What's in a Name?
What Would You Do?
Ipso Facto
Breach This!
100

This is the name of someone that breaks into computers, and applications

Hacker

100

You receive an email from some one you don’t know and it looks suspicious

Report the email as Phishing

100

This is a security gap or flaw that can be exploited

Vulnerability

100

This is is commonly used to secure remote and mobile communication.

Hint: 3 words or initials, the first begins with "V"

Virtual Private Network or VPN

200

This is the name for a coworker that discloses confidential information

Insider

200

You see someone you don't  know inside City Hall after business hours without a Union City Badge

Ask if they have a badge

Report them

200

Approximate percentage of data breaches that could be easily prevented through simple training:

a) 10%

b) 40%

C) 80%

80%

200

This common security product is used to block unwanted and malicious network traffic

Firewall

400

This is the name of the location where cyber criminals can buy, sell, and share illegal or stolen data with little fear

Dark Web

400

You're hosting a Zoom meeting an see an unfamiliar name requesting to join

Ask who they are or Deny access

400

You're hosting a Zoom meeting an see an unfamiliar name requesting to join

Ask who they are

Deny access

400

This technology renders data unreadable unless a key is used to make it readable

Encryption

1000

Name of hacker group that uses this is this image of an infamous person:

 

Anonymous

1000

Most common password used globally?

a) 123456

b) qwerty

c) abcdef

123456

1000

This is the modern approach to comprehensive Cybersecurity Protection

Options:

a) Defense In Depth

B) Global Security

C) Dynamic Protection

Defense In Depth

Or

Layered Security