Secure website traffic Tries all password combos Verifies Authenticity Secures data by scrambling it Uses one key Detects suspicious activity Tricking users into sharing info Equifax (2017) Password + SMS code Tricking people for data Social Security Number Virtual Private Network National Institute of Standards and technology Minimal access for tasks Verifies Data Integrity Confidentiality, Integrity, Availability No patch exists yet Finds Security flaws Network of infected devices Blocks unauthorized access Worms spread on their own Hiding info in files Reconnaissance Ransomware Use at least 8 characters Secure website traffic Tries all password combos Verifies Authenticity Secures data by scrambling it Uses one key Detects suspicious activity Tricking users into sharing info Equifax (2017) Password + SMS code Tricking people for data Social Security Number Virtual Private Network National Institute of Standards and technology Minimal access for tasks Verifies Data Integrity Confidentiality, Integrity, Availability No patch exists yet Finds Security flaws Network of infected devices Blocks unauthorized access Worms spread on their own Hiding info in files Reconnaissance Ransomware Use at least 8 characters
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Secure website traffic
G-Tries all password combos
N-Verifies Authenticity
O-Secures data by scrambling it
I-Uses one key
I-Detects suspicious activity
O-Tricking users into sharing info
B-Equifax (2017)
B-Password + SMS code
B-Tricking people for data
O-Social Security Number
G-Virtual Private Network
N-National Institute of Standards and technology
I-Minimal access for tasks
N-Verifies Data Integrity
B-Confidentiality, Integrity, Availability
O-No patch exists yet
G-Finds Security flaws
B-Network of infected devices
G-Blocks unauthorized access
I-Worms spread on their own
I-Hiding info in files
B-Reconnaissance
N-Ransomware
O-Use at least 8 characters