Cyber Security
Physical Security
Mobile Device Security
Security Policies & Practices
Cyber Movies
100

A security device that monitors and controls incoming and outgoing network traffic.

What is a firewall?

100

This is a common security breach that gives passive unauthorized access to controlled areas or company property.

What is "tailgating?"

100

The process of converting data on a mobile device into an unreadable format to protect it from unauthorized access.

What is mobile device encryption?

100

What is the weakest link in cybersecurity?

What is: People inside the organization?

100

Matthew Broderick plays a high-school aged computer whiz who accidentally accesses a military computer programmed to simulate... well, precisely what the title suggest.  

What is WarGames (1983)?

200

Malicious software that disguises itself as a legitimate program.

What is a Trojan Horse

200

A security measure that restricts entry to authorized individuals.

What is Access Control?

200

A security measure that requires users to provide two different forms of identification to access a mobile device or app.

What is two-factor authentication?

200

The protection of personal information and ensuring that it is collected, used and stored securely and in accordance with applicable laws and regulations.

What is Data Privacy?

200

Sandra Bullock stars as a systems analyst who works remotely in California and becomes embroiled in a deadly conspiracy after receiving a mysterious floppy disk that backdoors in to a well-known computer security system.

What is The Net (1995)?

300

A cyber attack where attackers impersonate a trustworthy entity to trick individuals into revealing sensitive information.

What is Phishing?

300

The term for trained personnel responsible for monitoring and protecting a facility or property.

What are security guards?

300

The process of creating a copy of data on a mobile device to protect against data loss or device failure.  

What is mobile device backup?

300

A combination of uppercase and lowercase letters, numbers, and special characters at least 16 characters long. 

What is a strong password?

300

This film depicts a dystopian future in which humanity is unknowingly trapped inside a simulated reality that intelligent machines have created to distract humans while using their bodies as an energy source.

What is The Matrix (1999)?

400

The term for the practice of regularly updating software and systems to protect against unknown vulnerabilities.

What is patching?

400

A security method that uses unique physical or behavioral characteristics for identification.

What is Biometric Authentication?

400

Technology that creates a secure connection between a mobile device and a private network, protecting data transmission.  

What is a mobile device VPN?

400

What is the most common type of cyberattack that targets employees?

Phishing is the most common type of cyberattack targeting  employees, where attackers send fraudulent emails to trick recipients into revealing sensitive   information or clicking on malicious links.

400

A young Angelina Jolie as "Acid Burn" stars in this energetic romp thriller pitting a band of school-aged hackers against a corporate extortionist seeking a big payday.

What is Hackers (1995)?

500

The collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as the devices themselves.

What is IoT, or Internet of Things?

500

Physical barriers or measures designed to prevent unauthorized access to a facility.

What is a Perimeter Security?

500

The term for the practice of managing and securing mobile mobile devices within an organization. 

What is Mobile Device Management (MDM)?

500

Information that can be directly or indirectly linked to an individual’s identity (e.g. Financial, Identity, Relationships, etc.) are especially sensitive because if it is disclosed or compromised without authorization, presents an increased security risk to the individual.

What is Personally Identifiable Information (PII)?

500

This film is a fictionalized account of the founding and fallout of WikiLeaks and showcases how information security (or lack thereof) can be easily manipulated for personal or political gain. 

What is The Fifth Estate (2013)?