I've Got Email - Security Awareness, Inc.

Download Report

Transcript I've Got Email - Security Awareness, Inc.

I’ve Got Email is an educational form of bingo that incorporates IT security related words and phrases. This is a good activity for a
security or IT department. Play it as a normal bingo game but when someone gets five in a row (or four corners, etc) they shout “I’ve
Got Email!” To add an additional educational affect to it, you might ask them to explain each of the terms in the winning row.
1) Print out this complete document.
2) Cut out the game cards and distribute.
3) Cut out the individual words to be randomly drawn.
4) Draw words and call them out as you would in bingo (ie: L - Firewall)
5) Have fun!!
* Although we have marked the game cards with a Security Awareness, Inc. copyright notice, you are free to replace our logo with your organization’s.
I’ve Got EMAIL
www.securityawareness.com
Sample Card - Not for Play
www.securityawareness.com
Security Awareness, Inc provides effective and affordable awareness
materials that are suitable for almost any type of organization. We take
care of the human component of security.
Are your users ruining your security efforts through bad habits and
practices? Awareness campaigns have been shown to educate user
populations as to their roles and responsibilities towards protecting
their organizations information and technology assets.
E
M
Virus
Budget
A
I
L
Design
Password
Alert
Solution
Monitor
Detection
Modules
Sniffer
Phishing
Firewall
Encryption
Web Site
Policies
Scaleable Process Interface
Standards Design
FREE
72
Risk
Upgrade
Check out our web site at www.securityawareness.com and see what
we can do to help your organization.
Awareness is the Key to Security
InformaThroughtion
Warfare Put
Copyright 2000 -2012- Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
Virus
Scaleable
M
A
I
L
Password
Alert
Interface
Solution
Monitor
FREE
Detection
Modules
Integration Design
Certification
Standards User ID
www.securityawareness.com
E
Service
M
Server
A
Risk
User ID
L
Interface Solution
Monitor
Technology
Budget
Phishing
Firewall
Exposure
Modules
Scaleable Reliability Encryption
1
I
FREE
2
Risk
Reliability
Authorization
Phishing
Firewall
Information
Warfare
Certification
Information
Warfare
Linux
Sniffer
Technology
Policies
Standards
Linux
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
Sniffer
AuthorizDetection
ation
Policies
Copyright 2000-2012- Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
A
Risk
Server
Information
Warfare
Upgrade
www.securityawareness.com
I
L
E
Halon
Technology
Filtering
Service
Remote
Sniffer
Detection
Modules
User ID
FREE
Phishing
Firewall
M
A
I
Encryption
Technology
Budget
Upgrade Reliability Packet
Phishing
Policies
Integrity
Exposure
Firewall
Protection
Good
Times
Denial Of
Service
Filtering
Linux
Theft
3
Standards Reliability
Service
Linux
Authorization
FREE
L
4
Protection
Budget
Risk
Remote
Encryption Exposure
Policies
Information
Warfare
Server
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
Sniffer
Halon
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
I
www.securityawareness.com
E
M
A
Service
Linux
Encryption
Technology
Budget
Escrow
Bud
Frogs
Upgrade
Bud
Frogs
Packet
DES
Policies
Owner
Remote
Integrity
Theft
FREE
Exposure
Good
Times
Upgrade
Theft
5
Escrow
Remote
Information
Warfare
Server
Token
Halon
L
Protection Knowledge
Denial Of
Service
Filtering
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
E
M
A
I
Halon
DES
Budget
Registry
Intrusion
Packet
FREE
L
Exposure Knowledge
6
Service
Log
Analysis
Attack
Protection
