.
Helps protect individuals from being victims of security incidents.
Provides an understanding of steps to follow in the event of a security incident
Helps to understand levels of responsibility
All of the above
Your children's or pet's names
Using look-alike substitutions of numbers or symbols
A combination of upper and lowercase letters mixed with numbers and symbols
Using common names or words from the dictionary
MySecret
Dp0si#Z$2
Abc123
Keyboard
Instant Message
Internet download
Portable media
Open the attachment to view its contents
Delete the email
Forward the email to your co-workers to allow them to open the attachment first
Forward the email to your personal email account so you can open it at home
Delete an unexpected or unsolicited message
Use anti-virus software to scan attachments before opening
Delete similar messages that appears more than once in your Inbox
All the above
Never email personal information
Send out pricelists for your home-based business products
Forward inspirational and humorous emails to your co-workers to brighten their day
Send an email to all your friends and co-workers to advertise a job opening in your area
True
False
Frustration with co-workers
Stress
Promotion
Financial problems
Phishing attacks
Virus attacks
Spyware
All of the above
A program that is secretly installed onto your computer and makes copies of itself which consumes your computer resources
A program that protects your computer from hackers
A program that is installed onto your computer that monitors your internet use
All of the above
Do not give out computer or network information
Do not complete confidential company tasks in an unsecure setting
Do not secure sensitive documents and media
Do not give out personal identifiable information
Conducting business for personal gain
Using company resources for political purpose
Sending an occasional personal email
Downloading music and video files
Spyware or Adware installation
Browser Hijacking
Information or identity theft
All of the above
Avoid
Recognize
Challenge
Log
Do not reply to the message
Click the link so you can see what the site looks like
Keep your system up to date, and install up-to-date antivirus and antispyware software
Report the phishing email to the legitimate company or organization that has been spoofed
Change your password
Report the incident to the proper authorities - such as a system administrator(s)
Check other systems that you have accounts on as they may be compromised as well
All the above
Always wear your security badge when leaving work, even if just for a break. They should be worn outside of the office in public so other people know where you work
Control access to your office by ensuring the door closes completely behind when entering and exiting. Ensure that no one slips in behind you
When working in a public setting, prevent shoulder surfing by shielding your paperwork and keyboard from view using your body
Follow the Clear Desk and Screen Policy. Store confidential and sensitive items in a secure place
Dispose of Confidential Documents in Waste Paper Bins
Instant Messaging, Peer-to-Peer (P2P) applications
Malware - virus, worms, spyware
Spam, Phishing attacks
End Users
Computer security is part of everyone's job
Verify everything! Verify who the person is on the phone. Verify that the website is real. Verify that the visitor belongs where you find them..
Report anything suspicious to your system administrator at [email protected]
Do not ignore unusual computer functioning. It might be a sign of malware.
Wait!
Here's an interesting quiz for you.