Someone who uses the Internet to illegally break into computers.
What is Hackers?
An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.
What is phishing?
Type of software specifically designed to gain access or damage a computer without the knowledge of the owner.
What is malware?
The process of scrambling messages or information in such a way that only authorized parties can read it.
What is encryption?
Performing this action after opening an email from an unknown source could compromise your computer.
The use of authentic-looking emails, often purporting to be from a bank or government agency, to trick you into responding with sensitive personal data.
What is Phishing?
Attack that use a false promise to pique a victim’s greed or curiosity. They lure users into a trap that steals their personal information or inflicts their systems with malware.
What is Baiting?
The most common type of malware that can execute itself and spread by infecting other programs or files.
What is a virus?
The purpose of this policy is to outline the generally acceptable usesof computer equipment, information systems, media/devices, and otherinformation assets,and to delineate the prohibited uses of those items.
What is Acceptable Use Policy
Named for the SMS (short message service) technology used to send text messages, it means phishing attempts made on cellphones.
What is Smishing?
This tactic relies on human interaction and often involves tricking people into breaking security protocols to obtain access to, or compromise information and systems.
What is social engineering?
Designed to appear as a legitimate software program to gain access to a system. Once activated following installation, they can execute their malicious functions.
What is a Trojan Horse?
**** list password requirements
What is a strong Password?
An approved online cloud storage service being used by our employees.
What is Microsoft OneDrive?
Short for "voice phishing," it's the use of recorded messages to telephones — usually claiming to be from a bank — with the goal of tricking you into revealing personal or account information for identity theft.
What is Vishing?
A technique used to retrieve information from a garbage bin and/or trash can, that could be used to carry out an attack against an organization.
What is dumpster diving?
A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.
What is ransomware?
An average of $4.35 million.
What is the cost of a data breach in 2022?
A cyber attack targeting an individual or entity for the purpose of maliciously controlling or disrupting a computing environment to destroy or steal data.
A usually covert program that tracks (or logs) sequential strokes on your keyboard to allow remote hackers to capture your passwords and online banking and credit card information.
What is Keystroke logger?
LinkedIn or Facebook are channels that are often used for this targeted attack on specific individuals, or organizations which seeks unauthorized access to confidential data.
What is spear phishing?
Tracks a user's browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase.
What is Adware?
This self-proclaimed whistleblower was able to steal copious amounts of data while being employed by the National Security Agency (NSA) of the USA.
If you are leaving your computer unattended you must Ctrl-Alt-Delete + Enter to lock your screen, but this is another, shorter key sequence to do the same thing.
What is Windows button + L key sequence?