection Regulation (GDPR)?
Unlike Crypto-ransomware, this type of ransomware locks the computer or device preventing them from logging in.
What is locker ransomware?
Phishing that targets high-level executives.
What is whaling?
This is a recommended security practice against dumpster diving before disposal of sensitive paper documents.
What is shredding?
Using a double set of doors to prevent piggybacking by allowing only a single individual to enter a facility at a time.
What are mantraps?
The GDPR introduces a right for individuals to have personal data erased. The right to erasure is also known as.
What is the right to be forgotten?
It was the first example of ransomware that encrypted users' data with a different symmetric key for each file.
What is CryptoLocker?