Ransomware Secure website traffic Use at least 8 characters Minimal access for tasks Secures data by scrambling it Equifax (2017) Social Security Number Tries all password combos Hiding info in files National Institute of Standards and technology No patch exists yet Reconnaissance Uses one key Network of infected devices Confidentiality, Integrity, Availability Tricking people for data Blocks unauthorized access Tricking users into sharing info Password + SMS code Detects suspicious activity Virtual Private Network Verifies Data Integrity Worms spread on their own Finds Security flaws Verifies Authenticity Ransomware Secure website traffic Use at least 8 characters Minimal access for tasks Secures data by scrambling it Equifax (2017) Social Security Number Tries all password combos Hiding info in files National Institute of Standards and technology No patch exists yet Reconnaissance Uses one key Network of infected devices Confidentiality, Integrity, Availability Tricking people for data Blocks unauthorized access Tricking users into sharing info Password + SMS code Detects suspicious activity Virtual Private Network Verifies Data Integrity Worms spread on their own Finds Security flaws Verifies Authenticity
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
N-Ransomware
G-Secure website traffic
O-Use at least 8 characters
I-Minimal access for tasks
O-Secures data by scrambling it
B-Equifax (2017)
O-Social Security Number
G-Tries all password combos
I-Hiding info in files
N-National Institute of Standards and technology
O-No patch exists yet
B-Reconnaissance
I-Uses one key
B-Network of infected devices
B-Confidentiality, Integrity, Availability
B-Tricking people for data
G-Blocks unauthorized access
O-Tricking users into sharing info
B-Password + SMS code
I-Detects suspicious activity
G-Virtual Private Network
N-Verifies Data Integrity
I-Worms spread on their own
G-Finds Security flaws
N-Verifies Authenticity