This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

BIS General Bingo

| See more in Information Technology

Business Information System (General)

Created Date 02.27.20
Last Updated 02.27.20
Viewed 3 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Would you like to build your own game?

It's easy!

Go to the GameBuilder and get started!

Topics of this game:
  • Process of defining the security controls in order to protect the information assets
  • protecting information and information systems from unauthorized access, use, disclosure, disruption, etc
  • A weakness which allows an attacker to reduce a system information assurance
  • Anything that has the potential to cause serious harm to computer system
  • The potential loss, damage or destruction of an assets as a results of threat of exploiting a weaknesses
  • A mistake in software that allows access to information or capabilities that can be used by hacker
  • It’s a protection or defense from harm/ damage
  • Greatest threats to information security – They are closest to the organizational data
  • the legal and ethical collection and analysis of information of business competitors
  • the illegal and unethical collection and analysis of information of business competitors (spying)
  • Develops software scripts and codes to exploit a system
  • Use expert-written software to exploit a system
  • An attacker or formerly trusted insider stealing information from a computer system and demanding compensation
  • The most extreme version is cyber-terrorism
  • Illegal taking of another’s property physically
  • Illegal taking of another’s property electronically
  • Software that is designed to facilitate the propagation of pop-up advertisements on your screen
  • Clandestine software that becomes installed on your PC through duplicitous channels
  • Software that records your keystrokes and/or your password
  • Use a host comp to control user account
  • sending email to a user falsely claiming to be an legitimate enterprise
  • A dishonest scheme, a fraud
  • Other name for Pestware / Scumware
  • Flood, Fire, Earthquake, Hurricane
  • Non Malicious human security threat