The Cyber Scene
The Bad Guys
Physical Security
Security Scramble
Name That Acronym
100

Attempts to acquire personal information such as usernames, passwords, bank account or credit card information via email.

What is Phishing?

100

When a person seeks unauthorized access to a secure area by closely following behind an authorized person.

What is Tailgating?

100

You should do this to quickly lock your computer before stepping away.

What is press the Windows key and the letter L? (Ctrl+Alt+Del and select "Lock this Computer" would also be correct.)

100

irdeins tretha

What is Insider Threat?

100

VPN

What is Virtual Private Network?

200

A program or file specifically developed for the purpose of doing harm.

What is Malware?

200

Going through trash to look for sensitive documents.

What is Dumpster Diving?

200

This security approach involves “double-checking” your identity with two or more verification factors.

What is Multi Factor Authentication (MFA)?

200

ecybr tyeurics

What is Cyber Security?

200

MFA

What is Multi Factor Authentication?

300

This type of malicious software is designed to block access to a computer system or data until a sum of money is paid.

What is Ransomware?

300

A security risks originating from within an organization, typically from individuals with authorized access, such as employees or contractors, who misuse their privileges or access to harm the organization.

What is an Insider Threat?

300

Must be at least fourteen characters, upper- and lower-case letters, numbers as well as special characters, easy to remember but hard to guess, never shared with anyone, never written down or left near your computer, and changed at least every 180 days.

What are Passwords/Passphrases?

300

iacols geenerni

What is Social Engineering?

300

AUP

What is Acceptable Use Policy?

400

A security device that monitors and controls incoming and outgoing network traffic.

What is a Firewall?

400

Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device.

What is Shoulder Surfing?

400

This two-word term refers to an armed person who is using deadly physical force on other persons while continuing to seek out additional victims and may be targeting specific individuals.

What is a Hostile Intruder?

400

scesac ntcrloo

What is Access Control?

400

PII

What is Personally Identifiable Information?

500

This information includes financial transactions, medical, criminal and employment history, name, social security number, date and place of birth, mother's maiden name, biometric records, and any other personal information which is linked or linkable to an individual including credit/debit card information.

What is Personally Identifiable Information (PII)?

500

This non-technical intrusion technique relies heavily on human interaction in order to trick people into violating their own security procedures.

What is Social Engineering?

500

All persons who have these are responsible for the proper use and safekeeping and will wear them at all times while in secured spaces or other KDOR facilities.

What are Key Cards? (Badges would also be correct.)

500

retiycsu eanswsrae

What is Security Awareness?

500

USB

What is Universal Serial Bus?