Presentation is loading. Please wait.

Presentation is loading. Please wait.

E M A I L Password Web Site Policies Alert Budget VirusPrivacy Archi- tecture RouterProcessInterface Informa- tion Warfare Detection Sniffer Encryp- tion.

Similar presentations


Presentation on theme: "E M A I L Password Web Site Policies Alert Budget VirusPrivacy Archi- tecture RouterProcessInterface Informa- tion Warfare Detection Sniffer Encryp- tion."— Presentation transcript:

1 E M A I L Password Web Site Policies Alert Budget VirusPrivacy Archi- tecture RouterProcessInterface Informa- tion Warfare Detection Sniffer Encryp- tion Monitor Upgrade Privacy Firewall Standards Solution Risk Modules Through- Put Sample Card - Not for Play 72 Copyright Security Awareness, Inc - All Rights Reserved I’ve Got FREE I’ve Got is an educational form of bingo that incorporates IT security related words and phrases. This is a good activity for a security or IT department. Play it as a normal bingo game but when someone gets five in a row (or four corners, etc) they shout “I’ve Got !” To add an additional educational affect to it, you might ask them to explain each of the terms in the winning row. 1) Print out this complete document. 2) Cut out the game cards and distribute. 3) Cut out the individual words to be randomly drawn. 4) Draw words and call them out as you would in bingo (ie: L - Firewall) 5) Have fun!! * Although we have marked the game cards with a Security Awareness, Inc. logo and copyright notice, you are free to replace our logo with your organization’s. However, please retain the copyright notice. Thank you. Security Awareness, Inc provides effective and affordable awareness materials that are suitable for almost any type of organization. We take care of the human component of security. Are your users ruining your security efforts through bad habits and practices? Awareness campaigns have been shown to educate user populations as to their roles and responsibilities towards protecting their organizations information and technology assets. Check out our web site at and see what we can do to help your organization. Awareness is the Key to Security Copyright Security Awareness, Inc - All Rights Reserved

2 I’ve Got 12 Router Virus Standards Risk Infor- mation Warfare Phishing Certifi- cation Linux Reliability User ID Privacy Interface Authoriz- ation Sniffer Tech- nology Solution Architecture Detection Password Policies Modules Firewall Alert Monitor Router Service Standards Risk Infor- mation Warfare Server Certifi- cation Linux Reliability User ID Encryption Interface Authoriz- ation Sniffer Solution Architecture Detection Tech- nology Policies Modules Firewall Monitor Budget Exposure Copyright Security Awareness, Inc - All Rights Reserved E M A I L I’ve Got FREE

3 34 Service Upgrade Standards Risk Infor- mation Warfare Linux Reliability User ID Server Remote Authoriz- ation Sniffer Encryption Halon Tech- nology Architecture Detection Exposure Protection Budget Policies Modules Filtering Firewall Service Server Upgrade Encryption Theft Remote Linux Integrity Reliability Risk Packet Halon Sniffer Infor- mation Warfare Tech- nology Architecture Exposure Protection Denial Of Service Budget Policies Filtering Firewall Good Times Copyright Security Awareness, Inc - All Rights Reserved E M A I L I’ve Got FREE

4 56 Service Server UpgradeTheft Remote Integrity Packet Halon Exposure Protection Denial Of Service Budget Filtering Good Times Service Server Upgrade Encryption Theft Remote Linux Integrity Packet Halon Infor- mation Warfare Tech- nology Exposure Protection Denial Of Service Budget Policies Filtering Knowledge Owner Escrow Bud Frogs Bud Frogs Log Analysis Token Attack DES RegistryDES Knowledge Intrusion Good Times Copyright Security Awareness, Inc - All Rights Reserved E M A I L I’ve Got FREE

5 78 UpgradeTheft Remote Integrity Packet Protection Denial Of Service Filtering Good Times Owner Escrow Bud Frogs Log Analysis Token AttackDES Registry Knowledge Intrusion Infra- structure Algorithm CE CISSP Web SiteVirtual Authen- tication Root Business Continuity Melissa Theft Integrity Denial Of Service Good Times Owner Escrow Bud Frogs Log Analysis Token AttackDES Registry Knowledge Intrusion Infra- structure CE CISSP Root Melissa Copyright Security Awareness, Inc - All Rights Reserved E M A I L I’ve Got FREE

