It encrypt yourinternet trafficand disguiseyour onlineidentity.A type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionTheprocess ofencodinginformationA softwaresecretlyinstalled on auser’s device togather sensitivedataAn adversaryhaving theintent, capability,opportunity tocause loss ordamageThe act ofproving theidentity ofa userthe practice ofprotectingsystems,networks, andprograms fromdigital attacksYou arerequired to<__________>suspiciousbehaviorA trap ordecoy forattackersA team ofpeopleworking onthe Internet orin cyberspaceA broad termthat refers tothemaintenanceof data qualityAny attempt toviolate thesecurityperimeter of alogicalenvironmentAlsoknown as"malicioussoftware"Goal of anInsiderThreatProgramA means tosupport networkcommunicationusing radiowaves ratherthan cablesAnunauthorizedaccess toinformationAnimprovementover singlefactorauthenticationA malware inwhich a maliciouspayload isimbedded insidea benign host fileA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidA flaw in asystem thatcan leave itopen toattackA securityprogramdesigned tomonitor a systemfor malicioussoftwareRecordingthe eventsand activitiesof a systemand its usersThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationAn error ormistake insoftware codingor hardwaredesign orconstructionIt encrypt yourinternet trafficand disguiseyour onlineidentity.A type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionTheprocess ofencodinginformationA softwaresecretlyinstalled on auser’s device togather sensitivedataAn adversaryhaving theintent, capability,opportunity tocause loss ordamageThe act ofproving theidentity ofa userthe practice ofprotectingsystems,networks, andprograms fromdigital attacksYou arerequired to<__________>suspiciousbehaviorA trap ordecoy forattackersA team ofpeopleworking onthe Internet orin cyberspaceA broad termthat refers tothemaintenanceof data qualityAny attempt toviolate thesecurityperimeter of alogicalenvironmentAlsoknown as"malicioussoftware"Goal of anInsiderThreatProgramA means tosupport networkcommunicationusing radiowaves ratherthan cablesAnunauthorizedaccess toinformationAnimprovementover singlefactorauthenticationA malware inwhich a maliciouspayload isimbedded insidea benign host fileA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidA flaw in asystem thatcan leave itopen toattackA securityprogramdesigned tomonitor a systemfor malicioussoftwareRecordingthe eventsand activitiesof a systemand its usersThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationAn error ormistake insoftware codingor hardwaredesign orconstruction

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. It encrypt your internet traffic and disguise your online identity.
  2. A type of internet fraud that seeks to acquire a user's credentials by deception
  3. The process of encoding information
  4. A software secretly installed on a user’s device to gather sensitive data
  5. An adversary having the intent, capability, opportunity to cause loss or damage
  6. The act of proving the identity of a user
  7. the practice of protecting systems, networks, and programs from digital attacks
  8. You are required to <__________> suspicious behavior
  9. A trap or decoy for attackers
  10. A team of people working on the Internet or in cyberspace
  11. A broad term that refers to the maintenance of data quality
  12. Any attempt to violate the security perimeter of a logical environment
  13. Also known as "malicious software"
  14. Goal of an Insider Threat Program
  15. A means to support network communication using radio waves rather than cables
  16. An unauthorized access to information
  17. An improvement over single factor authentication
  18. A malware in which a malicious payload is imbedded inside a benign host file
  19. A type of malicious software that blocks access to a computer system until money is paid
  20. A flaw in a system that can leave it open to attack
  21. A security program designed to monitor a system for malicious software
  22. Recording the events and activities of a system and its users
  23. The ability and opportunity to obtain knowledge of classified sensitive information
  24. An error or mistake in software coding or hardware design or construction