User Friendly
Case Logic
Bytes of Wisdom
The Antisocial Network
Something in the Air
100
The single most effective strategy, performed regularly, ensures data is not irrevocably lost.
What is a backup?
100
This is a collection of computers automatically working together towards some goal.
What is a botnet?
100
This protective software maintains a library of common threats and constantly monitors your computer.
What is antivirus software?
100
This hardware/software guards the computer by maintaining traffic inside the network and keeping malicious traffic out.
What is a firewall?
100
This is a wireless encryption protocol that can be cracked by amateur hackers in a matter of minutes.
What is WEP?
200
The following are guidelines for: - Viewing the internet as a novel, not a diary - Being careful what you advertise - Realizing that you can not take it back
What is publishing information on the internet?
200
More than the traditional form of warfare, this includes espionage and attacks on the Internet & Web.
What is Cyber warfare
200
This is a type of identification attached to Internet transaction data that verifies the data sender.
What is a digital certificate?
200
This unsolicited mail may contain viruses or other detrimental malware.
What is spam?
200
When using a public hotspot to conduct sensitive transactions, this technology secures everything between your computer and the target network.
What is a VPN?
300
This is a direct observation technique of compromising data integrity by simply watching someone else input sensitive data.
What is shoulder surfing?
300
The goal of this association is to promote management practices that will ensure the confiendtiality, integrity, and availability into resources.
What is the Information Systems Security Association
300
In order to protect integrity, confidentiality, and availability, this institution protects information systems from unauthorized access, use, disclosure, disruption, modification, and destruction.
What is U.S. Department of Homeland Security?
300
This trap detects, deflects, and sometimes counterattacks unauthorized attempts to invade a legitimate network.
What is a honeypot?
300
This wireless encryption standard is currently the most secure available.
What is WPA2?
400
This pre-emptive process prevents thieves from being able to see any data stored on your computer.
What is encryption?
400
Although it can be erased with access to the DVD drive or the computer's internals, this mechanism prevents attackers from booting your computer into Windows.
What is a BIOS password?
400
Contrary to popular belief, files moved to this location on the computer can be retrieved at any time by technicians or investigators.
What is the Recycle Bin?
400
This is the process of capturing data transmitted across a network, encrypted or not.
What is packet sniffing?
400
Hiding this information about your wireless network may make it more inconvenient for you to connect new devices, but also makes it harder for attackers to know it exists in the first place.
What is SSID?
500
In Windows, this key combination will lock your workstation so nobody can access it while you are away from your desk.
What is Windows+L?
500
This pocket-sized device inconspicuously tracks the keystrokes of a computer.
What is a keylogger?
500
Usually malicious, this software cannot be detected by use of conventional scanning methods.
What is a rootkit?
500
When your computer is virus-free but typing in a URL takes you to a site other than the one you intended, you or your ISP are likely victims of this.
What is DNS cache poisoning?
500
A wireless standard for device-to-device communication that is poorly implemented and whose security varies based on the vendor supplying the product.
What is Bluetooth?