Passwords
Information Security
Physical Security
Cyber Security
Other
100

12345678

Good or Bad password?

BAD!!!!!!!!!!!!!!!!!!

100

What is Hacking?

Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system

100

Give one example:

Locking your window when you aren't there

locking the door when you aren't there

locking your laptop when you aren't there

ETC.


100

Which of the following is good Cyber security practice?

Having the same password for every account.

Giving your information to other people over the phone if they tell you they are your bank and they need the info?

Making sure the internet site you click on is legit and secure before clicking.

Making sure the internet site you click on is legit and secure before clicking.

100

What is cloud computing?

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer

200

What all should a password consist of?

numbers, uppercase and lowercase letters, and special characters
200

What is social engineering?

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.

200

Why is physical security important?

It is important to practice physical security because that can make gaining access to the system just as easy as a cyber breach.

200

If putting a USB Drive into your computer should you have it run a scan first?

YES!!!!!!!!!!

200

What is it okay to access on a company computer:

anything related to your job
300

Should your password be obvious personal information people can find?

NO!

300

What is phishing?

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

300

What are the protocols at Community Teamwork  for physical security?

before you leave your office lock your door, windows and computer

Before you leave your station at the front line make sure your computer is locked and no sensitive information is out.

300

If you click on a website that infects your computer what should you do?

Exit the website immediately, shut down your computer, then call the IT person and DO NOT TURN BACK ON WITHOUT INSTRUCTION

300

What is it not okay to access on your company computer especially during work hours?

Anything inappropriate, 

400

Is there something considered to secure for a password?

NO! At least not really there are ridiculously overly cautious passwords but as long as you are comfortable typing in like a 30 - 50 character long passcode, Go For IT!

400
What is the difference between spear phishing and phishing?

Phishing is doing fraudulent practices and sending them out to multiple people for a response and spear phishing means they have researched and targeted you specifically and is harder for you to detect.

400

What is the definition of physical security?

Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution.

400

What is malware?

Malicious software meant to damage your computer and/or your computer systems.

400

What is a firewall and why do we use one?

a part of a computer system or network which is designed to block unauthorized access while permitting outward communication

We use one to prevent any kind of cyber attack and to keep our member's information safe

500

Give an example of a strong password:

Not personal

at least 12 characters

consists of numbers, special characters, and letters ( upper and lower )

500

Who is in charge of our information security at Community Teamwork?

Brian Nestor

500

What all does physical security include?

This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.

500

If a firewall only protects you while you are in the building is that enough?

NO!!!!! 75% IS NOT ENOUGH!! :)

500

What did you think of this training? Any suggestions?

Thank you!