passwords | Information Security | Cyber |
---|---|---|
What is strong password
more than 8 characters, letters numbers, symbols
|
why do we reboot at night
patching
|
What is cyber risk
The increased probability that the very-high impact, internet-based risks and threats we once thought were improbable will harm our networks
|
where is the best place to store a password
keypass or encrypted database
|
What is NPCI
non public customer information
|
What is a DLP system
Data Loss Prevention
|
where are written password likely to be found
post it note under the keyboard
|
What is PII
personally identifiable information
|
What is ransomware
malware that encrypts your data for ransom (bit coin)
|
what is the easiest way to create a strong password
Short sentences
|
What is an example of logical security
passwords
limit access encryption segmentation |
What is is the most common way to get attacked
Phishing
|
why do passwords expire
can be figured out easier over time
|
What is a regulation pertaining to Information Security
GLBA
Privacy ACT |
why is phishing so popular
large targets
easy to set up don't need high percentage to click |