The act ofproving theidentity ofa userAn error ormistake insoftware codingor hardwaredesign orconstructionTheprocess ofencodinginformationA trap ordecoy forattackersA team ofpeopleworking onthe Internet orin cyberspaceA broad termthat refers tothemaintenanceof data qualityA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionA softwaresecretlyinstalled on auser’s device togather sensitivedataA malware inwhich a maliciouspayload isimbedded insidea benign host fileThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA flaw in asystem thatcan leave itopen toattackA securityprogramdesigned tomonitor a systemfor malicioussoftwareGoal of anInsiderThreatProgramIt encrypt yourinternet trafficand disguiseyour onlineidentity.the practice ofprotectingsystems,networks, andprograms fromdigital attacksAnunauthorizedaccess toinformationA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidA means tosupport networkcommunicationusing radiowaves ratherthan cablesAlsoknown as"malicioussoftware"Animprovementover singlefactorauthenticationAn adversaryhaving theintent, capability,opportunity tocause loss ordamageYou arerequired to<__________>suspiciousbehaviorRecordingthe eventsand activitiesof a systemand its usersAny attempt toviolate thesecurityperimeter of alogicalenvironmentThe act ofproving theidentity ofa userAn error ormistake insoftware codingor hardwaredesign orconstructionTheprocess ofencodinginformationA trap ordecoy forattackersA team ofpeopleworking onthe Internet orin cyberspaceA broad termthat refers tothemaintenanceof data qualityA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionA softwaresecretlyinstalled on auser’s device togather sensitivedataA malware inwhich a maliciouspayload isimbedded insidea benign host fileThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA flaw in asystem thatcan leave itopen toattackA securityprogramdesigned tomonitor a systemfor malicioussoftwareGoal of anInsiderThreatProgramIt encrypt yourinternet trafficand disguiseyour onlineidentity.the practice ofprotectingsystems,networks, andprograms fromdigital attacksAnunauthorizedaccess toinformationA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidA means tosupport networkcommunicationusing radiowaves ratherthan cablesAlsoknown as"malicioussoftware"Animprovementover singlefactorauthenticationAn adversaryhaving theintent, capability,opportunity tocause loss ordamageYou arerequired to<__________>suspiciousbehaviorRecordingthe eventsand activitiesof a systemand its usersAny attempt toviolate thesecurityperimeter of alogicalenvironment

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. The act of proving the identity of a user
  2. An error or mistake in software coding or hardware design or construction
  3. The process of encoding information
  4. A trap or decoy for attackers
  5. A team of people working on the Internet or in cyberspace
  6. A broad term that refers to the maintenance of data quality
  7. A type of internet fraud that seeks to acquire a user's credentials by deception
  8. A software secretly installed on a user’s device to gather sensitive data
  9. A malware in which a malicious payload is imbedded inside a benign host file
  10. The ability and opportunity to obtain knowledge of classified sensitive information
  11. A flaw in a system that can leave it open to attack
  12. A security program designed to monitor a system for malicious software
  13. Goal of an Insider Threat Program
  14. It encrypt your internet traffic and disguise your online identity.
  15. the practice of protecting systems, networks, and programs from digital attacks
  16. An unauthorized access to information
  17. A type of malicious software that blocks access to a computer system until money is paid
  18. A means to support network communication using radio waves rather than cables
  19. Also known as "malicious software"
  20. An improvement over single factor authentication
  21. An adversary having the intent, capability, opportunity to cause loss or damage
  22. You are required to <__________> suspicious behavior
  23. Recording the events and activities of a system and its users
  24. Any attempt to violate the security perimeter of a logical environment