Use at least 8 characters Uses one key No patch exists yet Confidentiality, Integrity, Availability Secure website traffic Virtual Private Network Network of infected devices Detects suspicious activity Tries all password combos Blocks unauthorized access Finds Security flaws Worms spread on their own Tricking people for data Hiding info in files Password + SMS code Social Security Number Equifax (2017) Verifies Data Integrity Secures data by scrambling it National Institute of Standards and technology Tricking users into sharing info Verifies Authenticity Ransomware Minimal access for tasks Reconnaissance Use at least 8 characters Uses one key No patch exists yet Confidentiality, Integrity, Availability Secure website traffic Virtual Private Network Network of infected devices Detects suspicious activity Tries all password combos Blocks unauthorized access Finds Security flaws Worms spread on their own Tricking people for data Hiding info in files Password + SMS code Social Security Number Equifax (2017) Verifies Data Integrity Secures data by scrambling it National Institute of Standards and technology Tricking users into sharing info Verifies Authenticity Ransomware Minimal access for tasks Reconnaissance
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
O-Use at least 8 characters
I-Uses one key
O-No patch exists yet
B-Confidentiality, Integrity, Availability
G-Secure website traffic
G-Virtual Private Network
B-Network of infected devices
I-Detects suspicious activity
G-Tries all password combos
G-Blocks unauthorized access
G-Finds Security flaws
I-Worms spread on their own
B-Tricking people for data
I-Hiding info in files
B-Password + SMS code
O-Social Security Number
B-Equifax (2017)
N-Verifies Data Integrity
O-Secures data by scrambling it
N-National Institute of Standards and technology
O-Tricking users into sharing info
N-Verifies Authenticity
N-Ransomware
I-Minimal access for tasks
B-Reconnaissance