Own IT
Secure IT
Protect IT
Make IT Private
Don't Fall for IT
100

The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data or Smart devices or objects connected to the Internet 

What are Internet of Things?

100

Is a string of characters used to verify the identity of a user during the authentication process.

What is password.

100

Is a type of network wherein anyone, namely the general public, has access and through it can connect to other networks or the Internet.

What is public network? 

Note: Never connect to a public network

100

Is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder

What is Shoulder Surfing

100

The process or action of verifying the identity of a user or process

What authentication?

200

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

What is phishing?

200

From an IT access perspective.  What is example of something that you have?

What is Multi-Factor Authentication

200

Is a programming that creates a safe, encrypted connection over a less secure network, such as the public internet.

 What is VPN or Virtual Private Network?

Note: Use VPN when connecting remotely

200

This network should be avoid using this to make online purchases or access bank accounts

What is public Wi-Fi?

200

Principle that seeks to prevent the unauthorized disclosure of information?

What is confidentiality?

300

It is a software update comprised code inserted into the code of an executable program to update, fix, or improve it.

What is a software patch?

300

From an IT access perspective. What is an example of something you are?

What is Biometrics facial recognition, finger print recognition, and voice recognition are examples

300

Stealing personal data in order to impersonate a person

What is Identity Theft

300

Protects your information if devices is lost or stolen

What is passcode/password/touch ID feature/device wipe out?

300

Prevents the unauthorized modification of information

What is integrity?

400

Data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another

What is personally identifiable information (PII)?

Note: Share limited PII

400

What do you call an authentication scheme that’s a combination between what you are, what you know, and what you have?

What is multi-factor authentication

400

These are the people responsible for the security of information within an organization

What is everyone?

400

Is a statement or a legal document that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. It fulfils a legal requirement to protect a customer or client's privacy.

What is Privacy Policy?

400

Ensures that information is available when needed

What is availability?

500

An activity that safeguards your information from loss if your device is compromised; an extra copy of data from a computer.

What is data back up?

500

From an IT access perspective which system is more secure?

A) a smart card and a pin number to login or 

B) facial recognition to login?

what is A because it requires multi-factor authentication while b is only one form of authentication. Multi-factor authentication is always more secure than single factor authentication.

500

The original idea for implementing this command was to reset or restart the computer without turning it off, which is known as a soft reboot.

What is CTRL + ALT + DEL?

500

The unauthorized release of sensitive/PII data

What is a data breach?

500

Applying multiple safeguards to protect an asset

What is Defense-in-Depth