Type of social engineering where an attacker sends a fraudulent message to trick an individual into revealing sensitive information.
What is phishing?
When you receive a suspicious email, what should you do?
Report Phish
PPL’s strategy is to provide ___ and ____ energy at the lowest reasonable cost.
What is safe and reliable?
The ride sharing company that recently had a cyber-attack?
What is Uber?
What is a fact?
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
What is social engineering?
The VPN stands for this.
What is virtual private network?
What is drone?
Major gas pipeline that suffered a ransomware attack in 2021?
What is Colonial Pipeline?
Facts and statistics collected for reference or analysis.
What is data?
Type of malware that threatens to publish the victim's personal data or permanently block access to it unless a sum of money is paid.
What is ransomware?
The five Information Classification categories at PPL.
What is Public, Business Use, Confidential, Restricted & BCSI?
A conductor or conductors designed to carry electricity or an electrical signal over large distances with minimum losses and distortion.
What is transmission line?
This country's power grid was attacked by Russia in 2015.
What is Ukraine?
The possibility or chance of loss, adverse effect(s), danger, or injury.
What is risk?
Leads the national effort to understand, manage and reduce risk to our cyber and physical infrastructure.
What is the Cybersecurity and Infrastructure Security Agency (CISA)?
Your site URL should begin with what, in order to ensure the site you are on is secure.
What is Https?
The 4 operating companies owned by PPL Corporation.
What is PPL EU, LG&E KU, RI Energy & Safari Energy?
This cyber-attack triggered a large supply chain incident in 2020 that affected thousands of organizations including the U.S. government.
What is SolarWinds hack?
A network of power plants, transmission lines and substations.
What is grid?
A method used to transform and transmit confidential data in an encoded way to protect the information from unauthorized third parties.
What is cryptography?
A policy where no one is trusted by default from inside or outside of the network. Verification is required from everyone gaining access to the environment.
What is zero trust policy?
The agency that regulates the interstate transmission of electricity, natural gas, and oil.
What is Federal Energy Regulatory Commission (FERC)?
Thought to be the first cyber-attack on an entire country that brought 58 websites offline including websites of governments, banks and media outlets.
What is the 2007 Estonia cyber-attack?
The use of a computer to gain unauthorized access to data in a system.
What is hack?