This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

BIS General Bingo

| See more in Information Technology

Business Information System (General)

SevenOwls
Created Date 02.27.20
Last Updated 02.27.20
Viewed 6 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • Process of defining the security controls in order to protect the information assets
  • protecting information and information systems from unauthorized access, use, disclosure, disruption, etc
  • A weakness which allows an attacker to reduce a system information assurance
  • Anything that has the potential to cause serious harm to computer system
  • The potential loss, damage or destruction of an assets as a results of threat of exploiting a weaknesses
  • A mistake in software that allows access to information or capabilities that can be used by hacker
  • It’s a protection or defense from harm/ damage
  • Greatest threats to information security – They are closest to the organizational data
  • the legal and ethical collection and analysis of information of business competitors
  • the illegal and unethical collection and analysis of information of business competitors (spying)
  • Develops software scripts and codes to exploit a system
  • Use expert-written software to exploit a system
  • An attacker or formerly trusted insider stealing information from a computer system and demanding compensation
  • The most extreme version is cyber-terrorism
  • Illegal taking of another’s property physically
  • Illegal taking of another’s property electronically
  • Software that is designed to facilitate the propagation of pop-up advertisements on your screen
  • Clandestine software that becomes installed on your PC through duplicitous channels
  • Software that records your keystrokes and/or your password
  • Use a host comp to control user account
  • sending email to a user falsely claiming to be an legitimate enterprise
  • A dishonest scheme, a fraud
  • Other name for Pestware / Scumware
  • Flood, Fire, Earthquake, Hurricane
  • Non Malicious human security threat