Social Engineering
Cyber Incidents
Insider Threats
Password
Unauthorized Devices
100

This item, often found on a desk, should be kept covered when not in use. If left exposed, it may reveal sensitive personal data such as Social Security Numbers, Dates of Birth, or Department of Defense identifiers.

What is Personally Identifiable Information (PII)?

100

This item should be posted in user's workspace. It provides instructions to follow in case of a cyber incident.

What is the Cybersecurity Incident Reporting Aid?

100

A current or former USARC employee who intentionally misuses their access to harm the organization, steal data, or sabotage systems.

Who is an insider threat?

100

Contains 8-12 minimum characters including a mixture of letters, numbers, and special characters. Cannot be previously used.

What is a strong password?

100

This device meets DoD standards and is NSA-compliant. It's designed to have cross-cut teeth and used to destroy classified or sensitive information. 

What is an authorized shredder?

200

This sneaky practice involves peeking at someone’s computer screen from behind or the side, often without their knowledge, in an attempt to gather personal or sensitive information.

What is shoulder surfing?

200

This type of software is secretly installed on a user’s system; often via email attachments or compromised websites. The intent is to steal sensitive information or cause harm to computer systems.

What is malware?

200

This behavior includes: trying to access systems or data outside the scope of their job responsibilities, obtaining sudden wealth, or working non-scheduled hours.

What is are indicators of a potential insider threat?

200

A tool that can help users generate and store complex and unique passwords for their accounts. No more guessing and locked-out accounts.

What is a password manager?

200

This device is compact and can flip, fold, slide, but never bend. It is often seen paired with a partner after works hours and used for entertainment.

What is a cell phone?

300

This deceptive tool is scanned using a phone’s camera. Cybercriminals embed malicious code within it to redirect users to fake websites, aiming to steal sensitive data or install malware.

What is QR code?

300

This type of cyber attack overwhelms a system, server, or network traffic, rendering it unavailable to legitimate users. 

What is a Distributed Denial-of-Service (DDoS) attack?

300

Risk posed by an individual at USARC who may unintentionally compromise security through actions such as mishandling data, engaging phishing emails, being unaware of policies, or misusing access.

What is an unintentional insider threat?

300

A security feature that adds an extra layer of protection by requiring a SECOND form of verification, such as a code sent to your phone or email.

What is two-factor authentication (2FA)? 

300

This device can be tapped or clicked. It's supposed to be connected with a USB cord, but users sneak me in to use. It's prohibited in the USARC HQ building. 

What is a wireless mice or keyboard?

400

This unauthorized act involves slipping into a restricted area by closely trailing someone with access—often relying on a friendly smile or confident nod to avoid suspicion.

What is tailgating?

400

This attack encrypts user data and demands payment, in exchange for access to their device.

What is ransomware?

400

This individual may who dislike their job and/or team members. This  user can cause significant harm to an organizations systems.

What is a disgruntled user?

400

A common and risky behavior involving redundant credentials for multiple accounts.

What is password reuse?

400

Unauthorized device that can mimic a legitimate Wi-Fi network, tricking users into connecting and unknowingly exposing their data to attackers.

What is a rogue or evil twin access point?

500

Using artificial intelligence to mimic a trusted person’s voice or image, to manipulate employees into taking urgent actions like transferring funds or sharing sensitive data.

What is deepfake impersonation? 

500

Name the most common cyber incident for USARC FY2024.


**Bonus 500pts: name the 2nd most common

What are plugging cell phones into laptops?


**Adult Content

500

The monitoring approach that helps detect insider threats by analyzing user behavior over time. It flags anomalies such as unusual login times, large file transfers, or unauthorized access attempts.

What is User and Entity Behavior Analytics (UEBA)?

500

An advanced password strategy involving using a unique combination of words.

What is passphrase?

500

This is an unauthorized activity unless you are an Data Transfer Agent (DTA)? 

What is transferring/downloading to an external storage device?