Grand Theft Data
You've Got The Power
Hackers Gonna Hack
Let's Get Social
It's Risky Business
100

Utilizing a second device to confirm your identity.

What is multifactor authentication?

100

Replacing a product with a newer version of the same product.

What is Upgrading?

100

An attack used by hackers to repeatedly guess different passwords to get access to your accounts

What is a brute force attack?

100
This tactic relies on human interaction and often involves tricking people into breaking security protocols to obtain access to, or compromise information and systems.
What is social engineering?
100
An approved online cloud storage service being used by our employees.
What is Microsoft OneDrive?
200
The process of scrambling messages or information in such a way that only authorized parties can read it.
What is encryption?
200

Using a favorite song lyric, or using a quote from your favorite movie, TV show, or Book instead of a password.

What is a passphrase?

200
Type of software specifically designed to gain access or damage a computer without the knowledge of the owner.
What is malware?
200
An attempt to acquire credentials for malicious reasons, by masquerading as a trustworthy entity in an email.
What is phishing?
200
A cyber attack targeting an individual or entity for the purpose of maliciously controlling or disrupting a computing environment to destroy or steal data.
What is a cyber breach?
300

A newer office process that enables the IT support staff to grant additional access permissions once it is approved by a manager.

What is a security request?

300

A connection that can encrypt and protect data on a open, public or private network.

What is a VPN?

300

*** DOUBLE JEOPARDY*** A technique used to attack data-driven applications in which nefarious SQL statements are inserted into an entry field for execution

What is a SQL injection?

300

* * * DOUBLE JEOPARDY!!! * * * Linked In or Facebook are channels that are often used for this targeted attack on specific individuals, or organizations which seeks unauthorized access to confidential data.

What is spear phishing?

300
If you are leaving your computer unattended you must Ctrl-Alt-Delete + Enter to lock your screen, but this is another, shorter key sequence to do the same thing.
What is Windows button + L key sequence?
400

This self-proclaimed whistleblower was able to steal copious amounts of data while being employed by the National Security Agency (NSA) of the USA.

Who is Edward Snowden?

400

This is who you should call to report suspicious activity, such as a malicious email or phone call.

Whos is the IT Help Desk?

400
A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless money is paid.
What is ransomware?
400
A technique used to retrieve information from a garbage bin and/or trash can, that could be used to carry out an attack against an organization.
What is dumpster diving?
400
Performing this action after opening an email from an unknown source could compromise your computer.
What is clicking on a link / opening an attachment?