Security Awareness Quiz Questions



Similar documents
The Internet and 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

Network Security Policy

A Guide to Information Technology Security in Trinity College Dublin

National Cyber Security Month 2015: Daily Security Awareness Tips

Identity Theft Prevention Program Compliance Model

Annual Compliance Training. HITECH/HIPAA Refresher

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

Information Technology Security Policies

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

HIPAA 101: Privacy and Security Basics

Information Security

Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants.

Information Security Code of Conduct

Topics. What are privacy and security all about? How can I protect confidential information? What should I do if I see a problem?

BSHSI Security Awareness Training

Acceptable Use of ICT Policy For Staff

ENISA s ten security awareness good practices July 09

Human Resources Policy and Procedure Manual

Desktop and Laptop Security Policy

NC DPH: Computer Security Basic Awareness Training

ICT POLICY AND PROCEDURE

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

General Security Best Practices

General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information

Annual HIPAA Security & Information Security Competency

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

CYBERSECURITY POLICY

How To Protect The Time System From Being Hacked

The Bishop s Stortford High School Internet Use and Data Security Policy

Computer Security at Columbia College. Barak Zahavy April 2010

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Online Banking Customer Awareness and Education Program

Fraud Protection module

HIPAA SECURITY RULES FOR IT: WHAT ARE THEY?

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Acceptable Use of Information Systems Standard. Guidance for all staff

PHI- Protected Health Information

HFS DATA SECURITY TRAINING

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Citi Identity Theft Solutions

Fraud Prevention Guide

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

CITY OF BOULDER *** POLICIES AND PROCEDURES

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

Protecting Yourself from Identity Theft

Standard: Information Security Incident Management

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE

NATIONAL CYBER SECURITY AWARENESS MONTH

Cyber Security Awareness

Information Security. Annual Education Information Security Mission Health System, Inc.

Guide to credit card security

Identity Theft Protection

Protecting Yourself from Identity Theft

2. _General Help and Technical Support

Security Awareness. A Supplier Guide/Employee Training Pack. May 2011 (updated November 2011)

suntrust.com 800.SUNTRUST

Customer Awareness for Security and Fraud Prevention

Data Management Policies. Sage ERP Online

Information to Protect Our Customers From Identity Theft

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

Revelstoke Board of Education Policy Manual

Business Internet Banking / Cash Management Fraud Prevention Best Practices

REGION 19 HEAD START. Acceptable Use Policy

Estate Agents Authority

LSE PCI-DSS Cardholder Data Environments Information Security Policy

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Identity Theft Protection

Transcription:

Category Question Awareness Quiz Questions Answer 1. Why is backing up data files important? Backups ensure that the information you need is there when you need it If the information is damaged it can be recovered The business continues to operate 2. What can you do if you fall victim to identity theft? Contact the fraud department of each three credit bureaus and request a fraud alert be put on your file Contact the creditors for any accounts that have been tampered with File a report with your local police or the police in the community where the theft took place 3. Name three general security rules you should practice for your building or office 4. What should you do if you see a stranger walking in the halls of your building? Be cautious ask questions secure your personal belongings 1. Don t let anyone in if they can t get in themselves 2. Insist on seeing ID from people you don t know 3. Don t let strangers mess with anything even if they do have ID 4. If access into your area requires a badge, always keep the door closed 5. Employees required to wear badges should have them visible at all times 6. Escort visitors to departments. Don t let them wander around 7. Revoke access immediately when an employee or contractor is terminated or leaves for any reason 8. Follow your defined process for informing all necessary areas when an employee leaves 9. Don t leave data at printers, fax and other Always escort visitors. Have them wait in lobby for you and escort them back when your business is completed. Politely ask any stranger, May I help you? Encourage sign in and out and retturn of visitor badge Notify visitors of applicable security information (emergency exits etc.)tc.) 5. What is a Social Engineer? Social Engineer is a con artist a person that will talk people into revealing passwords or information that will compromise the company security

Passwords Passwords 1. What is one of the ways that you can secure your password from disclosure 2. When constructing a password you should: a. You should use your family member name, sports name, pet name and add a number on the end b. Use phrases or misspelled words with embedded numbers and special characters c. Use sequenced letters and numbers from your keyboard 1. You can memorize it 2. You can write it down only if you keep it in a secure place like your wallet without header information. Password should NOT be kept in a computer file The answer is b You should use phrases or misspelled words with embedded numbers and special characters Throw in digits and/or symbols here and there. Passwords that are like license plates,- alpha-numeric, are more effective (M3RC;76LT) Numbers or unique characters are best interspersed in the middle rather than the end Make new passwords that are not identical or substantially similar to ones you've previously used. Strike a balance between production - easy for you to remember -and protection - difficult for anyone to guess. Passwords 3. How are passwords like bubble gum Passwords are strongest when fresh, they should be used by an individual (not a group) If you leave your passwords laying around, there's a good chance you'll soon have a sticky mess Passwords 4. What should you do if someone asks you for your password Say NO Ask questions if it is a company technical support person you may be able to type the password in yourself. If not change your password immediately at the conclusion of the work If it is someone outside your company say NO and report the event as an incident Passwords 5. What is an example of a strong password Use made-up words meaningless combinations you can remember: to2win+do Combine unrelated words: no!cand0 salt2try $outh&hart Employ themes exact titles should be avoided Movies gone-with-the-breeze Song lyrics 75&trombones Books 2killehummingbird Use misspelled words Business = Biz!ne2z Pattern = Pa#r1n Garbage = G*rbea8$e

