Be Sociable
Phising
Cyber Breach
Malware
Cyber Facts
100

Facebook and Twitter are two examples of these that are used by people to connect or create a network with each other.

What are social networking websites?

100

An example of this is receiving a request from a Nigerian prince via email asking you to give him bank account information so he can share the million dollars he has in an account that he must transfer somewhere to retrieve.

What is an email scam?

100

Something you should do on a regular basis to ensure you can restore your computer to a previous state if something goes wrong.

What is backup your computer/data?

100

This is a type of malware that appears as a computer program, spreads or self-replicates, and requires user interaction to activate.

What is a virus?

100

If using a windows-based PC, you do this to quickly lock your computer before stepping away.

What is press the Windows key and the letter L? (Ctrl+Alt+Del and select "Lock this Computer" also would be correct.)

200

**** SPECIAL JEOPARDY! **** (Copy and paste the following link into a browser to learn more. Pay attention to the name of the video to formulate your "What is..." answer to this question.) http://www.youtube.com/watch?v=6a_KF7TYKVc

What is "Social Networking"?

200

Bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, or a request for personal information are all examples of these.

What are things you should look for in an email that may indicate it is a scam?

200

This image in the lower-right corner of your web browser indicates you are on a secure website.

What is the lock icon?

200

It is contained in a valid program or can usually look like any normal file (mp3, computer game, picture, etc), but is a form of malware that collects your information, creates holes in your security, or take over your computer.

What is a Trojan Horse?

200

Contact the Technology Support help desk and your department supervisor, and power off your computer are steps you should take if this occurs.

What are the steps to do in case of a computer malware infection?

300

Social networking scams, vulnerability exploits, mobile malware, malicious spam runs, and targeted attacks are all examples of these.

What are looming trends in online threats? (Provided by www.gmanews.tv)

300

A claim that there is a "problem" with your account, notice that you have been "suspected violations of the law," request to "verify your identity," request from an IT department that you provide passwords or other information, or a request to fax information to a number are all examples of this.

What are things you might see in an email if it is a phishing scam?

300

These are things that you carry and, when not properly password protected, can result in a cyber security breach.

What are mobile devices, such as laptops, cell phones, and flash drives?

300

Worms and this are types of malware that self-replicate (can download automatically), but only this one requires you to do something, such as click on an email link, to actually activate it.

What is a virus?

300

Eight to twelve characters, upper- and lower-case letters, numbers as well as alphabetical characters, easy to remember but hard to guess, never shared with anyone, and never written down and left near your computer are guidelines for this.

What are the guidelines to follow to make sure your passwords are secure?

400

Sexual solicitations, U R Cute messages, secret details about Michael Jackson's death, Test your IQ quiz, and "Join State University's Class of 2013 Facebook group" are all social networking examples of these things that you should avoid.

What are scams?

400

When you receive an email with a link in it, you are advised to open a separate browser and type (or retrieve from favorites) the URL you already know for the website instead of clicking on the link in the mail.

What is one way to verify a scam email link?

400

Flash drive with classified data on it left in a public computer is an example of this.

What is a potential cyber security breach?

400

This type of malware tracks where you go on the Internet and what you type into your keyboard.

What is spyware?

400

This is done by watching (either in person or using a recording device) what someone else does on the computer by looking at a reflection of or the actual screen of the computer or mobile device.

What is shoulder surfing?

500

An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email.

What is social engineering?

500

How to spot phishing scams?

500

This is an example of information provided by the United States Computer Readiness Team regarding cyber security breaches around the country, and which is available at http://www.us-cert.gov/.

What is a Cyber Security Bulletin or announcement?

500

Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual are potential symptoms of this.

What is a malware infection?

500

Students can do this at no charge from UCO's Central Tech Store (http://www.uco.edu/technology/tech-store/) to protect your computer from malware.

What is download Symantec anti-virus protection software?