Uses one key Virtual Private Network Tricking people for data Secures data by scrambling it Detects suspicious activity Use at least 8 characters Secure website traffic No patch exists yet National Institute of Standards and technology Confidentiality, Integrity, Availability Finds Security flaws Password + SMS code Hiding info in files Reconnaissance Tricking users into sharing info Social Security Number Tries all password combos Ransomware Blocks unauthorized access Verifies Authenticity Equifax (2017) Verifies Data Integrity Network of infected devices Worms spread on their own Minimal access for tasks Uses one key Virtual Private Network Tricking people for data Secures data by scrambling it Detects suspicious activity Use at least 8 characters Secure website traffic No patch exists yet National Institute of Standards and technology Confidentiality, Integrity, Availability Finds Security flaws Password + SMS code Hiding info in files Reconnaissance Tricking users into sharing info Social Security Number Tries all password combos Ransomware Blocks unauthorized access Verifies Authenticity Equifax (2017) Verifies Data Integrity Network of infected devices Worms spread on their own Minimal access for tasks
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Uses one key
G-Virtual Private Network
B-Tricking people for data
O-Secures data by scrambling it
I-Detects suspicious activity
O-Use at least 8 characters
G-Secure website traffic
O-No patch exists yet
N-National Institute of Standards and technology
B-Confidentiality, Integrity, Availability
G-Finds Security flaws
B-Password + SMS code
I-Hiding info in files
B-Reconnaissance
O-Tricking users into sharing info
O-Social Security Number
G-Tries all password combos
N-Ransomware
G-Blocks unauthorized access
N-Verifies Authenticity
B-Equifax (2017)
N-Verifies Data Integrity
B-Network of infected devices
I-Worms spread on their own
I-Minimal access for tasks