CybersecurityThe practice ofsecuringcomputernetworks andtheirinfrastructure.EthicalHackingAuthorized testingand probing ofcomputer systemsfor securityvulnerabilities.HACKERRansomware:Malicious softwarethat encrypts filesand demands aransom for theirrelease.CANDYCANEPhishingA method ofattempting toacquire sensitiveinformationthroughdeceptive emails.Two FactorAuthenticationA securityprocess in whichusers providetwo differentauthenticationfactors.The practice ofsecuringcomputernetworks andtheirinfrastructure.IntrusionDetectionSystemA system thatidentifies andresponds tounauthorizedaccess to anetwork.CINDYLOUEvenNOOB'sTHINKBEFOREThey CLICKThinkbeforeyou act!EncryptionThe process ofconverting datainto a code topreventunauthorizedaccess.HoneypotA trap or decoy forattackers. A honeypotis used to distractattackers in order toprevent them fromattacking actualproduction systems.NOOBGRINCHSocialEngineeringManipulatingindividuals todisclosesensitiveinformation orperform actions.AntivirusSoftware designedto detect, prevent,and removemalicious softwarefrom a computer.Wi-FiA means to supportnetwork communicationusing radio waves ratherthan cables. The currentWi-Fi or wirelessnetworking technologiesare based on the IEE802.11 standard and itsnumerous amendments,which address speed,frequency, authenticationISPISP (Internet ServiceProvider)The organization thatprovides connectivity to theInternet for individuals orcompanies. Some ISPsoffer additional servicesabove that of justconnectivity such as e-mail,web hosting and domainregistration. GIFTSTheGrinchSlaysMalwareSoftwaredesigned toharm or exploitcomputersystems anddata.How theGrinchSTOLEChristmasBackupCreating copiesof data toensure it canbe restored incase of dataloss.HappyHolidaysfrom DCIFirewallA security systemthat protects webapplications fromvarious onlinethreats. And monitorsand filters incomingand outgoing networktraffic.InternetSafetyGIZMORansomwareRansomware:Malicious softwarethat encrypts filesand demands aransom for theirrelease.AccessControlA system thatrestricts andmanages accessto certainresources orareas.Don't LetYour DataGetGRINCHEDSPAMA form of unwanted orunsolicited messages orcommunications typicallyreceived via e-mail but alsooccurring through textmessaging, social networksor VoIP. Most SPAM isadvertising, but some mayinclude malicious code,malicious hyperlinks orThe process ofconverting datainto a code topreventunauthorizedaccess.Secureyourpasswords.AuthenticationThe processof verifyingthe identityof a user orsystem.RiskAssessmentThe evaluationof potentialrisks andvulnerabilitiesin a system.ThinkBeforeYou ClickSecurityPolicyA set of rulesand guidelinesfor maintainingsecurity withinanorganization.A plan foraddressingand mitigatingcybersecurityincidents.MAXIdentityFraudA form of identity theftin which a transaction,typically financial, isperformed using thestolen identity ofanother individual. Thefraud is due to theattacker impersonatingsomeone else.DataBreachUnauthorizedaccess orexposure ofsensitive data,often resultingin harmVPNA secure andencryptedconnectionbetween a user'scomputer and aremote server.CybersecurityThe practice ofsecuringcomputernetworks andtheirinfrastructure.EthicalHackingAuthorized testingand probing ofcomputer systemsfor securityvulnerabilities.HACKERRansomware:Malicious softwarethat encrypts filesand demands aransom for theirrelease.CANDYCANEPhishingA method ofattempting toacquire sensitiveinformationthroughdeceptive emails.Two FactorAuthenticationA securityprocess in whichusers providetwo differentauthenticationfactors.The practice ofsecuringcomputernetworks andtheirinfrastructure.IntrusionDetectionSystemA system thatidentifies andresponds tounauthorizedaccess to anetwork.CINDYLOUEvenNOOB'sTHINKBEFOREThey CLICKThinkbeforeyou act!EncryptionThe process ofconverting datainto a code topreventunauthorizedaccess.HoneypotA trap or decoy forattackers. A honeypotis used to distractattackers in order toprevent them fromattacking actualproduction systems.NOOBGRINCHSocialEngineeringManipulatingindividuals todisclosesensitiveinformation orperform actions.AntivirusSoftware designedto detect, prevent,and removemalicious softwarefrom a computer.Wi-FiA means to supportnetwork communicationusing radio waves ratherthan cables. The currentWi-Fi or wirelessnetworking technologiesare based on the IEE802.11 standard and itsnumerous amendments,which address speed,frequency, authenticationISPISP (Internet ServiceProvider)The organization thatprovides connectivity to theInternet for individuals orcompanies. Some ISPsoffer additional servicesabove that of justconnectivity such as e-mail,web hosting and domainregistration. GIFTSTheGrinchSlaysMalwareSoftwaredesigned toharm or exploitcomputersystems anddata.How theGrinchSTOLEChristmasBackupCreating copiesof data toensure it canbe restored incase