Social Engineering
Cyber Incidents
Password Good Practices
Insider Threat
Unauthorized Devices
100

I can be found on your desk. I am supposed to be covered when not in use. Leaving me exposed will reveal personal information like SSN, DOB, DOD#, etc.

What is Personally Identifiable Information (PII)?

100

This should be located visibly in your workspace so my information can be seen. Every user should have this in case something happens.

What is the Cybersecurity Incident Reporting Aid?

100

Recommended: 8-12 minimum number of characters including a mix of letters, numbers, and special characters.

What is a strong password?

100

A current or former USARC employee who intentionally misuses their access to harm the organization, steal data, or sabotage systems.

What is a malicious insider threat?

100

I meet DOD standards & NSA-compliant. I have cross-cut teeth and can tear a document fast. The only device used for destroying evidence. 

What is an authorized shredder?

200

The practice of looking at someone's computer from behind, without them noticing, being nosey. Trying to gain personal information by looking over.

What is Shoulder Surfing?

200

Malicious software is installed on a system without the user's knowledge, through email attachments or infected websites. The goal is to steal data and/or damage computer systems.

What is malware software?

200

A tool that can help users generate and store complex, unique passwords for their accounts. No more guessing and locking accounts.

What is a password manager?

200

A user begins accessing systems or data outside the scope of their job responsibilities.

What is a non privileged user?

200

I'm portable, small, and cute. I can do flips, fold, slide, but never bend. I can only hang with a partner after works hours.

What is a cell phone?

300

Sending broad emails that looks legit, but my goal is to obtain your sensitive information.

*Bonus point if you can name this particular type that targets specific personnel.......

What is Phishing?

300

An attacker overwhelms a system, server, or network with traffic, rendering it unavailable to legitimate users. 

What is a Distributed Denial-of-Service (DDoS) attack?

300

A security feature that adds an extra layer of protection by requiring a second form of verification, like a code sent to your phone or email.

What is two-factor authentication (2FA)? 

300

Risk posed by an individual at USARC who may unintentionally or intentionally compromise security through actions like mishandling data, ignoring policies, or abusing access.

What is an insider threat?

300

I am tapped/clicked all day and not supposed to be used in the USARC HQ building. My connection is through USB; you can hardly see me.

What is a wireless mice/keyboard device?

400

Following people in a restricted room is what I like to do. I'm not authorized to be there, but why not, I'll just smile and nod. 

What is Tailgating?

400

Encrypting user data and demanding payment, in exchange for access back on their device.

What is ransom ware?

400

This isn't allowed, but it's common and risky habit involving using the same password across multiple accounts.

What is a password reuse?

400

Someone is who dislikes their job and/or team members. This type of user is dangerous because they can cause the most harm.

What is a disgruntled user?

400

Unauthorized device that can mimic a legitimate Wi-Fi network, tricking users into connecting and unknowingly exposing their data to attackers.

What an evil twin access point?

500

Using artificial intelligence to mimic a trusted person’s voice or image, to manipulate employees into taking urgent actions like transferring funds or sharing sensitive data.

What is deepfake impersonation? 

500

Used as a decoy system or resource set up to attract cyber attackers so security teams can observe their tactics without risking real assets.

What is a honeypot?

500

An advanced password strategy involving using a long, unique passphrase that combines unrelated words, numbers, and symbols.

What is a passphrase password?

500

The monitoring approach that helps detect insider threats by analyzing user behavior over time. It flags anomalies such as unusual login times, large file transfers, or unauthorized access attempts.

What is User and Entity Behavior Analytics (UEBA)?

500

Unauthorized wireless device connected to a secure network, potentially allowing attackers to intercept data or gain access.

What is a rogue device or rogue access point?