Type of social engineering where an attacker sends a fraudulent message to trick an individual into revealing sensitive information.
What is phishing?
When you receive a suspicious email, what should you do?
What is report it?
The SETA recommended method for reporting suspicious emails.
What is the Outlook Report Phishing button
The ride sharing company that recently had a cyber-attack?
What is Uber?
What is a fact?
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
What is social engineering?
The VPN stands for this.
What is virtual private network?
FRTIB annual requirement for all employees and contractors.
What is Cybersecurity Awareness Training (CSAT)?
Major gas pipeline that suffered a ransomware attack in 2021?
What is Colonial Pipeline?
Facts and statistics collected for reference or analysis.
What is data?
Type of malware that threatens to publish the victim's personal data or permanently block access to it unless a sum of money is paid.
What is ransomware?
The percentage of users at FRTIB with some level of cybersecurity related to their jobs.
What is 100%?
Email address to use when asking questions regarding SETA related training.
What is Awareness@frtib.gov?
This popular retail corporation suffered a data breach in 2013 which began with a compromised HVAC vendor and impacted millions of customers during the holiday season.
What is Target?
The possibility or chance of loss, adverse effect(s), danger, or injury.
What is risk?
Leads the national effort to understand, manage and reduce risk to our cyber and physical infrastructure.
What is the Cybersecurity and Infrastructure Security Agency (CISA)?
Your site URL should begin with what, in order to ensure the site you are on is secure.
What is Https?
The names of the SETA mascots
What are SecuriBee and SecurEd?
This cyber-attack triggered a large supply chain incident in 2020 that affected thousands of organizations including the U.S. government.
What is the SolarWinds hack?
A network of power plants, transmission lines and substations.
What is grid?
The science of encrypting and decrypting information.
What is cryptography?
A policy where no one is trusted by default from inside or outside of the network. Verification is required from everyone gaining access to the environment.
What is zero trust policy?
This training is required for all users identified as having significant security responsibility and have a NICE role assigned.
What is Role-Based Training (RBT)?
Thought to be the first cyber-attack on an entire country that brought 58 websites offline including websites of governments, banks and media outlets.
What is the 2007 Estonia cyber-attack?
The use of a computer to gain unauthorized access to data in a system.
What is hack?