of dataloss.HappyHolidaysfrom DCIFirewallA security systemthat protects webapplications fromvarious onlinethreats. And monitorsand filters incomingand outgoing networktraffic.InternetSafetyGIZMORansomwareRansomware:Malicious softwarethat encrypts filesand demands aransom for theirrelease.AccessControlA system thatrestricts andmanages accessto certainresources orareas.Don't LetYour DataGetGRINCHEDSPAMA form of unwanted orunsolicited messages orcommunications typicallyreceived via e-mail but alsooccurring through textmessaging, social networksor VoIP. Most SPAM isadvertising, but some mayinclude malicious code,malicious hyperlinks orThe process ofconverting datainto a code topreventunauthorizedaccess.Secureyourpasswords.AuthenticationThe processof verifyingthe identityof a user orsystem.RiskAssessmentThe evaluationof potentialrisks andvulnerabilitiesin a system.ThinkBeforeYou ClickSecurityPolicyA set of rulesand guidelinesfor maintainingsecurity withinanorganization.A plan foraddressingand mitigatingcybersecurityincidents.MAXIdentityFraudA form of identity theftin which a transaction,typically financial, isperformed using thestolen identity ofanother individual. Thefraud is due to theattacker impersonatingsomeone else.DataBreachUnauthorizedaccess orexposure ofsensitive data,often resultingin harmVPNA secure andencryptedconnectionbetween a user'scomputer and aremote server.

UMA IT Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. The practice of securing computer networks and their infrastructure.
    Cybersecurity
  2. Authorized testing and probing of computer systems for security vulnerabilities.
    Ethical Hacking
  3. HACKER
  4. Ransomware: Malicious software that encrypts files and demands a ransom for their release.
  5. CANDY CANE
  6. A method of attempting to acquire sensitive information through deceptive emails.
    Phishing
  7. A security process in which users provide two different authentication factors.
    Two Factor Authentication
  8. The practice of securing computer networks and their infrastructure.
  9. A system that identifies and responds to unauthorized access to a network.
    Intrusion Detection System
  10. CINDY LOU
  11. Even NOOB's THINK BEFORE They CLICK
  12. Think before you act!
  13. The process of converting data into a code to prevent unauthorized access.
    Encryption
  14. A trap or decoy for attackers. A honeypot is used to distract attackers in order to prevent them from attacking actual production systems.
    Honeypot
  15. NOOB
  16. GRINCH
  17. Manipulating individuals to disclose sensitive information or perform actions.
    Social Engineering
  18. Software designed to detect, prevent, and remove malicious software from a computer.
    Antivirus
  19. A means to support network communication using radio waves rather than cables. The current Wi-Fi or wireless networking technologies are based on the IEE 802.11 standard and its numerous amendments, which address speed, frequency, authentication
    Wi-Fi
  20. ISP (Internet Service Provider) The organization that provides connectivity to the Internet for individuals or companies. Some ISPs offer additional services above that of just connectivity such as e-mail, web hosting and domain registration.
    ISP
  21. GIFTS
  22. The Grinch Slays
  23. Software designed to harm or exploit computer systems and data.
    Malware
  24. How the Grinch STOLE Christmas
  25. Creating copies of data to ensure it can be restored in case of data loss.
    Backup
  26. Happy Holidays from DCI
  27. A security system that protects web applications from various online threats. And monitors and filters incoming and outgoing network traffic.
    Firewall
  28. Internet Safety
  29. GIZMO
  30. Ransomware: Malicious software that encrypts files and demands a ransom for their release.
    Ransomware
  31. A system that restricts and manages access to certain resources or areas.
    Access Control
  32. Don't Let Your Data Get GRINCHED
  33. A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or
    SPAM
  34. The process of converting data into a code to prevent unauthorized access.
  35. Secure your passwords.
  36. The process of verifying the identity of a user or system.
    Authentication
  37. The evaluation of potential risks and vulnerabilities in a system.
    Risk Assessment
  38. Think Before You Click
  39. A set of rules and guidelines for maintaining security within an organization.
    Security Policy
  40. A plan for addressing and mitigating cybersecurity incidents.
  41. MAX
  42. A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
    Identity Fraud
  43. Unauthorized access or exposure of sensitive data, often resulting in harm
    Data Breach
  44. A secure and encrypted connection between a user's computer and a remote server.
    VPN