Threats to information security come in many forms. This type of threat can usually be found "attached" to an email. The threat does not become known until the item is clicked on by the user. Often he or she is fooled into doing so (lspitzner, 2010).
What is an Attachment?
100
Browser taking you to sites you don't want, anti-virus reporting an infected file, unauthorized accounts, are all signs of this (lspitzner, 2010)
What is hacking?
100
Browsers are often a point of entry for information security risks to any environment. Through this, the browser maintains its ability to fight off viruses and other malicious software (lspitzner, 2010).
What is updating?
200
Should contain one upper case letter, one lowercase, and one special character (at least) (Wilson and Hash, 2010)
What is our password strength?
200
This is the target of hacking attacks.
What is you!
200
These add-ons to a browser increase the chances for a threat to find a vulnerability in our corporate network (lspitzner, 2010).
What are plugins?
300
The act of giving one's password to another individual (not allowed) (Wilson and Hash, 2010)
What is password sharing?
300
Another form of a security threat, these items are found by clicking on blue text often within emails or texts and contain malicious software (lspitzner, 2010).
What are Links?
300
This process needs to be performed when anything is downloaded by you on the corporate computers/laptops (lspitzner, 2010).
What is anti-virus scanning?
400
This occurs when an unknown user and or program asks for your password. They may look like they are from a legitimate source and come in many forms such as email or text message (Wilson and Hash, 2010)