A trap ordecoy forattackersRecordingthe eventsand activitiesof a systemand its usersA broad termthat refers tothemaintenanceof data qualityA team ofpeopleworking onthe Internet orin cyberspaceAnimprovementover singlefactorauthenticationTheprocess ofencodinginformationA flaw in asystem thatcan leave itopen toattackIt encrypt yourinternet trafficand disguiseyour onlineidentity.The act ofproving theidentity ofa userA securityprogramdesigned tomonitor a systemfor malicioussoftwareA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidA malware inwhich a maliciouspayload isimbedded insidea benign host filethe practice ofprotectingsystems,networks, andprograms fromdigital attacksThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA means tosupport networkcommunicationusing radiowaves ratherthan cablesYou arerequired to<__________>suspiciousbehaviorGoal of anInsiderThreatProgramA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionA softwaresecretlyinstalled on auser’s device togather sensitivedataAlsoknown as"malicioussoftware"An error ormistake insoftware codingor hardwaredesign orconstructionAnunauthorizedaccess toinformationAn adversaryhaving theintent, capability,opportunity tocause loss ordamageAny attempt toviolate thesecurityperimeter of alogicalenvironmentA trap ordecoy forattackersRecordingthe eventsand activitiesof a systemand its usersA broad termthat refers tothemaintenanceof data qualityA team ofpeopleworking onthe Internet orin cyberspaceAnimprovementover singlefactorauthenticationTheprocess ofencodinginformationA flaw in asystem thatcan leave itopen toattackIt encrypt yourinternet trafficand disguiseyour onlineidentity.The act ofproving theidentity ofa userA securityprogramdesigned tomonitor a systemfor malicioussoftwareA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidA malware inwhich a maliciouspayload isimbedded insidea benign host filethe practice ofprotectingsystems,networks, andprograms fromdigital attacksThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA means tosupport networkcommunicationusing radiowaves ratherthan cablesYou arerequired to<__________>suspiciousbehaviorGoal of anInsiderThreatProgramA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionA softwaresecretlyinstalled on auser’s device togather sensitivedataAlsoknown as"malicioussoftware"An error ormistake insoftware codingor hardwaredesign orconstructionAnunauthorizedaccess toinformationAn adversaryhaving theintent, capability,opportunity tocause loss ordamageAny attempt toviolate thesecurityperimeter of alogicalenvironment

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. A trap or decoy for attackers
  2. Recording the events and activities of a system and its users
  3. A broad term that refers to the maintenance of data quality
  4. A team of people working on the Internet or in cyberspace
  5. An improvement over single factor authentication
  6. The process of encoding information
  7. A flaw in a system that can leave it open to attack
  8. It encrypt your internet traffic and disguise your online identity.
  9. The act of proving the identity of a user
  10. A security program designed to monitor a system for malicious software
  11. A type of malicious software that blocks access to a computer system until money is paid
  12. A malware in which a malicious payload is imbedded inside a benign host file
  13. the practice of protecting systems, networks, and programs from digital attacks
  14. The ability and opportunity to obtain knowledge of classified sensitive information
  15. A means to support network communication using radio waves rather than cables
  16. You are required to <__________> suspicious behavior
  17. Goal of an Insider Threat Program
  18. A type of internet fraud that seeks to acquire a user's credentials by deception
  19. A software secretly installed on a user’s device to gather sensitive data
  20. Also known as "malicious software"
  21. An error or mistake in software coding or hardware design or construction
  22. An unauthorized access to information
  23. An adversary having the intent, capability, opportunity to cause loss or damage
  24. Any attempt to violate the security perimeter of a logical environment