passwords | Information Security | Cyber | Physical Security | Disaster Recovery |
---|---|---|---|---|
What are more than 8 characters, letters numbers, symbols
Name 3 characteristics of a strong password
|
what is patching
I am the reason we reboot our PC's every night
|
What is cyber risk
The increased probability that the very-high impact, internet-based risks and threats we once thought were improbable will harm our networks
|
What is the clean desk policy
The policy that requires all sensitive information be removed from your desk, screens, and spaces when unattended.
|
What is Business Continuity Plan
Its initials are BCP
|
What is keypass or an encrypted database
I am the safest place to store your passwords
|
What is Non Public Customer Information
I am also known as NPCI
|
What is a Data Loss Prevention System
I am also known as a DLP System
|
what is the Blue Bin or large shred bin
The place I discard any trash that has PII, NCPI, or Bank proprietary information.
|
What is the Auburn Branch
The Bank's disaster recovery site
|
what is a post it note under the keyboard
I am the worst and most common place to hide a password
|
What is personally identifiable information
This may be referred to as PII
|
What is ransomeware
This evil malware encrypts your data for ransom (usually in bit coin)
|
What is skimming
The act of stealing Debit/ATM card data from a reader placed over a real reader on an ATM or other retail payment device.
|
What are
generator dedicated DR PC's dedicated DR Servers physical supplies
List three thing the DR site has that others don't
|
what is a short sentence or phrase
This is the easiest way to create and remember a strong password
|
What is passwords
limit access encryption segmentation
Name an example of logical security
|
What is Phishing
I am the most common way to to get attack and or Hack
|
What is ebay
Easiest place to buy skimming kits (devices, cameras, software)
|
at least quarterly, all departments annually
The frequency at which we perform DR tests
|
what is Birthdays, Hobbies, Sports, Pets, Dictionary, etc
or something easily guessed
This should never be part of a password
|
What is GLBA or Privacy ACT or Mass 201 CMR 17
Name a regulation pertaining to Information Security
|
What is
large targets easy to set up don't need high percentage to click
Name some reasons Phishing is so popular
|
What are
alarms vaults access system cash recyclers cameras lighting mirrors
Name 3 security Devices found in a branch
|
What are
replicated to Franklin servers replicated to auburn servers saved to local server replicated to COCC cloud copied to external hard drive
List 2 ways data is backed up
|