Theprocess ofencodinginformationIt encrypt yourinternet trafficand disguiseyour onlineidentity.Alsoknown as"malicioussoftware"Animprovementover singlefactorauthenticationA team ofpeopleworking onthe Internet orin cyberspaceRecordingthe eventsand activitiesof a systemand its usersA means tosupport networkcommunicationusing radiowaves ratherthan cablesA malware inwhich a maliciouspayload isimbedded insidea benign host filethe practice ofprotectingsystems,networks, andprograms fromdigital attacksAn adversaryhaving theintent, capability,opportunity tocause loss ordamageA securityprogramdesigned tomonitor a systemfor malicioussoftwareA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidGoal of anInsiderThreatProgramAny attempt toviolate thesecurityperimeter of alogicalenvironmentA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionAn error ormistake insoftware codingor hardwaredesign orconstructionAnunauthorizedaccess toinformationA softwaresecretlyinstalled on auser’s device togather sensitivedataA broad termthat refers tothemaintenanceof data qualityA trap ordecoy forattackersA flaw in asystem thatcan leave itopen toattackThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationThe act ofproving theidentity ofa userYou arerequired to<__________>suspiciousbehaviorTheprocess ofencodinginformationIt encrypt yourinternet trafficand disguiseyour onlineidentity.Alsoknown as"malicioussoftware"Animprovementover singlefactorauthenticationA team ofpeopleworking onthe Internet orin cyberspaceRecordingthe eventsand activitiesof a systemand its usersA means tosupport networkcommunicationusing radiowaves ratherthan cablesA malware inwhich a maliciouspayload isimbedded insidea benign host filethe practice ofprotectingsystems,networks, andprograms fromdigital attacksAn adversaryhaving theintent, capability,opportunity tocause loss ordamageA securityprogramdesigned tomonitor a systemfor malicioussoftwareA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidGoal of anInsiderThreatProgramAny attempt toviolate thesecurityperimeter of alogicalenvironmentA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionAn error ormistake insoftware codingor hardwaredesign orconstructionAnunauthorizedaccess toinformationA softwaresecretlyinstalled on auser’s device togather sensitivedataA broad termthat refers tothemaintenanceof data qualityA trap ordecoy forattackersA flaw in asystem thatcan leave itopen toattackThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationThe act ofproving theidentity ofa userYou arerequired to<__________>suspiciousbehavior

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. The process of encoding information
  2. It encrypt your internet traffic and disguise your online identity.
  3. Also known as "malicious software"
  4. An improvement over single factor authentication
  5. A team of people working on the Internet or in cyberspace
  6. Recording the events and activities of a system and its users
  7. A means to support network communication using radio waves rather than cables
  8. A malware in which a malicious payload is imbedded inside a benign host file
  9. the practice of protecting systems, networks, and programs from digital attacks
  10. An adversary having the intent, capability, opportunity to cause loss or damage
  11. A security program designed to monitor a system for malicious software
  12. A type of malicious software that blocks access to a computer system until money is paid
  13. Goal of an Insider Threat Program
  14. Any attempt to violate the security perimeter of a logical environment
  15. A type of internet fraud that seeks to acquire a user's credentials by deception
  16. An error or mistake in software coding or hardware design or construction
  17. An unauthorized access to information
  18. A software secretly installed on a user’s device to gather sensitive data
  19. A broad term that refers to the maintenance of data quality
  20. A trap or decoy for attackers
  21. A flaw in a system that can leave it open to attack
  22. The ability and opportunity to obtain knowledge of classified sensitive information
  23. The act of proving the identity of a user
  24. You are required to <__________> suspicious behavior