Information
Physical Security
Cyber Threats
Hacker/
Hacks
Legal and Ethical Aspects of Cybersecurity:

100
Random seemingly unrelated facts, numbers, words or statistics.
What is Data?
100
Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....
What is Defense in Depth?
100

 What type of malware disguises itself as legitimate software and often spreads through malicious email attachments or downloads?

What is a "Trojan Horse"?

100

This notorious hacker, known by the alias "Kevin Mitnick," was once on the FBI's Most Wanted list for computer-related crimes. Who is he, and what is he known for?

Who is "Kevin Mitnick," and he is known for hacking into various computer systems and stealing sensitive data, as well as for his social engineering skills?

100

What term describes the legal principle that requires organizations to inform individuals affected by a data breach or security incident?

What is "Data Breach Notification" or "Data Breach Disclosure"?

200
Data compiled into documents, maps, charts, and other forms of information gives assets dollar _____________
What is Value?
200
The list of computers, laptops, software, equipment owned by an organization.
What is Inventory?
200

In this type of social engineering attack, an attacker poses as a trusted entity to manipulate victims into providing confidential information.

What is "Phishing"?

200

In 2010, a highly sophisticated computer worm called ____ that targeted a specific type of industrial facility.

What is Stuxnet.

200

In cybersecurity, what is the primary purpose of a Non-Disclosure Agreement (NDA)?

 What is "Protecting Confidential Information" or "Preventing Unauthorized Disclosure"?

300
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
What is PII? (or Personally Identifiable Information)
300
The use of personality, inowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
300

What does "DDoS" stand for, where attackers flood a target system or network with traffic to make it unavailable to users?

What is "Distributed Denial of Service"?

300

 In 2020, a cybersecurity breach affected a prominent software company, leading to unauthorized access to its source code. What was the name of the company, and how did this breach impact cybersecurity worldwide?

What is "SolarWinds,".

300

What is the term for the ethical practice of intentionally probing a computer system or network for vulnerabilities to help improve security?

What is "Ethical Hacking" or "Penetration Testing"?

400
The evidence of daily decisions and operations within DOI and its bureaus/offices.
What are Federal Records?
400
30-50% of all data loss due to the people already within the organization.
What is Insider Threat?
400

What is the primary goal of a Distributed Denial of Service (DDoS) attack?

What is "Making a Service or Website Unavailable"?

400

 In 2010, a hacktivist group known for its Anonymous mask symbolized protest against various organizations and governments. What is the name of this group, and what is their symbol?

What is "Anonymous," and their symbol is the Guy Fawkes mask?

400

 In the context of cybersecurity ethics, what is the principle that emphasizes minimizing harm to individuals and organizations while conducting security research or testing?

What is the "Principle of Do No Harm"?

500
A legal notification directing you or the bureau/office to preserve any documentary material that may berelevant to a pending or foreseable lawsuit or administrative adjudication.
What is Litigation Hold?
500
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.
What is Standardization?
500

What is the term for the practice of gathering information about a target through social media and other public sources to launch targeted attacks?

 What is "OSINT" or "Open Source Intelligence Gathering"?

500

This hacking collective, founded by Julian Assange, gained international attention for its efforts to expose government and corporate secrets. What is the name of this group, and what is their most well-known platform for publishing leaks?

What is "WikiLeaks," and they are known for publishing leaks on their website?

500

: What is the legal concept that allows individuals or organizations to protect their intellectual property by preventing others from using, copying, or distributing their creations without permission?

What is "Copyright" or "Intellectual Property Rights"?

M
e
n
u