Bad Guys
Configurations
Safe Practices
Risk
Users
100

You begin to witness random ads popping up; your computer starts running slowly; or you are unable to connect to desired locations.

What is being HACKED?

100

The Lab is constantly scanning for vulnerabilities to correct them as soon as possible. Do this when you receive notifications about vulnerabilities.

What is APPLY PATCHES?
               APPLY UPDATES?

100

This behaviour will help to safeguard you and your computer from links in random emails.

What is BE SUSPICIOUS?
               REFRAIN FROM CLICKING?
               REPORT SUSPICIOUS EMAIL?

100

The list of authorized software that is available for through the planned purchase process.

What is APPROVED SOFTWARE?

100

Consider this type of information before sending a file to be printed.

What is SENSITIVE INFORMATION?

200

The best practice to avoid the risk of hackers using email to entice users to click a link or respond to them?

What is FOLLOW PROCESSES?
               REPEATABLE PROCESSES?
               BUSINESS PROCESSES?

200

Failure to include these can make attacks easier for hackers and make investigation harder for Lab personnel.

What are SECURITY CONTROLS?

200

While cruising through your emails you get a popup message that states: your computer has been exposed to ransomware. What is the best option to ensure your computer is secured?

What is DISCONNECT from the network.

200

This required action helps ensure to ensure security of information stored on a device and that it is placed in the right security zone.

What is REGISTERING A DEVICE?
               DEVICE MANAGER?

200

This allows for more secure printing by requiring you to tap your badge on a reader before printing.

What is PUBPRINTING (Print Using Badge)?

300

Hackers routinely plant this with the intent to cause havoc.

What is MALWARE?

300

This activity scans for default passwords, vulnerabilities, and misconfigurations on production systems in order to expose those problems before hackers find them.

What is PENETRATION TESTING?

300

You think you are being targeted by an attacker via email or supicious links. What should you do?

What is CONTACT SUPERVISOR?
               CONTACT CYBERSECURITY?
               CONTACT MY DCSO?
               REPORT PHISHING BUTTON?

300

Using this type of software creates a risk to the Lab because it has not been vetted by the Lab to ensure its safety.

What is FREE SOFTWARE?

300

What is the recommended practice for managing multiple passwords?

What is PASSWORD MANAGER?

400

Hackers want to do this to websites in order to steer you to other bad sites for their malicious purposes.

What is HIJACKING?

400

When creating passwords at the Lab use this tool as your guidance on length, complexity and uniqueness.

What is SBMS?

400

A good practice to ensure vulnerabilities or misconfigurations are found and addressed before being exploited.

What is SCAN THE WEBSITE?

400

What makes computer investigations harder and can indicate that you have done bad things on the computer?

What is SHARING CREDENTIALS?

400

When using tools on an external website, what should you do to ensure your online safety?

What is UNIQUE USERNAME?
               UNIQUE PASSWORD?
               UNIQUE CREDENTIALS?

500

These are good for initial setup of devices but should be changed before launching a system in production.

What are DEFAULT PASSWORDS?

500

This helps you find the tools needed for quick reports or other application needs.

What is the SOFTWARE STORE?

500

System Administrators use these to record actions by users on their server.

What are LOGGING MECHANISMS?

500

A cybersecurity risk that originates from within an organization.

What is an INSIDER THREAT?

500

This is used with public facing tools to ensure that they are controlled to prevent unwanted cyber events.

What are CREDENTIALS?