It encrypt yourinternet trafficand disguiseyour onlineidentity.the practice ofprotectingsystems,networks, andprograms fromdigital attacksA means tosupport networkcommunicationusing radiowaves ratherthan cablesA team ofpeopleworking onthe Internet orin cyberspaceRecordingthe eventsand activitiesof a systemand its usersA softwaresecretlyinstalled on auser’s device togather sensitivedataA broad termthat refers tothemaintenanceof data qualityAlsoknown as"malicioussoftware"A type of malicioussoftware thatblocks access to acomputer systemuntil money is paidAnimprovementover singlefactorauthenticationThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationGoal of anInsiderThreatProgramA securityprogramdesigned tomonitor a systemfor malicioussoftwareTheprocess ofencodinginformationA trap ordecoy forattackersA malware inwhich a maliciouspayload isimbedded insidea benign host fileAn error ormistake insoftware codingor hardwaredesign orconstructionAnunauthorizedaccess toinformationThe act ofproving theidentity ofa userA flaw in asystem thatcan leave itopen toattackAn adversaryhaving theintent, capability,opportunity tocause loss ordamageA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionAny attempt toviolate thesecurityperimeter of alogicalenvironmentYou arerequired to<__________>suspiciousbehaviorIt encrypt yourinternet trafficand disguiseyour onlineidentity.the practice ofprotectingsystems,networks, andprograms fromdigital attacksA means tosupport networkcommunicationusing radiowaves ratherthan cablesA team ofpeopleworking onthe Internet orin cyberspaceRecordingthe eventsand activitiesof a systemand its usersA softwaresecretlyinstalled on auser’s device togather sensitivedataA broad termthat refers tothemaintenanceof data qualityAlsoknown as"malicioussoftware"A type of malicioussoftware thatblocks access to acomputer systemuntil money is paidAnimprovementover singlefactorauthenticationThe ability andopportunity toobtain knowledgeof classifiedsensitiveinformationGoal of anInsiderThreatProgramA securityprogramdesigned tomonitor a systemfor malicioussoftwareTheprocess ofencodinginformationA trap ordecoy forattackersA malware inwhich a maliciouspayload isimbedded insidea benign host fileAn error ormistake insoftware codingor hardwaredesign orconstructionAnunauthorizedaccess toinformationThe act ofproving theidentity ofa userA flaw in asystem thatcan leave itopen toattackAn adversaryhaving theintent, capability,opportunity tocause loss ordamageA type ofinternet fraudthat seeks toacquire a user'scredentials bydeceptionAny attempt toviolate thesecurityperimeter of alogicalenvironmentYou arerequired to<__________>suspiciousbehavior

Cyber Definitions - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. It encrypt your internet traffic and disguise your online identity.
  2. the practice of protecting systems, networks, and programs from digital attacks
  3. A means to support network communication using radio waves rather than cables
  4. A team of people working on the Internet or in cyberspace
  5. Recording the events and activities of a system and its users
  6. A software secretly installed on a user’s device to gather sensitive data
  7. A broad term that refers to the maintenance of data quality
  8. Also known as "malicious software"
  9. A type of malicious software that blocks access to a computer system until money is paid
  10. An improvement over single factor authentication
  11. The ability and opportunity to obtain knowledge of classified sensitive information
  12. Goal of an Insider Threat Program
  13. A security program designed to monitor a system for malicious software
  14. The process of encoding information
  15. A trap or decoy for attackers
  16. A malware in which a malicious payload is imbedded inside a benign host file
  17. An error or mistake in software coding or hardware design or construction
  18. An unauthorized access to information
  19. The act of proving the identity of a user
  20. A flaw in a system that can leave it open to attack
  21. An adversary having the intent, capability, opportunity to cause loss or damage
  22. A type of internet fraud that seeks to acquire a user's credentials by deception
  23. Any attempt to violate the security perimeter of a logical environment
  24. You are required to <__________> suspicious behavior