Worms spread on their own Uses one key Verifies Data Integrity Detects suspicious activity Minimal access for tasks Password + SMS code Social Security Number Verifies Authenticity Virtual Private Network Use at least 8 characters Secures data by scrambling it Finds Security flaws No patch exists yet Tricking people for data Confidentiality, Integrity, Availability Hiding info in files Reconnaissance National Institute of Standards and technology Ransomware Tricking users into sharing info Secure website traffic Blocks unauthorized access Equifax (2017) Network of infected devices Tries all password combos Worms spread on their own Uses one key Verifies Data Integrity Detects suspicious activity Minimal access for tasks Password + SMS code Social Security Number Verifies Authenticity Virtual Private Network Use at least 8 characters Secures data by scrambling it Finds Security flaws No patch exists yet Tricking people for data Confidentiality, Integrity, Availability Hiding info in files Reconnaissance National Institute of Standards and technology Ransomware Tricking users into sharing info Secure website traffic Blocks unauthorized access Equifax (2017) Network of infected devices Tries all password combos
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Worms spread on their own
I-Uses one key
N-Verifies Data Integrity
I-Detects suspicious activity
I-Minimal access for tasks
B-Password + SMS code
O-Social Security Number
N-Verifies Authenticity
G-Virtual Private Network
O-Use at least 8 characters
O-Secures data by scrambling it
G-Finds Security flaws
O-No patch exists yet
B-Tricking people for data
B-Confidentiality, Integrity, Availability
I-Hiding info in files
B-Reconnaissance
N-National Institute of Standards and technology
N-Ransomware
O-Tricking users into sharing info
G-Secure website traffic
G-Blocks unauthorized access
B-Equifax (2017)
B-Network of infected devices
G-Tries all password combos