This website uses cookies to ensure you get the best experience on our website.
Privacy Policy
OK
Wisc-Online Arcade Logo
Toggle navigation
Learn
Games
Play Games
Build Games
Courses
Image Library
Search
User Profile
Sign Up
Sign In
Sign In
Sign Up
BIS General Bingo
|
See more in
Information Technology
Business Information System (General)
By
Seven Owls
Created Date 02.27.20
Last Updated 02.27.20
Viewed 6 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
Download text-based alternate version
Tweet
Vote Up
Vote Down
0
Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!
But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.
Download the Chakalaka mobile app here:
You need to be logged in to use this feature.
Log In
or
Register
Topics of this game:
Process of defining the security controls in order to protect the information assets
protecting information and information systems from unauthorized access, use, disclosure, disruption, etc
A weakness which allows an attacker to reduce a system information assurance
Anything that has the potential to cause serious harm to computer system
The potential loss, damage or destruction of an assets as a results of threat of exploiting a weaknesses
A mistake in software that allows access to information or capabilities that can be used by hacker
It’s a protection or defense from harm/ damage
Greatest threats to information security – They are closest to the organizational data
the legal and ethical collection and analysis of information of business competitors
the illegal and unethical collection and analysis of information of business competitors (spying)
Develops software scripts and codes to exploit a system
Use expert-written software to exploit a system
An attacker or formerly trusted insider stealing information from a computer system and demanding compensation
The most extreme version is cyber-terrorism
Illegal taking of another’s property physically
Illegal taking of another’s property electronically
Software that is designed to facilitate the propagation of pop-up advertisements on your screen
Clandestine software that becomes installed on your PC through duplicitous channels
Software that records your keystrokes and/or your password
Use a host comp to control user account
sending email to a user falsely claiming to be an legitimate enterprise
A dishonest scheme, a fraud
Other name for Pestware / Scumware
Flood, Fire, Earthquake, Hurricane
Non Malicious human security threat
Questions
Feedback
Ask a Question
New Question
Cancel
|
Save
Start a new Discussion
New Discussion
Cancel
|
Save