Information
Physical Security
Availability
Threats, Attacks, and Vulnerabilities
Cryptography
100

Random, seemingly unrelated facts, numbers, words or statistics.

What is Data?

100

Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....

What is Defense in Depth?

100
To apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.
What is Access Control?
100
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
100

Set of procedures resulting from a mathematical formula to disguise or encode information. 

What is a cipher? (or web browser)

200

A document that defines policies and processes that outline the way in which information is managed in an organization 

What is Framework?

200

The list of computers, laptops, software, equipment owned by an organization.

What is Inventory?

200
An identifier that uniquely tracks actions to individuals.
What is an Account? (or Login ID)
200
Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is Insider threat?
200

An encryption method that uses two mathematically related keys, a public key, and a private key, to encrypt and decrypt data. 

What is asymmetric encryption? 

300
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
What is PII? (or Personally Identifiable Information)
300
The use of personality, inowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.
What is Social Engineering?
300
Functional managers classify data and grant approval to those whose jobs require access to the information.
Who are Data Managers?
300
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
Who are organized crime groups?
300

A random string of alphanumeric characters is used to encrypt or decrypt a message. 

What is an encryption key?

400

Patients Health Information Privacy Law

What is HIPAA?

400
30-50% of all data loss due to the people already within the organization.
What is Insider Threat?
400

Consists of the three underlying core security principles of data protection.

What is CIA triad?

400
They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
What is state sponsored hacking?
400

A mathematical function that creates a fixed length value based on the data. 

What is Hashing?

500

Adhering to laws, regulations, and standards as set forth by a governing body 

What is Compliance?

500
A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.
What is Standardization?
500
It is a word or phrase that verifies that you and only you had access to the account.
What is a Password?
500
Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.


What is Malware?

500

An encryption method that uses a single key to encrypt and decrypt data. 

What is symmetric encryption?