Mixed Bag
Physical Security
Availability
Cyber Breach
Internet
100
This is the step your security system goes through to correctly identify that the person accessing your information is actually allowed to see it.
What is Authentication?
100
This is when an employee holds the door open for others, such as visitors without badges.
What is Tailgating?
100
A set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used.
What is Acceptable Use Policy?
100
Something you should do on a regular basis to ensure you can restore your computer to a previous state if something goes wrong.
What is backup your computer/data?
100
Internet Explorer, Firefox and Safari are examples of these.
What is a browser? (or web browser)
200
The process of converting information or data into a code, especially to prevent unauthorized access.
What is Encryption?
200
This refers to using direct observation techniques, such as looking over someone's shoulder, to get information.
What is Shoulder Surfing?
200
A software package that automatically plays, displays or downloads advertising material to a computer after the software is installed on it or while the application is being used.
What is Adware?
200
This image in a web browser indicates a secure mode where communications between browser and web server are encrypted. This type of connection is designed to prevent anyone from reading or modifying the data that is exchanged across the internet.
What is a padlock icon or lock icon?
200
A software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
What is Malware?
300
Any combination of your name, your home address or phone number, credit card or account numbers or social security number.
What is PII? (or Personally Identifiable Information)
300
This type of attack relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
What is Social Engineering?
300
An individual who attempts to gain unauthorized access to a computer system.
What is a Hacker?
300
Carried with you and not properly password protected can result in a cyber security breach.
What are mobile devices, such as laptops, cell phones, and flash drives?
300
This occurs when the attacker pretends to be a trustworthy entity, either via email or web page.
What is Phishing?
400
This attack refers to either black hat hackers or botnets random attempts at guessing a business’s or an individual’s passwords.
What is a Bruce Force Attack?
400
You should remember to clean or erase this when leaving a shared meeting room.
What is a Whiteboard?
400
Within an organization, this department ensures that information is protected from disclosure to unauthorized users (confidentiality), improper modification (integrity), and non-access when required (availability)
What is the Information Security Department?
400
Flash drive containing classified data is left in a public computer is an example of this.
What is a potential cyber security breach?
400
This is any non-computing device, such as thermostats, cars, lights, refrigerators, and other appliances that can connect wirelessly to a network and has the ability to transmit data
What are Internet of Things (IoT) devices?
500
This is when a hacker poses as a service provider and tries to get you to provide your username and password to your company’s login or to access your personal information.
What is Phishing?
500
The most important thing to do when you step away from your workstation or laptop.
What is Lock your screen?
500
It is a word or phrase that verifies that you and only you have access to the account.
What is a Password?
500
The person who (because of thoughtlessness, unawareness or accident) can cause loss of work products (such as deletion, corruption or improperly safeguarding data).
Who are you?
500
You should never do your banking, shopping, or other business transactions while connected to this.
What is Public Wi-Fi?