Information
Physical Security
Availability
The Enemy
Internet
100
Random seemingly unrelated facts, numbers, words or statistics.
What is Data?
100
Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....
What is Defense in Depth?
100
To apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.
What is Access Control?
100
They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.
Who are hackers?
100
A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox and Safari are examples of these.
What is a browser? (or web browser)
200
Data compiled into documents, maps, charts, and other forms of information gives assets dollar _____________
What is Value?
200
The list of computers, laptops, software, equipment owned by an organization.
What is Inventory?
200

An identifier that uniquely tracks actions to individuals.

What is a User ID? (or Login ID)

200
Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.
What is Insider threat?
200
Easily readable programs that automate or provide extra function on a computer system or in an application or browser. ActiveX and JavaScript are examples of this type of language.
What is Scripting? (or Scripting Code or Scripting Language)
300
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
What is PII? (or Personally Identifiable Information)
300

The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

What is Social Engineering?

300

This concept refers to the assurance that information and resources are accessible to authorized users when needed, often measured by uptime percentages in IT environments.

What is "availability"?

300
These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.
Who are organized crime groups?
300

This protocol, commonly used for transmitting web pages securely, operates over port 443 and is essential for transferring hypertext documents across the World Wide Web

What is "HTTPS"?

400

This term describes the practice of disguising malicious code as legitimate software, often tricking users into downloading it.

What is "Trojan horse"?

400
30-50% of all data loss due to the people already within the organization.
What is Insider Threat?
400

This strategy involves creating duplicate copies of data and systems to ensure access and functionality can be quickly restored in the event of a failure or disaster.

What is "disaster recovery"?

400
They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.
What is state sponsored hacking?
400

This type of attack involves overwhelming a server with traffic from multiple sources, rendering it unable to respond to legitimate requests.

What is a "DDoS attack" (Distributed Denial of Service)?

500

This legal framework aims to enhance data protection and privacy for individuals within the European Union and the European Economic Area.

What is the "General Data Protection Regulation" (GDPR)?

500

This type of security measure involves the use of barriers, such as fences, walls, and gates, to protect a facility from unauthorized access and to deter potential intruders.

What is "perimeter security"?

500
It is a word or phrase that verifies that you and only you had access to the account.
What is a Password?
500
The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.
Who are you? (Who am I?)
500

This concept refers to the interconnection of everyday devices to the internet, allowing them to send and receive data.

What is "Internet of Things"?