A trap ordecoy forattackersA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidAlsoknown as"malicioussoftware"the practice ofprotectingsystems,networks, andprograms fromdigital attacksAn error ormistake insoftware codingor hardwaredesign orconstructionA flaw in asystem thatcan leave itopen toattackA securityprogramdesigned tomonitor a systemfor malicioussoftwareA malware inwhich a maliciouspayload isimbedded insidea benign host fileThe act ofproving theidentity ofa userAn adversaryhaving theintent, capability,opportunity tocause loss ordamageIt encrypt yourinternet trafficand disguiseyour onlineidentity.Theprocess ofencodinginformationA broad termthat refers tothemaintenanceof data qualityGoal of anInsiderThreatProgramAny attempt toviolate thesecurityperimeter of alogicalenvironmentA team ofpeopleworking onthe Internet orin cyberspaceYou arerequired to<__________>suspiciousbehaviorRecordingthe eventsand activitiesof a systemand its usersA means tosupport networkcommunicationusing radiowaves ratherthan cablesAnunauthorizedaccess toinformationA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA softwaresecretlyinstalled on auser’s device togather sensitivedataAnimprovementover singlefactorauthenticationA trap ordecoy forattackersA type of malicioussoftware thatblocks access to acomputer systemuntil money is paidAlsoknown as"malicioussoftware"the practice ofprotectingsystems,networks, andprograms fromdigital attacksAn error ormistake insoftware codingor hardwaredesign orconstructionA flaw in asystem thatcan leave itopen toattackA securityprogramdesigned tomonitor a systemfor malicioussoftwareA malware inwhich a maliciouspayload isimbedded insidea benign host fileThe act ofproving theidentity ofa userAn adversaryhaving theintent, capability,opportunity tocause loss ordamageIt encrypt yourinternet trafficand disguiseyour onlineidentity.Theprocess ofencodinginformationA broad termthat refers tothemaintenanceof data qualityGoal of anInsiderThreatProgramAny attempt toviolate thesecurityperimeter of alogicalenvironmentA team ofpeopleworking onthe Internet orin cyberspaceYou arerequired to<__________>suspiciousbehaviorRecordingthe eventsand activitiesof a systemand its usersA means tosupport networkcommunicationusing radiowaves ratherthan cablesAnunauthorizedaccess toinformationA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationA softwaresecretlyinstalled on auser’s device togather sensitivedataAnimprovementover singlefactorauthentication

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. A trap or decoy for attackers
  2. A type of malicious software that blocks access to a computer system until money is paid
  3. Also known as "malicious software"
  4. the practice of protecting systems, networks, and programs from digital attacks
  5. An error or mistake in software coding or hardware design or construction
  6. A flaw in a system that can leave it open to attack
  7. A security program designed to monitor a system for malicious software
  8. A malware in which a malicious payload is imbedded inside a benign host file
  9. The act of proving the identity of a user
  10. An adversary having the intent, capability, opportunity to cause loss or damage
  11. It encrypt your internet traffic and disguise your online identity.
  12. The process of encoding information
  13. A broad term that refers to the maintenance of data quality
  14. Goal of an Insider Threat Program
  15. Any attempt to violate the security perimeter of a logical environment
  16. A team of people working on the Internet or in cyberspace
  17. You are required to <__________> suspicious behavior
  18. Recording the events and activities of a system and its users
  19. A means to support network communication using radio waves rather than cables
  20. An unauthorized access to information
  21. A type of internet fraud that seeks to acquire a user's credentials by deception
  22. The ability and opportunity to obtain knowledge of classified sensitive information
  23. A software secretly installed on a user’s device to gather sensitive data
  24. An improvement over single factor authentication