Data Privacy
Security Definitions
Doing it Right
Operations
Security Basics
100

Random seemingly unrelated facts, numbers, words or statistics.

What is Data?

100

A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites.

What is a Web Browser?

100

An identifier that uniquely tracks actions to individuals.

What is an Account or Login ID?

100

Structured groups funded by governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.

What are nation states?

100

This core principle of information security ensures information is available only to authorized persons.

What is Confidentiality?

200

Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

What is PII? (or Personally Identifiable Information)

200

Making the right information available to the right people.

What is Access Control?

200

It is a word or phrase that verifies that you and only you had access to the account.

What is a Password or Passphrase?

200

People who traditionally try to gain access to computers remotely to learn more and for intellectual curiosity.

What are Hackers?

200

This core principle of information security ensures information is not accidentally or maliciously changed.

What is Integrity?

300

The worth of data compiled into documents, maps, charts, and other forms of information.

What is Value

300

Easily readable programs that automate or provide extra function on a computer system or in an application or browser.

What is Scripting?

300

This action can prevent unauthorized access to your computer session when you must step away.

What is Lock your screen?

300

One who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.

Who are Script Kiddies?

300

This core principle of information security ensures computers and information are effective in supporting the mission.

What is Availability?

400

Any document (paper or electronic, including video and audio files) created or received by you or your department that allows you to conduct business.

What are Records?

400

Encryption key is public, but decryption key is private.

What is Public-Key Cryptography?

400

This can prevent loss of data in case of hard drive failure or Ransomware.

What are Backups?

400

Finding security vulnerabilities that a malicious hacker could potentially exploit.

What is Ethical Hacking or Penetration Testing?

400

Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....

What is Defense in Depth?

500

All documents, information, and data should contain this marked on it.

What is a Classification Rating?

500

The combination/code used to encrypt and decrypt a coded message.

What is a cipher?

500

These privileges should only be used when necessary, not for daily computer use.

What are Elevated or Admin Privileges?

500

A security solution that helps organizations recognize potential security threats and vulnerabilities before they have a chance to disrupt business operations.

Who is a SIEM or Security Incident and Event Management?

500

The process of evaluating vulnerabilities and threats, identifying countermeasures, and applying mitigating actions to reduce risk.

What is Risk Management?