Be Sociable
Phishing
Cyber Breach
Malware
Cyber Facts
100
Facebook and LinkedIn are two examples of these that are used by employees to connect with other ACIers
What are social networking websites?
100
Received from a Nigerian prince via email asking you to give him bank account information so he can share the million dollars he has in an account that he must transfer somewhere to retrieve
What is an email scam?
100
Something you should do on a regular basis to ensure you can restore your computer to a previous state if something goes wrong
What is backup your computer/data?
100
This is a computer program that spreads or self-replicates and requires user interaction to activate
What is a virus?
100
If using a windows-based PC, you do this to quickly lock your computer before stepping away
What is press the Windows key and the letter L? (Ctrl+Alt+Del and select "Lock this Computer" also would be correct.)
200
Claiming or appearing as another person
What is impersonation?
200
Bad grammar, all words beginning with an upper-case letter, a link to click so that you can update your information, or a request for personal information are all examples of these
What are things you should look for that may indicate it is a scam?
200
This image in your web browser URL box indicates you are on a secure website or information sent to this website is private
What is the lock icon?
200
It is contained in a valid program and usually offers the promise of something you might be interested in, such as a screensaver or photo, but is designed to give hackers access to your computer or files
What is a Trojan Horse?
200
Contact the Global Service Desk and your manager, and power off your computer are steps you should take if this occurs
What is a computer malware infection?
300
Social networking scams, vulnerability exploits, mobile malware, malicious spam runs, and targeted attacks are all examples of these
What are online threats?
300
A claim that there is a "problem" with your account, notice that you have been "suspected violations of the USA Patriot Act," request to "verify your identity," request from an IT department that you provide passwords or other information, or a request to fax information to a number are all examples of this
What are things you might see in a phishing scam?
300
Carried with you and not properly password protected can result in a security breach
What are mobile devices, such as laptops, cell phones, and USB/flash drives?
300
Either exploit a vulnerability on the target system or use some kind of social engineering to trick users into executing them
What is a worm?
300
Eight to fifteen characters, upper- and lower-case letters, numbers as well as alphabetical characters, easy to remember but hard to guess, never shared with anyone, and never written down or left near your computer
What are guidelines to follow to make sure your passwords are secure?
400
Sexual solicitations, U R Cute messages, secret details about Michael Jackson's death, Test your IQ quiz, and "Join ACI is Awesome Facebook group" are all social networking examples of these things that you should avoid
What are scams?
400
When you receive an email with a link in it, you are advised to open a separate browser and type (or retrieve from favorites) the URL you already know for the website instead of clicking on the link in the mail
What is one way to verify a scam link?
400
A USB/Flash drive with sensitive data on it left in a public computer or public space is an example of this
What is a potential security breach?
400
Defined as programs that track where you go on the Internet and what you type into your keyboard
What is spyware?
400
Watching (either in person or using a recording device) what you do on your computer by looking at a reflection of or the actual screen of your computer or mobile device
What is shoulder surfing?
500
An approach to gain access to information through misrepresentation--the conscious manipulation of people to obtain information without having them realize that a security breach may be occurring--that may take the form of impersonation via telephone, in person, or email
What is social engineering?
500
What is a useful website about phishing scams?
500
This is an example of information provided by the United States Computer Readiness Team regarding cyber security breaches around the country, and which is available at http://www.us-cert.gov/
What is a Cyber Security Bulletin or announcement?
500
Erratic computer behavior, lack of response to keyboard or mouse commands, crashing or restarting on its own, or running slower than usual are potential symptoms of this
What is a malware infection?
500
Employees can do this at no charge from their personal computer to scan for viruses
What is perform a virus scan from Windows Defender?