Settings to restrict access to your profile.
What are privacy settings?
Someone gives you a USB drive that is preloaded with malware in the hope you will use the device and enable them to hack your computer.
What is Baiting?
An Insider's use of IT for unauthorized modification, addition, or deletion of sensitive data for personal gain, or theft of information.
What is Fraud?
Anti-virus, anti-spam, and firewall software.
What are protections?
A system designed to prevent unauthorized access to private systems.
Prime targets and venues for hackers to distribute malicious code.
What are Social Networking sites?
What is a Scam?
What are Insider Threat Indicators?
An identifier that tracks actions to individuals. Unique to each person.
What is an Account?
Malicious software that infects the computer and displays messages demanding a fee to be paid to access the system again. Many times the messages will say they will delete all data if not paid.
What is Ransomware?
It is okay to use your DoD email address on your Facebook. True or False.
What is False?
The strategic use of conversation to extract information from people without giving them the feeling they are being interrogated.
What is Elicitation?
An insider's use of IT to steal confidential or sensitive information from the organization
What is Theft of Intellectual Property?
A software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
What is Malware?
Weakness the adversary can exploit to get critical information.
What is vulnerability?
Social security number, full birth date, home address, bank account, passwords, credit card information.
What are things you shouldn't post!?!?!?
Publicly releasing PII retrieved from social networking sites.
What is Doxing?
Mental disorders, personality problems, history of rule violations, and lacking social skills
What are Insider Threat indicators?
The means in which information is converted into a secret code that hides the information's true meaning. The only way to read the information is to be able to unlock the code.
What is Encryption?
A word or phrase only you should have access to.
Setting that logs coordinates of pictures taken on phone that could be uploaded.
What is geotagging?
Usually an email that looks like it is from a legitimate organization or person. Usually contains malware through a link or file.
What is Phishing?
An insider's use of IT to directly harm the organization or individual
What is Sabotage?
Combination of home address, phone number, banking information, medical information, social security number
What is PII?
Who is a Hacker?