1. What are the three necessary components to develop positive security habits 2. What are your responsibilities for the protection of company assets a. Assist with the protection and proper use of information assets b. Know the processes to protect information assets c. Build proper security practices into your day 3. Is it legal to copy software from your PC to your laptop or home PC? 4. What are some of the things that you have seen or heard which make being more aware of information security important? 5. Sharing games or programs with your co-workers is okay as long as you don t charge them any money True or False 1. Knowledge (what to do) 2. Skill (How to do) 3. Attitude (Want to do and Why) Increase awareness Know what to look for to identifying potential issues Use sound judgment Learn and practice good security habits Make then a part of your everyday routine Encourage others to do so as well as acknowledge those that are practicing them Report potential and actual security breaches The answer is d all of the above Remember when it comes to SEC-U-R-I-TY you are it This company needs your help in protecting company assets and to do that you must know and practice the appropriate processes. The END USER LICENSE AGREEMENT will specify whether you are able to. If the EULA does not contain this clause, then you cannot make a second copy Passwords written on a post-it note and stuck on a computer monitor Computers left on, even while logged on to critical corporate applications, though the user has left Someone sharing a password with an official-sounding stranger just to be helpful Unauthorized modems connected to outside internet connections A co-worker inadvertently passing along a virus-infected e-mail A staff member complaining about how his laptop was stolen at the airport The answer is False Information is intellectual property. Unless explicitly stated in the copyright and license terms sharing programs, and even games are NOT okay even if no money changes hands You must comply with copyright and license terms Copying programs or games can be a violation Copying information from the Internet can be a violation

1. When sending or forwarding email you should make sure that it does not: a. Create a chain mail situation b. Have an attachment file c. Follow general business practices 2. My email is private and no one can look at it true or false and Why? 3. You are sending confidential information to a colleague across the internet. How can you protect this message from being read by individuals other than the intended recipient 4. Name one potential legal risk to you and the company when using the internet 5. There is a wealth of information on the internet and many people offering to help in chat groups. It is fine to take advantage of this help as long as the sites are not forbidden or blocked by the company True or False The answer is a does not create a chain mail situation. Chain mail consumes excessive resources and interferes with work productivity. In some case chain mail can also carry viruses. The answer is false The company email system is owned by the company and they are allowed to scan your email for inappropriate use or suspected policy violations Even your personal home email is vulnerable to hackers scan information on the internet. Any email on the internet unencrypted is exposed to scan You can use encryption or a password protected zip file 1. Going to sites with offensive material can present a legal risk to you and the company 2. Duplicating or downloading copyrighted material can present a legal risk to you and the company 3. Downloading information from questionable sites can put your company at risk to hacker probes The answer is false It is easy to think because it is a legitimate business site that it is okay to participate in chat sessions using your companies connection to the internet. However in such a situation you become a spokes person for the company and the company can be liable for anything you say that could be misinterpreted.

1. Name three ways to protect your laptop computer when you carry it away from your office 2. How can you protect yourself and your company from social engineering? 1. Never leave your laptop unattended 2. Utilize a security cable or similar device and attach to a solid fixture in a conference room 3. Never check your laptop as luggage 4. Make sure your path trough the metal detector at the airport is clear 5. Don t be distracted by a decoy while an accomplice grabs your computer laptop 6. At a hotel carry your laptop to the room don t let the bellman carry it. 1. DO verify the ID of anyone who claims they are from your phone company, Internet provider, or MIS department support 2. DO get to know your MIS department if you have one 3. DON T give out passwords, dial-up modem numbers, or any information about your company s systems 4. DON T be intimidated especially by name droppers 5.. 3. How can you protect against viruses? Make sure you have virus protection on your computer and do not disable the virus protection tool Scan for viruses whenever you download or copy a file Never open unsolicited attachments especially from an unknown source 4. What would you do if you encountered a security incident: a. Contact your security team b. Tell a co-worker c. Call the local newspaper d. None of the above 5. Name a way that you can be alert to suspicious activity in computer use Heads Up Computing The answer is a contact your security team or appropriate incident report team. They will know how to investigate and respond to the incident and will contact the proper authorizes and the press if necessary Be aware of files in your home directory. If you find one that you don t recognize, someone else may have used your account Never leave a session on a workstation without engaging a screensaver When you login from somewhere else, always remember to logout when done Bonus Name one of the biggest virus that impacted companies in Melissa Virus Question the US. Love Letter or I Love You Virus Bonus Question Who or what is the weakest link in the security chain? Human beings helpful, polite and trying to get their own job done fall victim to social engineers often give away important company information or inadvertently help these con artist to find and exploit system vulnerabilities