Secure website traffic Equifax (2017) Tries all password combos Virtual Private Network Ransomware Reconnaissance No patch exists yet Minimal access for tasks Password + SMS code National Institute of Standards and technology Verifies Data Integrity Uses one key Verifies Authenticity Tricking people for data Hiding info in files Detects suspicious activity Network of infected devices Confidentiality, Integrity, Availability Blocks unauthorized access Tricking users into sharing info Secures data by scrambling it Use at least 8 characters Social Security Number Finds Security flaws Worms spread on their own Secure website traffic Equifax (2017) Tries all password combos Virtual Private Network Ransomware Reconnaissance No patch exists yet Minimal access for tasks Password + SMS code National Institute of Standards and technology Verifies Data Integrity Uses one key Verifies Authenticity Tricking people for data Hiding info in files Detects suspicious activity Network of infected devices Confidentiality, Integrity, Availability Blocks unauthorized access Tricking users into sharing info Secures data by scrambling it Use at least 8 characters Social Security Number Finds Security flaws Worms spread on their own
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Secure website traffic
B-Equifax (2017)
G-Tries all password combos
G-Virtual Private Network
N-Ransomware
B-Reconnaissance
O-No patch exists yet
I-Minimal access for tasks
B-Password + SMS code
N-National Institute of Standards and technology
N-Verifies Data Integrity
I-Uses one key
N-Verifies Authenticity
B-Tricking people for data
I-Hiding info in files
I-Detects suspicious activity
B-Network of infected devices
B-Confidentiality, Integrity, Availability
G-Blocks unauthorized access
O-Tricking users into sharing info
O-Secures data by scrambling it
O-Use at least 8 characters
O-Social Security Number
G-Finds Security flaws
I-Worms spread on their own