Information
Physical Security
Availability
The Enemy
Internet
100

Random seemingly unrelated facts, numbers, words or statistics.

What is Data?

100
Overlapping layers of protection put in place so that if one layer fails other layers succeed in protecting is known as....
What is Defense in Depth?
100

To apply or maintain permissions to prevent an account from getting information they are not authorized to see while making the information available to those who are authorized.

What is Access Control?

100

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

Who are hackers?

100

A program that is designed only to read Hyper Text Markup Language (HTML) web pages downloaded from Internet websites. They can have helpers or add-on functions incorporated by using interpreters to read the additional instructions and provide different web content types. Internet Explorer, Firefox and Safari are examples of these.

What is a browser? (or web browser)

200
Data compiled into documents, maps, charts, and other forms of information gives assets dollar _____________
What is Value?
200

The list of computers, laptops, software, equipment allowed by an organization's network

What is a Whitelist?

200

An identifier that uniquely tracks actions to individuals.

What is an Account? (or Login ID)

200

A ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency in 2017

What is WannaCry?

200

Easily readable programs that automate or provide extra function on a computer system or in an application or browser. ActiveX and JavaScript are examples of this type of language.

What is Scripting? (or Scripting Code or Scripting Language)

300

Any combination of your name, your home address or phone number, credit card or account numbers or social security number.

What is PII? (or Personally Identifiable Information)

300

The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

What is Social Engineering?

300

Functional managers classify data and grant approval to those whose jobs require access to the information.

Who are Data Managers?

300

Hailing from the US of A, this hacker started at the age of 14, making their mark by hacking into the NSA. From there, they worked with ShadowCrew and targeted companies like TJX, Heartland Payment Systems, and Citibank, before finally being indicted on charges in several cases. Under arrest, they now work with authorities. 

Who is Albert Gonzalez?

300

A type of a program that takes scripting language and reads it so it can be acted on by a browser or an application. These are found in almost all operating systems, web browsers and many commercial off the shelf application programs.

What is an Interpreter?

400
The evidence of daily decisions and operations within DOI and its bureaus/offices.
What are Federal Records?
400

30-50% of all data loss due to the people already within the organization.

What is Insider Threat?

400

As a result of the VA breach in 2006 where PII of over a million veterans was lost, it is now a requirement to delete all sensitive data extracts on individual computers after this number of days.

What is 90 days?

400

Wizard Spider, an eCrime group that has been operating since August 2018, targets organizations for a high value return. The method that they are most know for is specifically used to target enterprise environments that's derived from the Hermes source code is known as...

What is Ryuk Ransomware?

400

This filters and monitors HTTP traffic to prevent attacks like Cross-site forger, XSS, file inclusion and SQL injections. In the OSI model, it's a protocol layer 7 defense

What is Web Application Firewall (WAF)?

500

When a device generates an alert for that has not happened

What is a false positive/negative

500

A necessary process to limit the kinds of hardware and software which minimizes the number of different vulnerabilities and reduces exposure to security weaknesses.

What is Standardization?

500

It is a word or phrase that verifies that you and only you had access to the account.

What is a Password?

500

In 2009, hacker's gained access to several corporate servers and intellectual properties. The company breached said that they believed the goal of this attack was to access the accounts of human rights activist by their government. This attack caused the company to move their servers to Hong-Kong to escape the Government's internet filtering policy, what attack was this?  

What is the Google China cyber attack (2009)?

500

A set of rules or a protocol, for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination 

What Internet Protocol (IP)