This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

S@S T3 Cybersecurity

Game to build knowledge of Cyber Security Policy and Risk Management

TomHuskerson
Created Date 05.10.22
Last Updated 05.10.22
Viewed 1 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit
0

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • What is the objective of this course?
  • What is the purpose of the E-Government Act of 2002?
  • What are the part of the CIA Triad?
  • What does NIST stand for?
  • What is Section 508?
  • Personally Identifiable Information (PII) is information that cannot be collected without the permission and signature of at least two family members for minor children.
  • When do you need an ATO?
  • Which of the following is NOT RMF step?
  • What is the system owner responsible for?
  • Which of these would NOT be considered part of the Authorization Boundary?

User comments are currently unavailable. We apologize for the inconvenience and are working to restore this feature as soon as possible.