A.C.R.O.N.Y.M.S.
Name the Attack
Who's Who?
What's What?
(General Security Concepts)
Definitions
100

PII

What is Personally Identifying Information?

100

A type of malware meant to encrypt a victim’s data and prevent account access, until the victim pays a fee set by the attacker.

What is a ransomware attack?

100

One member of the Fu Associates, Ltd. cybersecurity team.

Who is David Sieracki/Nima Patel/Tommy Lo/HT Gold?

100

The likelihood that a threat will exploit a vulnerability.

What is risk?

100

The potential to cause unauthorized disclosure, changes, or destruction to an asset.

What is a threat?

200

PIV

What is Personal Identity Verification?

200

A social engineering scam whereby intruders seek access to your personal information or passwords by posing as a legitimate business or organization with legitimate reason to request information.

What is a phishing attack?

200

Fu Associates, Ltd. Privacy Officer.

Who is Debbie Harvey?

200
The first line of defense for Fu Associates, Ltd. information security.

Who are we?

200

Any flaw or weakness that can be exploited and could result in a breach or a violation of a system’s security policy.

What is a vulnerability?

300

HIPAA

What is Health Insurance Portability and Accountability Act?

300

A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

What is a denial of service attack?

300

Fu Associates, Ltd. Information Technology Director.

Who is Dave Sieracki?

300

The three guiding principles of information security.

What are confidentiality, integrity, and availability?

300

A sequence of words or other text used to control access to a computer system, program or data (similar to a password in usage, but is generally longer for added security).

What is a passphrase?

Example: “Take me out to the ballgame!” becomes “Tmo2tBG!”


400

FISMA

What is the Federal Information Security Management Act?

400

When an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

What is cross-site scripting?

400

Fu Associates, Ltd. Technical Team Leader.

Who is Pam Kress?

400

An example of physical access control.

What are keys, security fobs, sign-in sheets, etc?


400

The process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. 

What is encryption?
500

HITECH

What is the Health Information Technology for Economic and Clinical Health Act?

500

A technique used to attack data-driven applications, in which malicious structured query language statements are inserted into an entry field for execution to expose

What is a SQL injection attack?

500

Report suspected or confirmed privacy incidents to these 3 people.

Who are Pam Kress, Debbie Harvey, and Dave Sieracki.

500

Rules for strong passwords.

What are create a password at least eight characters in length, and password should contain at least one of each: capital letter, lowercase letter, number, and special character (!,@,#,$,%,^,&,*,(,),_,+,)?

500

The loss of, unauthorized access to, or disclosure of, personal information.

What is a breach of privacy?