Theprocess ofencodinginformationthe practice ofprotectingsystems,networks, andprograms fromdigital attacksAlsoknown as"malicioussoftware"Any attempt toviolate thesecurityperimeter of alogicalenvironmentThe act ofproving theidentity ofa userAn error ormistake insoftware codingor hardwaredesign orconstructionA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA flaw in asystem thatcan leave itopen toattackRecordingthe eventsand activitiesof a systemand its usersGoal of anInsiderThreatProgramAnunauthorizedaccess toinformationA team ofpeopleworking onthe Internet orin cyberspaceAnimprovementover singlefactorauthenticationAn adversaryhaving theintent, capability,opportunity tocause loss ordamageIt encrypt yourinternet trafficand disguiseyour onlineidentity.A trap ordecoy forattackersA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionA means tosupport networkcommunicationusing radiowaves ratherthan cablesA broad termthat refers tothemaintenanceof data qualityA softwaresecretlyinstalled on auser’s device togather sensitivedataA securityprogramdesigned tomonitor a systemfor malicioussoftwareA malware inwhich a maliciouspayload isimbedded insidea benign host fileYou arerequired to<__________>suspiciousbehaviorTheprocess ofencodinginformationthe practice ofprotectingsystems,networks, andprograms fromdigital attacksAlsoknown as"malicioussoftware"Any attempt toviolate thesecurityperimeter of alogicalenvironmentThe act ofproving theidentity ofa userAn error ormistake insoftware codingor hardwaredesign orconstructionA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA flaw in asystem thatcan leave itopen toattackRecordingthe eventsand activitiesof a systemand its usersGoal of anInsiderThreatProgramAnunauthorizedaccess toinformationA team ofpeopleworking onthe Internet orin cyberspaceAnimprovementover singlefactorauthenticationAn adversaryhaving theintent, capability,opportunity tocause loss ordamageIt encrypt yourinternet trafficand disguiseyour onlineidentity.A trap ordecoy forattackersA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionA means tosupport networkcommunicationusing radiowaves ratherthan cablesA broad termthat refers tothemaintenanceof data qualityA softwaresecretlyinstalled on auser’s device togather sensitivedataA securityprogramdesigned tomonitor a systemfor malicioussoftwareA malware inwhich a maliciouspayload isimbedded insidea benign host fileYou arerequired to<__________>suspiciousbehavior

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. The process of encoding information
  2. the practice of protecting systems, networks, and programs from digital attacks
  3. Also known as "malicious software"
  4. Any attempt to violate the security perimeter of a logical environment
  5. The act of proving the identity of a user
  6. An error or mistake in software coding or hardware design or construction
  7. A type of malicious software that blocks access to a computer system until money is paid
  8. The ability and opportunity to obtain knowledge of classified sensitive information
  9. A flaw in a system that can leave it open to attack
  10. Recording the events and activities of a system and its users
  11. Goal of an Insider Threat Program
  12. An unauthorized access to information
  13. A team of people working on the Internet or in cyberspace
  14. An improvement over single factor authentication
  15. An adversary having the intent, capability, opportunity to cause loss or damage
  16. It encrypt your internet traffic and disguise your online identity.
  17. A trap or decoy for attackers
  18. A type of internet fraud that seeks to acquire a user's credentials by deception
  19. A means to support network communication using radio waves rather than cables
  20. A broad term that refers to the maintenance of data quality
  21. A software secretly installed on a user’s device to gather sensitive data
  22. A security program designed to monitor a system for malicious software
  23. A malware in which a malicious payload is imbedded inside a benign host file
  24. You are required to <__________> suspicious behavior