2024 Cyber Resources
SDSU Phishing Quiz
CYBER ZOOM BACKGROUNDS
Show your Cyber Spirit by downloading these Zoom backgrounds.
- Open the image full screen.
- Open the image full screen.
- Open the image full screen.
- Open the image full screen.
- Open the image full screen.
CYBER SAFETY TRAINING RESOURCES
This game features a wheel with six segments, each representing a different Counterintelligence category. The player selects the SPIN THE WHEEL button to begin. When the wheel stops, a series of five multiple choice questions from the category is presented.
If the player correctly answers three or more questions, that category segment is removed from the wheel and the player may spin the wheel again.
If the player incorrectly answers three or more questions, s/he may try that category again or spin the wheel to select another category.
Play continues until all six categories have been completed successfully.
https://securityawareness.usalearning.gov/cdse/multimedia/games/citrivia/index.html
Play this game to learn more about insiders who represent a threat to national security.
https://securityawareness.usalearning.gov/cdse/multimedia/games/concentration/story_html5.html
Malicious links and websites are just as numerous as real ones on the internet, which makes avoiding them all the more important. In this game, your users will learn how to differentiate between malicious links and legitimate ones.
https://training.knowbe4.com/modstore/view/9b18c7c2-88bb-45f3-840e-0973fb598b1d/en-us
The FBI calls this type of scam "Business Email Compromise" and defines BEC as “a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. Watch this video to learn more about one of the costliest cybercrimes.
https://training.knowbe4.com/modstore/view/b25564d5-2ca1-4bd2-8ff7-d157f994f6ed/en-us
Get Help
To request a service, create a ServiceNow Ticket and assign the ticket to “IT-ITSO-Help Desk”.
https://it.sdsu.edu/get-help
Report an Incident
Please contact the Information Security team immediately if you experience or are aware of any of the following: