AntivirusSoftware designedto detect, prevent,and removemalicious softwarefrom a computer.GIZMONOOBDon't LetYour DataGetGRINCHEDAuthenticationThe processof verifyingthe identityof a user orsystem.A plan foraddressingand mitigatingcybersecurityincidents.FirewallA security systemthat protects webapplications fromvarious onlinethreats. And monitorsand filters incomingand outgoing networktraffic.Thinkbeforeyou act!BackupCreating copiesof data toensure it canbe restored incase of dataloss.AccessControlA system thatrestricts andmanages accessto certainresources orareas.How theGrinchSTOLEChristmasSPAMA form of unwanted orunsolicited messages orcommunications typicallyreceived via e-mail but alsooccurring through textmessaging, social networksor VoIP. Most SPAM isadvertising, but some mayinclude malicious code,malicious hyperlinks orMalwareSoftwaredesigned toharm or exploitcomputersystems anddata.SocialEngineeringManipulatingindividuals todisclosesensitiveinformation orperform actions.InternetSafetyRansomware:Malicious softwarethat encrypts filesand demands aransom for theirrelease.Two FactorAuthenticationA securityprocess in whichusers providetwo differentauthenticationfactors.GRINCHEvenNOOB'sTHINKBEFOREThey CLICKRansomwareRansomware:Malicious softwarethat encrypts filesand demands aransom for theirrelease.IntrusionDetectionSystemA system thatidentifies andresponds tounauthorizedaccess to anetwork.Secureyourpasswords.EthicalHackingAuthorized testingand probing ofcomputer systemsfor securityvulnerabilities.HappyHolidaysfrom DCIDataBreachUnauthorizedaccess orexposure ofsensitive data,often resultingin harmHACKERThe process ofconverting datainto a code topreventunauthorizedaccess.SecurityPolicyA set of rulesand guidelinesfor maintainingsecurity withinanorganization.GIFTSCANDYCANEWi-FiA means to supportnetwork communicationusing radio waves ratherthan cables. The currentWi-Fi or wirelessnetworking technologiesare based on the IEE802.11 standard and itsnumerous amendments,which address speed,frequency, authenticationRiskAssessmentThe evaluationof potentialrisks andvulnerabilitiesin a system.CINDYLOUPhishingA method ofattempting toacquire sensitiveinformationthroughdeceptive emails.CybersecurityThe practice ofsecuringcomputernetworks andtheirinfrastructure.VPNA secure andencryptedconnectionbetween a user'scomputer and aremote server.ISPISP (Internet ServiceProvider)The organization thatprovides connectivity to theInternet for individuals orcompanies. Some ISPsoffer additional servicesabove that of justconnectivity such as e-mail,web hosting and domainregistration. ThinkBeforeYou ClickEncryptionThe process ofconverting datainto a code topreventunauthorizedaccess.HoneypotA trap or decoy forattackers. A honeypotis used to distractattackers in order toprevent them fromattacking actualproduction systems.IdentityFraudA form of identity theftin which a transaction,typically financial, isperformed using thestolen identity ofanother individual. Thefraud is due to theattacker impersonatingsomeone else.TheGrinchSlaysMAXThe practice ofsecuringcomputernetworks andtheirinfrastructure.AntivirusSoftware designedto detect, prevent,and removemalicious softwarefrom a computer.GIZMONOOBDon't LetYour DataGetGRINCHEDAuthenticationThe processof verifyingthe identityof a user orsystem.A plan foraddressingand mitigatingcybersecurityincidents.FirewallA security systemthat protects webapplications fromvarious onlinethreats. And monitorsand filters incomingand outgoing networktraffic.Thinkbeforeyou act!BackupCreating copiesof data toensure it canbe restored incase of dataloss.AccessControlA system thatrestricts andmanages accessto certainresources orareas.How theGrinchSTOLEChristmasSPAMA form of unwanted orunsolicited messages orcommunications typicallyreceived via e-mail but alsooccurring through textmessaging, social networksor VoIP. Most SPAM isadvertising, but some mayinclude malicious code,malicious hyperlinks orMalwareSoftwaredesigned toharm or exploitcomputersystems anddata.SocialEngineeringManipulatingindividuals todisclosesensitiveinformation orperform actions.InternetSafetyRansomware:Malicious softwarethat encrypts filesand demands aransom for theirrelease.Two FactorAuthenticationA securityprocess in whichusers providetwo differentauthenticationfactors.GRINCHEvenNOOB'sTHINKBEFOREThey CLICKRansomwareRansomware:Malicious softwarethat encrypts filesand demands aransom for theirrelease.IntrusionDetectionSystemA system thatidentifies andresponds tounauthorizedaccess to anetwork.Secureyourpasswords.EthicalHackingAuthorized testingand probing ofcomputer systemsfor securityvulnerabilities.HappyHolidaysfrom DCIDataBreachUnauthorizedaccess orexposure ofsensitive data,often resultingin harmHACKERThe process ofconverting datainto a code topreventunauthorizedaccess.SecurityPolicyA set