Norfolk State University Socio-CybersecurityNorfolk State University Socio-Cybersecurity
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    Register Login

    Initial Security Checklist

    • Home
    • Modules
    • Social Organizational Theory
    • Personnel and Security
    • Initial Security Checklist

    Initial Security Checklist

     

    1. What is your classification?
    Freshman
    Sophomore
    Junior
    Senior
    Graduate Student
    1. What is your major?

     

    1. What is the name of your concentration, if any (examples: Criminal Justice, Urban Affairs, etc.)?

     

    1. If HR is conducting an interview, they should not be:
    Educated on various certifications
    Informed of the specific experiences each credential requires
    Provide the physical address of the organization
    Made aware of the qualifications of a good candidate
    1. Background checks can…
    Uncover past criminal behaviors
    Uncover information that suggest that a person can be encouraged to be a company spy
    All of the above
    None of the above
    1. Which of the following is not a type of background check?
    Identity check
    Worker compensation history
    Drug history
    Reference history

     

    1. __________ is the practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information.
    Shoulder surfing
    Physical hacking
    Tailgating
    Piggybacking
    1. __________ is when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint so they can gain entry as well.
    Shoulder surfing
    Tailgating
    Physical hacking
    Access generator
    1. Best practices in defending against tailgating to do which of the following?
    Employees should not  hold badge accessed doors open for anyone that they do not know personally, and they should make sure that no one slips in behind them
    Employees should report to the security team  any suspicious individual they observe trying to slip through any type of access control situation whether it involves badging in, signing a visitor log or checking in with security
    Employees should inform building maintenance or security if they find a door that does not automatically close or has a broken lock,; They should close any doors which are propped open
    All of the above
    1. Organizations are required by law to protect which of the personal identifying facts?
    Addresses
    Phone numbers
    Social security numbers
    All of the above

     

     

     

    1. Which of the following is not best practices for solutions?
    Clean desk policies
    Turn off computers at the end of the work day
    Securing of classified data
    Temps should not be employed in sensitive areas
    1. Have you ever completed a cybersecurity laboratory exercise for social organizational theory?

    Yes
    No

     

    1. Based on the answer in question 13, did the laboratory exercise help with your understanding of the cybersecurity process for bureaucratic organizations?
    Very much
    Somewhat
    Very little
    Not at all
    Not applicable

    Search

    Department of Sociology
    Norfolk State University
    700 Park Avenue,
    Norfolk,
    Virginia 23504
    USA
    Tel: 757-823-8436

    This Project is funded by the National Science Foundation

    © 2019. NSU Socio-Cybersecurity Project. All Rights Reserved