Hiding info in files Finds Security flaws Equifax (2017) Blocks unauthorized access Tricking people for data Uses one key Network of infected devices Use at least 8 characters Reconnaissance Password + SMS code National Institute of Standards and technology No patch exists yet Virtual Private Network Detects suspicious activity Worms spread on their own Ransomware Secure website traffic Verifies Authenticity Tricking users into sharing info Verifies Data Integrity Secures data by scrambling it Tries all password combos Social Security Number Minimal access for tasks Confidentiality, Integrity, Availability Hiding info in files Finds Security flaws Equifax (2017) Blocks unauthorized access Tricking people for data Uses one key Network of infected devices Use at least 8 characters Reconnaissance Password + SMS code National Institute of Standards and technology No patch exists yet Virtual Private Network Detects suspicious activity Worms spread on their own Ransomware Secure website traffic Verifies Authenticity Tricking users into sharing info Verifies Data Integrity Secures data by scrambling it Tries all password combos Social Security Number Minimal access for tasks Confidentiality, Integrity, Availability
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Hiding info in files
G-Finds Security flaws
B-Equifax (2017)
G-Blocks unauthorized access
B-Tricking people for data
I-Uses one key
B-Network of infected devices
O-Use at least 8 characters
B-Reconnaissance
B-Password + SMS code
N-National Institute of Standards and technology
O-No patch exists yet
G-Virtual Private Network
I-Detects suspicious activity
I-Worms spread on their own
N-Ransomware
G-Secure website traffic
N-Verifies Authenticity
O-Tricking users into sharing info
N-Verifies Data Integrity
O-Secures data by scrambling it
G-Tries all password combos
O-Social Security Number
I-Minimal access for tasks
B-Confidentiality, Integrity, Availability