CIA Triad
Cybersecurity
History of the Internet
Impact of the Internet
More Cybersecurity
100

What does the CIA Trida stand for?

DAILY TRIPLE

Confidentiality

Integrity

Availability

100

What is considered private information? Name three.

Birthday, Address, Birthdate, Full Name, Social Security Number, Credit Card Number, School You Attend, etc.

100

The Internet is wireless...

False

100

What is cybersecurity?

Protecting electronic networks and devices

100

When people look through garbage in order to find personal information...


DAILY TRIPLE

Dumpster Diving

200

Luke logs into Infinite Campus and sees not only his grade but everyone else's. What part of the CIA Triad was compromised?

Confidentiality

200

Devices can be tracked through the Internet by its...

IP Address

200

How fast could light travel around the world in one second?

6 1/2 or 7 times

200
What percentage of the world uses the Internet?


DAILY DOUBLE

About 60% (60.1)

200

What does VPN stand for?

DAILY DOUBLE

Virtual Private Network

300

Faith logs into Infinite Campus and she is able to change other people's grades.  What part of the CIA Triad was compromised?

Integrity

300

If the product is free then...


DAILY DOUBLE

You are the producT

300

What is the big concern if the Internet was wireless only?


DAILY DOUBLE

Latency

300

What does IoT stand for?

Internet of Things

300

Unscramble this binary code: 1011  0011

DAILY DOUBLE

179

400

CJ tries to log into Infinite Campus but the site won't display for some reason.  What part of the CIA Triad was compromised?

Availability

400

Bill is working on his computer on a Delta flight, but Larry sitting in the seat near Bill sees his information. This is known as...

Shoulder Surfing

400

Name three PROS and three CONS of the Internet

Answer Vary

400

How fast does light travel per second?

186,282 miles per second

400

Extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.  Like your own private tunnel that allows you to use public wifi.

VPN

500

A model that represents the three pillars of information security

The CIA Triad

500

This is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.

Ransomware 

500

An electronic communications network that connects computer networks and organizational computer facilities around the world.

The Internet

500

Cables that carry electrical signals...

Fiber Optic Cables

500

A method of protecting data by scrambling it into a secret code that can only be unlocked with a unique digital key.

Encryption