the practice ofprotectingsystems,networks, andprograms fromdigital attacksA malware inwhich a maliciouspayload isimbedded insidea benign host fileAn adversaryhaving theintent, capability,opportunity tocause loss ordamageA means tosupport networkcommunicationusing radiowaves ratherthan cablesA broad termthat refers tothemaintenanceof data qualityAnimprovementover singlefactorauthenticationGoal of anInsiderThreatProgramA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidAnunauthorizedaccess toinformationA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionA softwaresecretlyinstalled on auser’s device togather sensitivedataThe act ofproving theidentity ofa userAlsoknown as"malicioussoftware"You arerequired to<__________>suspiciousbehaviorThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA securityprogramdesigned tomonitor a systemfor malicioussoftwareTheprocess ofencodinginformationA trap ordecoy forattackersAny attempt toviolate thesecurityperimeter of alogicalenvironmentIt encrypt yourinternet trafficand disguiseyour onlineidentity.An error ormistake insoftware codingor hardwaredesign orconstructionRecordingthe eventsand activitiesof a systemand its usersA team ofpeopleworking onthe Internet orin cyberspaceA flaw in asystem thatcan leave itopen toattackthe practice ofprotectingsystems,networks, andprograms fromdigital attacksA malware inwhich a maliciouspayload isimbedded insidea benign host fileAn adversaryhaving theintent, capability,opportunity tocause loss ordamageA means tosupport networkcommunicationusing radiowaves ratherthan cablesA broad termthat refers tothemaintenanceof data qualityAnimprovementover singlefactorauthenticationGoal of anInsiderThreatProgramA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidAnunauthorizedaccess toinformationA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionA softwaresecretlyinstalled on auser’s device togather sensitivedataThe act ofproving theidentity ofa userAlsoknown as"malicioussoftware"You arerequired to<__________>suspiciousbehaviorThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA securityprogramdesigned tomonitor a systemfor malicioussoftwareTheprocess ofencodinginformationA trap ordecoy forattackersAny attempt toviolate thesecurityperimeter of alogicalenvironmentIt encrypt yourinternet trafficand disguiseyour onlineidentity.An error ormistake insoftware codingor hardwaredesign orconstructionRecordingthe eventsand activitiesof a systemand its usersA team ofpeopleworking onthe Internet orin cyberspaceA flaw in asystem thatcan leave itopen toattack

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. the practice of protecting systems, networks, and programs from digital attacks
  2. A malware in which a malicious payload is imbedded inside a benign host file
  3. An adversary having the intent, capability, opportunity to cause loss or damage
  4. A means to support network communication using radio waves rather than cables
  5. A broad term that refers to the maintenance of data quality
  6. An improvement over single factor authentication
  7. Goal of an Insider Threat Program
  8. A type of malicious software that blocks access to a computer system until money is paid
  9. An unauthorized access to information
  10. A type of internet fraud that seeks to acquire a user's credentials by deception
  11. A software secretly installed on a user’s device to gather sensitive data
  12. The act of proving the identity of a user
  13. Also known as "malicious software"
  14. You are required to <__________> suspicious behavior
  15. The ability and opportunity to obtain knowledge of classified sensitive information
  16. A security program designed to monitor a system for malicious software
  17. The process of encoding information
  18. A trap or decoy for attackers
  19. Any attempt to violate the security perimeter of a logical environment
  20. It encrypt your internet traffic and disguise your online identity.
  21. An error or mistake in software coding or hardware design or construction
  22. Recording the events and activities of a system and its users
  23. A team of people working on the Internet or in cyberspace
  24. A flaw in a system that can leave it open to attack