Be Social
Threats
Cyber Breach
The Enemy
Getting Protected
100

Facebook and Twitter are two examples of these that are used by UCO to connect with student

What are social networking sites?

100

I spread harm by attaching myself to a program, file, or disk


What is Virus?

100

The Hacker's mindset that combines deliberate and intuitive thinking and relies on intensive experimentation.

What is exploration mindset?

100

They are people who traditionally tried to gain access to computers remotely to learn more and for intellectual curiosity. Currently, they only make up 17% of computer intrusions.

Who are hackers?

100

I can detect malware and destroy it before any damage is done

What is Anti-Virus software? (or Anti malware)

200

It is the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.

What is Social Networking?

200

I'm an independent program that can replicate myself.

What is Worm?

200

I'm the first of the four steps in the hacking process

What is "identifying vulnerabilities"?

200

Is the risk presented to an organization by current or past employees who have knowledge of how the organization works and what and where the most valuable (damaging) information might reside.

What is Insider threat?

200

I can filter packets that enter or leave your computer

What is FireWall?

300

Social networking scams, vulnerability exploits, mobile malware, malicious spam runs, and targeted attacks are all examples of these.


What are looming trends in online threats? (Provided by www.gmanews.tv)?


300

Look like a genuine email from your banking and ask for your online banking username, password, and SSN.

What is Phishing?

300

In the hacker world this term refers to exploiting security vulnerabilities.

What is "Owning the system"?

300

These are well run groups of crooks who methodically look for computer vulnerabilities to steal large numbers of financial or credit card accounts for financial profit.

Who are organized crime groups?

300

You should have it long and combining upper cases, lower cases, numbers and symbols.

What is a (strong) password?

400

Sexual solicitations, U R Cute messages, secret details about Michael Jackson's death, Test your IQ quiz, and "You won a lottery" message are all social networking examples of these things that you should avoid.


What are scams?


400

The use of personality, knowledge of human nature and social skills to steal passwords, keys tokens or other credentials to gain access to systems.

What is Social Engineering?

400



Flash drive with classified data on it left in a public computer is an example of this.





What is a potential cyber security breach?


400

They are structured groups funded by other governments and dedicated to mapping out the internet addresses for the purpose of espionage and possible computer attacks.

What is state sponsored hacking?

400

In connecting to a secure site, I need to look for this one in front of the URL address.

What is https?

500

An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email.



What is social engineering?


500

I am a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack.

What is Botnet? (or zombies)

500


This is an example of information provided by the United States Computer Readiness Team regarding cyber security breaches around the country, and which is available at http://www.us-cert.gov/.




What is a Cyber Security Bulletin or announcement?


500

The weakest link in every computer system that could cause harm through thoughtlessness, unawareness or accident.

What is human/people/person?

500

A document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.

What is Acceptable Use Policy?