The Cyber Scene
The Bad Guys
Mixed Bag
Security Scramble
Fact or Fiction?
100
Attempts to acquire personal information such as usernames, passwords, bank account or credit card information via email.
What is phishing?
100
This two-word term refers to an armed person who is using deadly physical force on other persons while continuing to seek out additional victims and may be targeting specific individuals.
What is Active Shooter?
100
It's TVA's cyber security motto.
What is Learn. Act. Protect.?
100
otitsrrer aactkt
What is Terrorist Attack?
100
TVAS&EM offers security escorts 24 hours a day, 7 days a week upon request.
What is FACT?
200
A program or file specifically developed for the purpose of doing harm.
What is Malware?
200
This person commits violent acts that are politically, ideologically or religiously motivated; target noncombatants; and are intended to create fear, bring about social or political change and/or disrupt the operation of a government.
What is Terrorist?
200
It's the length of time that a TVA door can be held open before an alarm sounds in the Monitoring & Notification Center.
What is thirty seconds?
200
ecybr tyeurics
What is Cyber Security?
200
There are four different organizational units within TVAS&EM.
What is FICTION?
300
To be effective, these should contain at least one number and should not match a natural language word.
What are Passwords?
300
This term refers to someone who seeks out and exploits weaknesses in computer systems.
What is Hacker?
300
According to the Occupational Safety and Health Organization (OSHA), it is the number of Americans who report being the victim of workplace violence every year.
What is Two Million?
300
vrybiunleaitl
What is Vulnerability?
300
If each TVA employee lost one identification badge this year, the replacement costs would exceed $720,000.
What is FACT?
400
This type of program hides malicious or harmful code inside a program that appears to be harmless.
What is A Trojan Horse.
400
This person commits financial fraud by misappropriating assets that have been entrusted to his/her care by the actual owners of the assets.
What is Embezzler?
400
They are commonly considered to be the weakest components in any security system.
What are People?
400
scesac ntcrloo
What is Access Control?
400
Contractors do not need to be checked in WCSS if they have worked at other TVA sites in the past.
What is FICTION?