Passwords
Information Security
Physical Security
Cyber Security
Other
100

12345678

Good or Bad password?

BAD!!!!!!!!!!!!!!!!!!

100

65% of Cybercriminal groups used this type of attack as the primary infection vector.

spear-phishing

100

43% of all breeches are_________ threats, either intentional or unintentional.

"Insider threats"

100

48% of malicious email attachements are _____________file types.  

Office document file types. i.e. .doc, .xlsx.

100

What is cloud computing?

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer

200

What all should a password consist of?

numbers, uppercase and lowercase letters, and special characters
200

What is social engineering?

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.

200

Why is physical security important?

It is important to practice physical security because that can make gaining access to the system just as easy as a cyber breach.  Also some deal with a good number of PII paper documents.  Example breaking in physically increases the chance of finding an unlocked computer provides the opportunity to print off a list of passwords saved in OneDrive.

200

What should you do if you were to find a 32 GB USB thumb drive laying around in the office?

Bring it to UMF HelpDesk.  Tey have methods and tools to safely check and scan the thumb drive, and get it back to the original owner if needed.

200

$___________is lost every minute due to a phishing attack.

$17,700  in the USA.

300

Should your password contain personal information people can find or reference via instagram, Facebook, or Twitter?

No. Hackers often will research their targets and generate lists of possible passwords after browsing through your social media.

300

What is phishing?

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

300

What should you do before leaving your office or cubicle, at Home OR on Campus?

Before you leave your desk/office, make sure your computer is locked and no sensitive information is out.  Locked office door is acceptable as well.

300

If you find that your computer has been infected, what should your next steps be?

Call the helpdesk immediately.

Unplug the ethernet cord, turn off wireless.

Shutting your computer down is also acceptable.

300

The average cost of a data breach in 2021 was $____________.

$4.24 Million dollars

400

What is the UMF's Security Team's favorite tool for Password managment?

LastPass

400

What is the difference between spear phishing and phishing?

Phishing is doing fraudulent practices and sending them out to multiple people for a response and spear phishing means they have researched and targeted you specifically and is harder for you to detect.  Netflix phish vrs. UMF fake cindy email.

400

What is physical security?

Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution.  Use griz card for entry.

400

What is malware?

Malicious software meant to damage your computer and/or your computer systems.

400

The average life cycle of a breach in 2021 was ____________ days from identification to containment.

286 days.

500

Give an example of a strong password (not one that you are using or have used...)

Example 

- Not personal

at least 12 characters

consists of numbers, special characters, and letters ( upper and lower )

500
95% of Cybersecurity breaches are caused by this.

What is Human Error.

500

 What is the likelihood that a cybercrime entity is detected and prosecuted in the U.S.?

is estimated at around 0.05 percent.

500

What is a firewall and why do we use one?

a part of a computer system or network which is designed to block unauthorized access while permitting outward communication

We use one to prevent any kind of cyber attack and to keep our member's information safe

500

More than double any other country, the US was the target of ____% of cyberattacks in 2020.

46%