It encrypt yourinternet trafficand disguiseyour onlineidentity.A team ofpeopleworking onthe Internet orin cyberspaceAn adversaryhaving theintent, capability,opportunity tocause loss ordamageAnimprovementover singlefactorauthenticationAnunauthorizedaccess toinformationYou arerequired to<__________>suspiciousbehaviorA flaw in asystem thatcan leave itopen toattackGoal of anInsiderThreatProgramA securityprogramdesigned tomonitor a systemfor malicioussoftwareAny attempt toviolate thesecurityperimeter of alogicalenvironmentThe act ofproving theidentity ofa userAn error ormistake insoftware codingor hardwaredesign orconstructionRecordingthe eventsand activitiesof a systemand its usersA softwaresecretlyinstalled on auser’s device togather sensitivedataA means tosupport networkcommunicationusing radiowaves ratherthan cablesThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionAlsoknown as"malicioussoftware"the practice ofprotectingsystems,networks, andprograms fromdigital attacksA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidA broad termthat refers tothemaintenanceof data qualityA malware inwhich a maliciouspayload isimbedded insidea benign host fileA trap ordecoy forattackersTheprocess ofencodinginformationIt encrypt yourinternet trafficand disguiseyour onlineidentity.A team ofpeopleworking onthe Internet orin cyberspaceAn adversaryhaving theintent, capability,opportunity tocause loss ordamageAnimprovementover singlefactorauthenticationAnunauthorizedaccess toinformationYou arerequired to<__________>suspiciousbehaviorA flaw in asystem thatcan leave itopen toattackGoal of anInsiderThreatProgramA securityprogramdesigned tomonitor a systemfor malicioussoftwareAny attempt toviolate thesecurityperimeter of alogicalenvironmentThe act ofproving theidentity ofa userAn error ormistake insoftware codingor hardwaredesign orconstructionRecordingthe eventsand activitiesof a systemand its usersA softwaresecretlyinstalled on auser’s device togather sensitivedataA means tosupport networkcommunicationusing radiowaves ratherthan cablesThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionAlsoknown as"malicioussoftware"the practice ofprotectingsystems,networks, andprograms fromdigital attacksA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidA broad termthat refers tothemaintenanceof data qualityA malware inwhich a maliciouspayload isimbedded insidea benign host fileA trap ordecoy forattackersTheprocess ofencodinginformation

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. It encrypt your internet traffic and disguise your online identity.
  2. A team of people working on the Internet or in cyberspace
  3. An adversary having the intent, capability, opportunity to cause loss or damage
  4. An improvement over single factor authentication
  5. An unauthorized access to information
  6. You are required to <__________> suspicious behavior
  7. A flaw in a system that can leave it open to attack
  8. Goal of an Insider Threat Program
  9. A security program designed to monitor a system for malicious software
  10. Any attempt to violate the security perimeter of a logical environment
  11. The act of proving the identity of a user
  12. An error or mistake in software coding or hardware design or construction
  13. Recording the events and activities of a system and its users
  14. A software secretly installed on a user’s device to gather sensitive data
  15. A means to support network communication using radio waves rather than cables
  16. The ability and opportunity to obtain knowledge of classified sensitive information
  17. A type of internet fraud that seeks to acquire a user's credentials by deception
  18. Also known as "malicious software"
  19. the practice of protecting systems, networks, and programs from digital attacks
  20. A type of malicious software that blocks access to a computer system until money is paid
  21. A broad term that refers to the maintenance of data quality
  22. A malware in which a malicious payload is imbedded inside a benign host file
  23. A trap or decoy for attackers
  24. The process of encoding information