Detects suspicious activity Reconnaissance No patch exists yet Social Security Number Secure website traffic Worms spread on their own Use at least 8 characters Minimal access for tasks Password + SMS code Uses one key Confidentiality, Integrity, Availability Verifies Data Integrity National Institute of Standards and technology Hiding info in files Tries all password combos Network of infected devices Verifies Authenticity Finds Security flaws Secures data by scrambling it Blocks unauthorized access Equifax (2017) Ransomware Tricking users into sharing info Virtual Private Network Tricking people for data Detects suspicious activity Reconnaissance No patch exists yet Social Security Number Secure website traffic Worms spread on their own Use at least 8 characters Minimal access for tasks Password + SMS code Uses one key Confidentiality, Integrity, Availability Verifies Data Integrity National Institute of Standards and technology Hiding info in files Tries all password combos Network of infected devices Verifies Authenticity Finds Security flaws Secures data by scrambling it Blocks unauthorized access Equifax (2017) Ransomware Tricking users into sharing info Virtual Private Network Tricking people for data
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Detects suspicious activity
B-Reconnaissance
O-No patch exists yet
O-Social Security Number
G-Secure website traffic
I-Worms spread on their own
O-Use at least 8 characters
I-Minimal access for tasks
B-Password + SMS code
I-Uses one key
B-Confidentiality, Integrity, Availability
N-Verifies Data Integrity
N-National Institute of Standards and technology
I-Hiding info in files
G-Tries all password combos
B-Network of infected devices
N-Verifies Authenticity
G-Finds Security flaws
O-Secures data by scrambling it
G-Blocks unauthorized access
B-Equifax (2017)
N-Ransomware
O-Tricking users into sharing info
G-Virtual Private Network
B-Tricking people for data