of rulesand guidelinesfor maintainingsecurity withinanorganization.GIFTSCANDYCANEWi-FiA means to supportnetwork communicationusing radio waves ratherthan cables. The currentWi-Fi or wirelessnetworking technologiesare based on the IEE802.11 standard and itsnumerous amendments,which address speed,frequency, authenticationRiskAssessmentThe evaluationof potentialrisks andvulnerabilitiesin a system.CINDYLOUPhishingA method ofattempting toacquire sensitiveinformationthroughdeceptive emails.CybersecurityThe practice ofsecuringcomputernetworks andtheirinfrastructure.VPNA secure andencryptedconnectionbetween a user'scomputer and aremote server.ISPISP (Internet ServiceProvider)The organization thatprovides connectivity to theInternet for individuals orcompanies. Some ISPsoffer additional servicesabove that of justconnectivity such as e-mail,web hosting and domainregistration. ThinkBeforeYou ClickEncryptionThe process ofconverting datainto a code topreventunauthorizedaccess.HoneypotA trap or decoy forattackers. A honeypotis used to distractattackers in order toprevent them fromattacking actualproduction systems.IdentityFraudA form of identity theftin which a transaction,typically financial, isperformed using thestolen identity ofanother individual. Thefraud is due to theattacker impersonatingsomeone else.TheGrinchSlaysMAXThe practice ofsecuringcomputernetworks andtheirinfrastructure.

UMA IT Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Software designed to detect, prevent, and remove malicious software from a computer.
    Antivirus
  2. GIZMO
  3. NOOB
  4. Don't Let Your Data Get GRINCHED
  5. The process of verifying the identity of a user or system.
    Authentication
  6. A plan for addressing and mitigating cybersecurity incidents.
  7. A security system that protects web applications from various online threats. And monitors and filters incoming and outgoing network traffic.
    Firewall
  8. Think before you act!
  9. Creating copies of data to ensure it can be restored in case of data loss.
    Backup
  10. A system that restricts and manages access to certain resources or areas.
    Access Control
  11. How the Grinch STOLE Christmas
  12. A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or
    SPAM
  13. Software designed to harm or exploit computer systems and data.
    Malware
  14. Manipulating individuals to disclose sensitive information or perform actions.
    Social Engineering
  15. Internet Safety
  16. Ransomware: Malicious software that encrypts files and demands a ransom for their release.
  17. A security process in which users provide two different authentication factors.
    Two Factor Authentication
  18. GRINCH
  19. Even NOOB's THINK BEFORE They CLICK
  20. Ransomware: Malicious software that encrypts files and demands a ransom for their release.
    Ransomware
  21. A system that identifies and responds to unauthorized access to a network.
    Intrusion Detection System
  22. Secure your passwords.
  23. Authorized testing and probing of computer systems for security vulnerabilities.
    Ethical Hacking
  24. Happy Holidays from DCI
  25. Unauthorized access or exposure of sensitive data, often resulting in harm
    Data Breach
  26. HACKER
  27. The process of converting data into a code to prevent unauthorized access.
  28. A set of rules and guidelines for maintaining security within an organization.
    Security Policy
  29. GIFTS
  30. CANDY CANE
  31. A means to support network communication using radio waves rather than cables. The current Wi-Fi or wireless networking technologies are based on the IEE 802.11 standard and its numerous amendments, which address speed, frequency, authentication
    Wi-Fi
  32. The evaluation of potential risks and vulnerabilities in a system.
    Risk Assessment
  33. CINDY LOU
  34. A method of attempting to acquire sensitive information through deceptive emails.
    Phishing
  35. The practice of securing computer networks and their infrastructure.
    Cybersecurity
  36. A secure and encrypted connection between a user's computer and a remote server.
    VPN
  37. ISP (Internet Service Provider) The organization that provides connectivity to the Internet for individuals or companies. Some ISPs offer additional services above that of just connectivity such as e-mail, web hosting and domain registration.
    ISP
  38. Think Before You Click
  39. The process of converting data into a code to prevent unauthorized access.
    Encryption
  40. A trap or decoy for attackers. A honeypot is used to distract attackers in order to prevent them from attacking actual production systems.
    Honeypot
  41. A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
    Identity Fraud
  42. The Grinch Slays
  43. MAX
  44. The practice of securing computer networks and their infrastructure.