(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
An error or mistake in software coding or hardware design or construction
A software secretly installed on a user’s device to gather sensitive data
A malware in which a malicious payload is imbedded inside a benign host file
The act of proving the identity of a user
The process of encoding information
the practice of protecting systems, networks, and programs from digital attacks
A flaw in a system that can leave it open to attack
A security program designed to monitor a system for malicious software
An adversary having the intent, capability, opportunity to cause loss or damage
A type of internet fraud that seeks to acquire a user's credentials by deception
It encrypt your internet traffic and disguise your online identity.
Also known as "malicious software"
An improvement over single factor authentication
A type of malicious software that blocks access to a computer system until money is paid
You are required to <__________> suspicious behavior
Goal of an Insider Threat Program
A broad term that refers to the maintenance of data quality
A means to support network communication using radio waves rather than cables
A trap or decoy for attackers
A team of people working on the Internet or in cyberspace
Recording the events and activities of a system and its users
Any attempt to violate the security perimeter of a logical environment
An unauthorized access to information
The ability and opportunity to obtain knowledge of classified sensitive information