The ability andopportunity toobtain knowledgeof classifiedsensitiveinformationAnimprovementover singlefactorauthenticationA flaw in asystem thatcan leave itopen toattackthe practice ofprotectingsystems,networks, andprograms fromdigital attacksRecordingthe eventsand activitiesof a systemand its usersA team ofpeopleworking onthe Internet orin cyberspaceA malware inwhich a maliciouspayload isimbedded insidea benign host fileA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionYou arerequired to<__________>suspiciousbehaviorIt encrypt yourinternet trafficand disguiseyour onlineidentity.A softwaresecretlyinstalled on auser’s device togather sensitivedataAn adversaryhaving theintent, capability,opportunity tocause loss ordamageThe act ofproving theidentity ofa userAlsoknown as"malicioussoftware"Goal of anInsiderThreatProgramTheprocess ofencodinginformationAny attempt toviolate thesecurityperimeter of alogicalenvironmentA broad termthat refers tothemaintenanceof data qualityAn error ormistake insoftware codingor hardwaredesign orconstructionA trap ordecoy forattackersAnunauthorizedaccess toinformationA means tosupport networkcommunicationusing radiowaves ratherthan cablesA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidA securityprogramdesigned tomonitor a systemfor malicioussoftwareThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationAnimprovementover singlefactorauthenticationA flaw in asystem thatcan leave itopen toattackthe practice ofprotectingsystems,networks, andprograms fromdigital attacksRecordingthe eventsand activitiesof a systemand its usersA team ofpeopleworking onthe Internet orin cyberspaceA malware inwhich a maliciouspayload isimbedded insidea benign host fileA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionYou arerequired to<__________>suspiciousbehaviorIt encrypt yourinternet trafficand disguiseyour onlineidentity.A softwaresecretlyinstalled on auser’s device togather sensitivedataAn adversaryhaving theintent, capability,opportunity tocause loss ordamageThe act ofproving theidentity ofa userAlsoknown as"malicioussoftware"Goal of anInsiderThreatProgramTheprocess ofencodinginformationAny attempt toviolate thesecurityperimeter of alogicalenvironmentA broad termthat refers tothemaintenanceof data qualityAn error ormistake insoftware codingor hardwaredesign orconstructionA trap ordecoy forattackersAnunauthorizedaccess toinformationA means tosupport networkcommunicationusing radiowaves ratherthan cablesA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidA securityprogramdesigned tomonitor a systemfor malicioussoftware

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. The ability and opportunity to obtain knowledge of classified sensitive information
  2. An improvement over single factor authentication
  3. A flaw in a system that can leave it open to attack
  4. the practice of protecting systems, networks, and programs from digital attacks
  5. Recording the events and activities of a system and its users
  6. A team of people working on the Internet or in cyberspace
  7. A malware in which a malicious payload is imbedded inside a benign host file
  8. A type of internet fraud that seeks to acquire a user's credentials by deception
  9. You are required to <__________> suspicious behavior
  10. It encrypt your internet traffic and disguise your online identity.
  11. A software secretly installed on a user’s device to gather sensitive data
  12. An adversary having the intent, capability, opportunity to cause loss or damage
  13. The act of proving the identity of a user
  14. Also known as "malicious software"
  15. Goal of an Insider Threat Program
  16. The process of encoding information
  17. Any attempt to violate the security perimeter of a logical environment
  18. A broad term that refers to the maintenance of data quality
  19. An error or mistake in software coding or hardware design or construction
  20. A trap or decoy for attackers
  21. An unauthorized access to information
  22. A means to support network communication using radio waves rather than cables
  23. A type of malicious software that blocks access to a computer system until money is paid
  24. A security program designed to monitor a system for malicious software