Passwords 101
Scams and Traps
Safe internet Habits
Digital Dangers
ASI Company Policies
100

This best practice describes using a different password for every account.

What is password diversification, what is not repeating passwords?

100

This scam uses emails pretending to be from reputable companies to trick you into giving away personal information.

What is phishing?

100

This is something you should avoid doing on public Wi-Fi.

What is accessing sensitive information?

100

This is a cyberattack where secure information is shared or stolen by unauthorized parties.

What is a data breach?

100

This is what you should do if you see any links in an email you weren’t expecting.

What is, don’t click them!

200

This is the minimum number of characters you should have in a secure password.

What is, 8 characters?

200

This is a scam where someone pretends to be a from trusted company in a phone call.

What is vishing?

200

This is a program that helps protect your computer from bad software.

What is antivirus?

200

This is a malicious program that presents itself as a legitimate software.

What is a trojan horse?

200

This is what you should do if you see any attached files in an email that you are not expecting.

What is, don’t download them!

300

This kind of password contains numbers, symbols, uppercase and lowercase letters.

What is a complex password?

300

The term for when a scammer pretends to be a reputable company in a text message.

What is smishing?

300

These are programs or files that self-replicate and spread to other computers.

What is a virus?

300

This is when an attacker locks your files and demands payment to unlock them.

What is ransomware?

300

Doing this when you see an email that looks like it is from someone you know is a good way to check if it is legitimate.

What is calling them, what is verifying out-of-band?

400

This is a helpful tool that can generate and  remember passwords so you don't have to.

What is a password manager?

400

This is a type of scam where the attacker pretends to be an employee or a trusted insider to gain access to sensitive data.

What is pretexting, what is impersonation?

400

This is a sign that a website is safe to use.

What is a padlock in the address bar, what is HTTPS?

400

This is when a hacker tries to stop a website from working by overwhelming it.

What is denial of service, what is DOS, what is DDOS?

400

This is what you should do if you receive an email that you suspect to be a phishing attempt.

What is use the Phish Alert Button?

500

This is a way hackers try to get into your account by guessing all possible passwords.

What is brute force?

500

This type of scam is when an attacker uses personalized emails with  to target specific individuals or businesses.

What is spear phishing?

500

This is a way to secure your accounts even if the attacker has your password.

\What is MFA, what is 2FA, what is multifactor?

500

This is an attack in which a malicious actor intercepts communication between two individuals in order to steal data.

What is man in the middle, what is eavesdropping?

500

What should you do if you have concerns about a file, link, or software?

What is contact IT?