Cybersecurity #1
Cybersecurity #2
Cybersecurity #3
Cybersecurity #4
BOH History
100

The three pillars of cybersecurity are confidentiality, integrity, and _________.

what is availability

100

Cybersecurity refers to the protection of hardware, software, and data from ___________

what are attackers

100

Illegal copying and selling of DVDs and CDs is called____________

what is Piracy

100

A Creative Commons license lets people use an entire piece of work for educational purposes. True or False?

what is True

100

What is the name of Bank of Hawaii's CEO?

Who is Peter Ho

200

Internet, video games, videos, and cell phones are examples of ________ _________.

what is digital media

200

One result of posting incorrect material/items online is that you could lose your job. True or False?

what is True

200

This is a common term used to describe a worm, digital virus, or other dangerous program. 

What is malware.

200

Blowfish is an example of ______________

What is a symmetric encryption algorithm 

200

Bank of Hawaii has a total of _________ branches

what is 67

300

What is the opposite of F2F?

what is online

300

What is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet?

what is Caesar cipher

300

I want to protect my song legally from being copied or used without my permission. This is an example of:

what is copyright

300

Asking someone personal questions in order to be used for fradulent or malicious purposes is known as __________  ___________

what is social engineering

300

Bank of Hawaii has been open for ____________ years.

what is 125

400

Giving someone a hard time online and being mean is called:

what is cyberbullying

400

A responsible way to use other people's work is to:

what is give credit to the creator.

400

The person being harassed or upset by the bully is often called a _____________

what is a Target

400

_________ is someone who sees cyberbullying happening, but does nothing to help.

who is a bystander

400

The Bank of Hawaii slogan is ________ ________ __________

What is live your happy 

500

________________refers to a network security vulnerability in which malicious scripts are injected into websites.

What is cross-site scripting

500

A(n) ________ helps to de-escalate, or lessen the impact of online cruelity by supporting and standing up for the person who is bullied. *

who is an upstander

500

The crime that involves copying someone else's creative work and claiming it's your own work is known as ____________

What is plagiarism

500

A ______'s mean-spirited comments can spread widely through instant messaging (IM), phone texting, and by posts on social networking sites.

who is a bully

500

Bank of Hawaii is own by _____________ percentage of mutual fund holders.

what is 47