6 910 Algorithm Web Site Virtual Authen- tication Business Continuity Owner Escrow Bud Frogs Log Analysis AttackDES Registry Knowledge Intrusion Infra- structure CE CISSP RootMelissa Algorithm Web Site Virtual Authen- tication Business Continuity Owner Log Analysis Registry Intrusion Infra- structure CE CISSP RootMelissa Team Backup Intranet HackerCipher Confident- iality Availability RSA Account- ability Toll Fraud Toll Fraud Backup Confident- iality Cipher Intranet Copyright Security Awareness, Inc - All Rights Reserved E M A I L I’ve Got FREE

7 1112 Algorithm Web Site Virtual Business Continuity Team Backup IntranetHacker Cipher Confident- iality Availability RSA Account- ability Toll Fraud Algorithm Web Site Virtual Authen- tication Business Continuity Infra structure CE CISSP Root Team Backup Intranet Hacker Cipher Confident- iality Availability RSA Account- ability Toll Fraud Single Sign-on Global Inform- ation Access VPN CERT Advisory NDS Protocol Trojan NDS Access Inform- ation VPN Copyright Security Awareness, Inc - All Rights Reserved E M A I L I’ve Got FREE

8 13 Alert Virus Phishing Password Team Backup IntranetHacker CipherLiability Availability RSA Account- ability Toll Fraud Single Sign-on Global Inform- ation Access VPN CERT Advisory Protocol Trojan NDS Copyright Security Awareness, Inc - All Rights Reserved 14 Alert Virus Phishing Password Team Solution Router Hacker Certifi- cation LiabilityAvailabilityRSA Account- ability Monitor Single Sign-on Global Inform- ation Access VPN CERT Advisory Privacy Trojan NDS Copyright Security Awareness, Inc - All Rights Reserved E M A I L I’ve Got FREE

9 15 Monitor Virus Phishing Password Detection Solution RouterModules Certifi- cation LiabilityStandardsUser ID ProtocolAlert Single Sign-on Global Interface Access VPN CERT Advisory Privacy TrojanNDS Copyright Security Awareness, Inc - All Rights Reserved 16 Monitor Virus Phishing Password Detection Solution RouterModules Certifi- cation LiabilityStandardsUser ID Alert Single Sign-on Global Interface Reliability Archi- tecture Firewall CERT Advisory Privacy TrojanRisk Copyright Security Awareness, Inc - All Rights Reserved Author- ization E M A I L I’ve Got FREE

10 17 Alert Virus Phishing Password Detection Solution RouterModules Certifi- cation EncryptionStandardsUser ID Budget MonitorExposure Interface Reliability Archi- tecture Firewall Service Privacy Server Risk Copyright Security Awareness, Inc - All Rights Reserved Sniffer 18 Filtering Infor- mation Warfare Remote Protection Detection Solution RouterModules Certifi- cation EncryptionStandardsUser ID Policies MonitorTechnology Interface Reliability Archi- tecture Firewall Upgrade Authori- zation Linux Risk Copyright Security Awareness, Inc - All Rights Reserved Halon E M A I L I’ve Got FREE

11 20 Filtering Bud Frogs Protection DES Technology EscrowPolicies PacketServiceRemote Budget KnowledgeExposure Melissa Reliability Archi- tecture Firewall Upgrade Attack Server Risk Copyright Security Awareness, Inc - All Rights Reserved Halon 19 Policies Theft Technology Detection Denial of Service Modules Authori- zation Standards User ID Budget Good Times Exposure Packet Reliability Archi- tecture Firewall Integrity Halon Server Risk Copyright Security Awareness, Inc - All Rights Reserved Sniffer Infor- mation Warfare Infor- mation Warfare Service Linux E M A I L I’ve Got FREE Linux

12 22 Filtering Bud Frogs Protection DES Root Escrow Good Times Inform- ation ServiceRemote Budget KnowledgeExposure MelissaCE Denial of Service CISSP Upgrade Server Infra- structure Copyright Security Awareness, Inc - All Rights Reserved Account- ability Integrity E M A I L I’ve Got FREE Theft 21 Filtering Bud Frogs Protection DES Technology EscrowPolicies TokenServiceRemote Budget MonitorExposure Confiden- tiality Log Analysis Registry Intrusion Upgrade Attack Server Owner Copyright Security Awareness, Inc - All Rights Reserved Authen- tication Infor- mation Warfare E M A I L I’ve Got FREE Linux Authen- tication

13 24 Intrusion RSA Business Continuity Global VPN Web SiteAlgorithm Inform- ation CERT Advisory Trojan HackerTeam Confid- entiality Virtual Registry Single Sign-on Avail- ability Access NDS Copyright Security Awareness, Inc - All Rights Reserved Protocol Owner E M A I L I’ve Got FREE Authen- tication 23 Filtering Log Analysis Protection Backup Business Continuity Web Site Good Times ProtocolOwnerRemote Algorithm IntrusionExposure Confid- entiality CE Denial of Service Toll Fraud Upgrade VirtualIntranet Copyright Security Awareness, Inc - All Rights Reserved Account- ability Integrity E M A I L I’ve Got FREE Theft Authen- tication Log Analysis

