An error ormistake insoftware codingor hardwaredesign orconstructionA softwaresecretlyinstalled on auser’s device togather sensitivedataA malware inwhich a maliciouspayload isimbedded insidea benign host fileThe act ofproving theidentity ofa userTheprocess ofencodinginformationthe practice ofprotectingsystems,networks, andprograms fromdigital attacksA flaw in asystem thatcan leave itopen toattackA securityprogramdesigned tomonitor a systemfor malicioussoftwareAn adversaryhaving theintent, capability,opportunity tocause loss ordamageA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionIt encrypt yourinternet trafficand disguiseyour onlineidentity.Alsoknown as"malicioussoftware"Animprovementover singlefactorauthenticationA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidYou arerequired to<__________>suspiciousbehaviorGoal of anInsiderThreatProgramA broad termthat refers tothemaintenanceof data qualityA means tosupport networkcommunicationusing radiowaves ratherthan cablesA trap ordecoy forattackersA team ofpeopleworking onthe Internet orin cyberspaceRecordingthe eventsand activitiesof a systemand its usersAny attempt toviolate thesecurityperimeter of alogicalenvironmentAnunauthorizedaccess toinformationThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationAn error ormistake insoftware codingor hardwaredesign orconstructionA softwaresecretlyinstalled on auser’s device togather sensitivedataA malware inwhich a maliciouspayload isimbedded insidea benign host fileThe act ofproving theidentity ofa userTheprocess ofencodinginformationthe practice ofprotectingsystems,networks, andprograms fromdigital attacksA flaw in asystem thatcan leave itopen toattackA securityprogramdesigned tomonitor a systemfor malicioussoftwareAn adversaryhaving theintent, capability,opportunity tocause loss ordamageA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionIt encrypt yourinternet trafficand disguiseyour onlineidentity.Alsoknown as"malicioussoftware"Animprovementover singlefactorauthenticationA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidYou arerequired to<__________>suspiciousbehaviorGoal of anInsiderThreatProgramA broad termthat refers tothemaintenanceof data qualityA means tosupport networkcommunicationusing radiowaves ratherthan cablesA trap ordecoy forattackersA team ofpeopleworking onthe Internet orin cyberspaceRecordingthe eventsand activitiesof a systemand its usersAny attempt toviolate thesecurityperimeter of alogicalenvironmentAnunauthorizedaccess toinformationThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformation

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. An error or mistake in software coding or hardware design or construction
  2. A software secretly installed on a user’s device to gather sensitive data
  3. A malware in which a malicious payload is imbedded inside a benign host file
  4. The act of proving the identity of a user
  5. The process of encoding information
  6. the practice of protecting systems, networks, and programs from digital attacks
  7. A flaw in a system that can leave it open to attack
  8. A security program designed to monitor a system for malicious software
  9. An adversary having the intent, capability, opportunity to cause loss or damage
  10. A type of internet fraud that seeks to acquire a user's credentials by deception
  11. It encrypt your internet traffic and disguise your online identity.
  12. Also known as "malicious software"
  13. An improvement over single factor authentication
  14. A type of malicious software that blocks access to a computer system until money is paid
  15. You are required to <__________> suspicious behavior
  16. Goal of an Insider Threat Program
  17. A broad term that refers to the maintenance of data quality
  18. A means to support network communication using radio waves rather than cables
  19. A trap or decoy for attackers
  20. A team of people working on the Internet or in cyberspace
  21. Recording the events and activities of a system and its users
  22. Any attempt to violate the security perimeter of a logical environment
  23. An unauthorized access to information
  24. The ability and opportunity to obtain knowledge of classified sensitive information