Virtual Private Network Hiding info in files Ransomware Worms spread on their own Password + SMS code No patch exists yet Social Security Number Minimal access for tasks Verifies Data Integrity National Institute of Standards and technology Uses one key Reconnaissance Blocks unauthorized access Verifies Authenticity Detects suspicious activity Equifax (2017) Secures data by scrambling it Finds Security flaws Use at least 8 characters Tricking users into sharing info Tries all password combos Network of infected devices Tricking people for data Confidentiality, Integrity, Availability Secure website traffic Virtual Private Network Hiding info in files Ransomware Worms spread on their own Password + SMS code No patch exists yet Social Security Number Minimal access for tasks Verifies Data Integrity National Institute of Standards and technology Uses one key Reconnaissance Blocks unauthorized access Verifies Authenticity Detects suspicious activity Equifax (2017) Secures data by scrambling it Finds Security flaws Use at least 8 characters Tricking users into sharing info Tries all password combos Network of infected devices Tricking people for data Confidentiality, Integrity, Availability Secure website traffic
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Virtual Private Network
I-Hiding info in files
N-Ransomware
I-Worms spread on their own
B-Password + SMS code
O-No patch exists yet
O-Social Security Number
I-Minimal access for tasks
N-Verifies Data Integrity
N-National Institute of Standards and technology
I-Uses one key
B-Reconnaissance
G-Blocks unauthorized access
N-Verifies Authenticity
I-Detects suspicious activity
B-Equifax (2017)
O-Secures data by scrambling it
G-Finds Security flaws
O-Use at least 8 characters
O-Tricking users into sharing info
G-Tries all password combos
B-Network of infected devices
B-Tricking people for data
B-Confidentiality, Integrity, Availability
G-Secure website traffic