Availabilityauthorized usershave timely,reliable access toresources whenthey are needed.External/Removablemedia attackAn attackexecuted fromremovablemedia or aperipheraldevice.Email/PhishingAttackAn attackexecuted viaan emailmessage orattachment.CyberSecuritythe practice ofprotectingcomputers,networks, ordevices frommalicious digitalattacks.AttritionAttackAn attack thatemploys brute forcemethods tocompromise,degrade, or destroysystems, networks,or services.WebAttackAn attackexecuted froma website orweb-basedapplication.InformationSecurityis the practice ofkeeping data orinformation securefrom unauthorizedor unwarrantedaccess.CSRITIt is anincidentresponseteam similarto CERTImpersonation/SpoofingAttackAn attack involvingreplacement oflegitimatecontent/serviceswith a malicioussubstitute.CERTUnited StatesComputerEmergencyReadinessTeamFree!Integrityabout ensuring thatdata has not beentampered with and,therefore, can betrusted. It is correct,authentic, andreliable.ImproperUsageAttackAny incident resultingfrom a violation of anorganization’sacceptable usagepolicies by anauthorized user,excluding the abovecategories.CIATriadConfidentiality,Availability,IntegrityLoss orTheft ofEquipmentThe loss or theftof a computingdevice or mediaused by theorganization.Confidentialityrefers to anorganization’sefforts to keeptheir dataprivate orsecret.Availabilityauthorized usershave timely,reliable access toresources whenthey are needed.External/Removablemedia attackAn attackexecuted fromremovablemedia or aperipheraldevice.Email/PhishingAttackAn attackexecuted viaan emailmessage orattachment.CyberSecuritythe practice ofprotectingcomputers,networks, ordevices frommalicious digitalattacks.AttritionAttackAn attack thatemploys brute forcemethods tocompromise,degrade, or destroysystems, networks,or services.WebAttackAn attackexecuted froma website orweb-basedapplication.InformationSecurityis the practice ofkeeping data orinformation securefrom unauthorizedor unwarrantedaccess.CSRITIt is anincidentresponseteam similarto CERTImpersonation/SpoofingAttackAn attack involvingreplacement oflegitimatecontent/serviceswith a malicioussubstitute.CERTUnited StatesComputerEmergencyReadinessTeamFree!Integrityabout ensuring thatdata has not beentampered with and,therefore, can betrusted. It is correct,authentic, andreliable.ImproperUsageAttackAny incident resultingfrom a violation of anorganization’sacceptable usagepolicies by anauthorized user,excluding the abovecategories.CIATriadConfidentiality,Availability,IntegrityLoss orTheft ofEquipmentThe loss or theftof a computingdevice or mediaused by theorganization.Confidentialityrefers to anorganization’sefforts to keeptheir dataprivate orsecret.

Introduction to Cybersecurity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
  1. authorized users have timely, reliable access to resources when they are needed.
    Availability
  2. An attack executed from removable media or a peripheral device.
    External/Removable media attack
  3. An attack executed via an email message or attachment.
    Email/Phishing Attack
  4. the practice of protecting computers, networks, or devices from malicious digital attacks.
    Cyber Security
  5. An attack that employs brute force methods to compromise, degrade, or destroy systems, networks, or services.
    Attrition Attack
  6. An attack executed from a website or web-based application.
    Web Attack
  7. is the practice of keeping data or information secure from unauthorized or unwarranted access.
    Information Security
  8. It is an incident response team similar to CERT
    CSRIT
  9. An attack involving replacement of legitimate content/services with a malicious substitute.
    Impersonation/Spoofing Attack
  10. United States Computer Emergency Readiness Team
    CERT
  11. Free!
  12. about ensuring that data has not been tampered with and, therefore, can be trusted. It is correct, authentic, and reliable.
    Integrity
  13. Any incident resulting from a violation of an organization’s acceptable usage policies by an authorized user, excluding the above categories.
    Improper Usage Attack
  14. Confidentiality, Availability, Integrity
    CIA Triad
  15. The loss or theft of a computing device or media used by the organization.
    Loss or Theft of Equipment
  16. refers to an organization’s efforts to keep their data private or secret.
    Confidentiality