Social Engineering
PII/PHI
CUI
Physical Security
AI & Cybersecurity
100

This social engineering tactic involves an unauthorized individual following an authorized person through a secure entry point.  

What is tailgating (or piggybacking)?

100

This three-letter acronym stands for any health-related information, such as medical records or diagnoses, that can be used to identify a patient.

What is Protected Health Information (PHI)?

100

This acronym refers to unclassified information created or possessed by the government that, while not classified, still requires safeguarding and dissemination controls.

What is Controlled Unclassified Information (CUI)?

100

This is a method of cybersecurity that protects against unauthorized access to facilities, equipment, and resources.

What is physical security?

100

True/False:
It is acceptable to OPORDS, STRATCOMs, WARNOs into into ChatGPT?

False

200

This social engineering technique involves creating a fabricated scenario or story to trick a victim into divulging information or performing an action, often by impersonating someone in authority or with a legitimate need for the information.

What is pretexting?

200

This 1996 U.S. law establishes national standards to prevent the disclosure of sensitive patient data and individually identifiable health information without the patient's consent or knowledge.

What is the Health Insurance Portability and Accountability Act (HIPAA)?

200

Name the color used at the top/bottom of CUI documents:

What is purple?

200

These can include biometric scanners, keycard systems, and security guards, all designed to control who can enter a secure area.

What are access control mechanisms?

300

This attack method relies on human curiosity, often involving an attacker leaving a malware-infected physical device, such as a USB flash drive, in a public place for an unsuspecting victim to find and use.

What is baiting?

300

These are typically considered the most critical type of PII, as they can directly lead to identity theft or financial fraud, and include data like Social Security numbers, driver's license numbers, or financial account information.

What is sensitive PII?

300

True/False:
MS Teams can be used for CUI discussions.

True

300

This type of environmental control system is crucial in data centers to prevent hardware damage and ensure optimal performance by regulating temperature and humidity.

What are HVAC (Heating, Ventilation, and Air Conditioning) systems?

400

In this sophisticated attack, the perpetrator doesn't initiate contact. Instead, they manipulate a situation, causing a technical problem and position themselves as the authority to solve it, compelling the victim to seek them out and willingly offer information.

What is reverse social engineering?

400

Match the type of information with PII/PHI:

a. social security card
b. doctor's notes w/patient name, identifier
c. roster with name
d. patient's medical record 

What is:

a. PII
b. PHI
c. n/a
d. PHI

400

True/False:
CUI materials can be taken home. The materials can be loosely carried in my work bag with no cover sheet. 

False:
You can take CUI home. CUI documents must have a CUI cover sheet (SF901) and on top of material. It must be in an opaque envelope without CUI markings.

400

These physical barriers, ranging from fences to reinforced walls and mantraps, are designed to deter, delay, or detect unauthorized entry into sensitive areas. 

Bonus: Name one barrier USARC uses

What are perimeter defenses?



Bonus: Bollards 

500

In this attack, a perpetrator compromises a specific website or online service that they know their intended victims frequent, hoping to infect their computers when they visit this "trusted" location.

What is a watering hole attack?

500

While not unique on their own, these data points (zip code, gender, and date of birth), can be combined and cross-referenced with other data sources to re-identify individuals in what was thought to be an anonymous dataset.

What are quasi-identifiers?

500

True/False:
CUI is a classification marking, not a control marking.

False.

500

This is a U.S. government codename for a set of standards for limiting electromagnetic radiation emanations from electronic equipment to prevent eavesdropping and the reconstruction of sensitive data.

What is TEMPEST?