14 25 CISSP RSA Backup Global Password VirusToll Fraud Packet CERT Advisory Trojan Alert HackerTeam Encryption Phishing Root Single Sign-on Avail- ability CE Intranet Copyright Security Awareness, Inc - All Rights Reserved Privacy Infra- structure E M A I L I’ve Got FREE Author- ization Cipher 26 RSA Solution Global Detection RouterMonitor Sniffer CERT Advisory Trojan Modules HackerTeam Token Certifi- cation VPN Single Sign-on Avail- ability User ID NDS Copyright Security Awareness, Inc - All Rights Reserved Interface Standards E M A I L I’ve Got FREE Halon Access

15 28 Alert Server Solution Protection Exposure RouterMonitor SnifferUpgrade Bud Frogs Budget FilteringDES Attack Certifi- cation Password Knowledge Service Remote Escrow Copyright Security Awareness, Inc - All Rights Reserved Inform- ation Virus E M A I L I’ve Got FREE Account- ability Access 27 Firewall Remote Solution Global Protection RouterMonitor Confiden- tiality CERT Advisory Trojan Filtering Policies Tech- nology Author- ization Certifi- cation Architec- ture Single Sign-on Infor- mation Warfare Linux Upgrade Copyright Security Awareness, Inc - All Rights Reserved Authen- tication Risk E M A I L I’ve Got FREE Melissa Reliability

16 30 Virtual Backup Archi- tecture Denial of Service Integrity Packet Avail- ability RSA Business Continuity Privacy Theft Team Web Site Cipher Intranet Copyright Security Awareness, Inc - All Rights Reserved Author- ization Risk E M A I L I’ve Got FREE Interface Reliability 29 Hacker Log Analysis Denial of Service Root Registry Integrity Toll Fraud Protocol Infra- structure Bud Frogs Good Times AlgorithmDES Encryp- tion Theft Detection Firewall Escrow CE Owner Copyright Security Awareness, Inc - All Rights Reserved Account- ability Standards E M A I L I’ve Got FREE Attack User IDModules Good Times Knowledge Intrusion CISSP

17 Authen- tication Tech- nology Budget Infra structure Router Know- ledge Team Virus Service Phishing Server Privacy Interface Upgrade Intrusion Backup Single Sign-on Encryption Theft Policies Standards Global DES Algorithm CE Inform- ation CISSP Modules Solution Web SiteVirtual Intranet Certification Filtering Firewall Denial Of Service Hacker Architecture Access Exposure Remote Token VPN Alert Liability Cipher Detection Protection Linux Password Integrity Confidentiality Availability ReliabilityRisk RSA Accountability User ID CERT Advisory NDS Information Warfare Owner Authorization Packet Halon Escrow Log AnalysisRegistry Root Protocol Sniffer Bud Frogs Good Times Trojan Horse Toll Fraud Business Continuity Monitor Attack Melissa LAI Words to be randomly drawn EM LAIEM LAIEM LAIEM LAIEM LAIEM LAIEM LAIEM LAIEM LAIEM LAIEM LAIEM LAIEM LAIEM LAIEM LAIEM

18 Tech- nology Budget Infra structure Router Know- ledge Team Virus Service PhishingServer Privacy InterfaceUpgrade Intrusion Backup Single Sign-on Encryption Theft Policies Standards Global DES Algorithm CE Inform- ation CISSPModules Solution Web SiteVirtual Intranet Certification Filtering Firewall Denial Of Service Hacker Architecture Authen- tication Access Exposure Remote Token VPN Alert Liability Cipher DetectionProtection Linux Password Integrity Confidentiality Availability Reliability Risk RSA Accountability User ID CERT Advisory NDS Information Warfare Owner Authorization Packet Halon Escrow Log Analysis Registry Root Protocol Sniffer Bud Frogs Good Times Trojan Horse Toll Fraud Business Continuity Monitor EMA I L Attack Melissa Mark off words on this sheet as they are drawn. Use to verify winning cards. I’ve Got from Copyright Security Awareness, Inc - All Rights Reserved


Download ppt "E M A I L Password Web Site Policies Alert Budget VirusPrivacy Archi- tecture RouterProcessInterface Informa- tion Warfare Detection Sniffer Encryp- tion."

Similar presentations


Ads by Google