Good
Times
Integrity
Server
Token
Denial Of
Service
Filtering
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
www.securityawareness.com
E
M
A
I
L
E
M
A
Escrow
Log
Analysis
Attack
DES
Filtering
Owner
Remote
Packet
Registry
Intrusion
Owner
CE
Upgrade
Theft
FREE
Web Site Virtual
Root
Knowledge
Escrow
Theft
7
Infrastructure
Integrity
I
L
Attack
DES
CISSP
Token
Registry
Intrusion
Root
Algorithm
FREE
8
CE
Melissa
Protection
Good
Times
InfraLog
structure Analysis
Bud
Frogs
Token
Denial Of
Service
CISSP
Integrity
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
Bud
Frogs
Authentication
Business
Continuity
Melissa
Denial Of
Service
Good
Times
Knowledge
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
A
Web Site
Cipher
Owner
CE
Infrastructure
Virtual
Intranet
Bud
Frogs
Escrow
Log
Analysis
www.securityawareness.com
I
L
Attack
DES
Authentication
Registry
FREE
Business Algorithm
Continuity
9
Confident- Backup
iality
Melissa
Root
E
M
A
Toll
Fraud
Web Site
Cipher
Intrusion
Intranet
RSA
Accountability
Registry
CISSP
Availability
CE
FREE
Team
Algorithm
Backup
Intrusion
Confident- Business
iality
Continuity
L
Hacker
10
CISSP
Infrastructure
Log
Analysis
Authentication
Knowledge
Owner
Virtual
Melissa
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I
Root
Toll
Fraud
Copyright 2000 -2012- Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
A
Web Site
Cipher
Availability
Virtual
Accountability
Intranet
CE
FREE
I
www.securityawareness.com
E
M
A
Email
CERT
Advisory
Cipher
Confidentiality
VPN
Algorithm
VPN
CISSP
Intranet
RSA
Protocol
Business
Continuity
Hacker
Team
Algorithm
NDS
Access
FREE
Global
Single
Sign-on
Authen- Business
tication Continuity
L
11
I
12
L
Infra
structure
Access
Information
Backup
Hacker
Web Site
Trojan
Accountability
Backup
Toll
Fraud
NDS
RSA
Confidentiality
Root
Toll
Fraud
Availability
Virtual
Information
Team
Email
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
A
CERT
Advisory
Cipher
Intranet
NDS
I
L
E
M
A
Liability
VPN
Alert
Virus
Certification
Information
VPN
RSA
Protocol
Password
Hacker
Scaleable Access
Design
Team
Access
FREE
Global
Single
Sign-on
FREE
Password
Single
Sign-on
13
Virus
www.securityawareness.com
Trojan
Availability Integration
CERT
Integration
Advisory
I
14
L
Monitor
Alert
Accountability
Backup
Toll
Fraud
NDS
Trojan
Accountability
Solution
Email
Information
Team
Email
Availability
RSA
Liability
Global
Hacker
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
A
Virus
Certification
Interface
Scaleable Access
CERT
Integration
Advisory
NDS
I
www.securityawareness.com
L
E
M
VPN
Monitor
Virus
Certification
Design
Password
Modules
Scaleable Reliability
FREE
Global
Single
Sign-on
CERT
Integration
Advisory
15
Trojan
Protocol
Solution
Alert
Standards User ID
Liability
Detection
Email
Copyright 2000 -2012- Security Awareness, Inc - All Rights Reserved
A
I
Interface Phishing
Monitor
Design
Password
FREE
Global
Single
Sign-on
Alert
16
Trojan
Authorization
Solution
Standards User ID
Liability
Detection
Risk
L
Modules
Firewall
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
Virus
Certification
Scaleable Reliability
Service Integration
A
I
Interface Phishing
www.securityawareness.com
L
E
M
Alert
Information
Warfare
Certification
Password
Modules
Scaleable Reliability Authorization
FREE
Exposure
Monitor
Upgrade
Remote
Server
Sniffer
I
Interface Phishing
Design
17
Risk
A
FREE
Protection
L
Filtering
Modules
Technology Monitor
18
Solution
Standards User ID Encryption Detection
Budget
Firewall
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
Risk
Linux
Halon
Solution
Standards User ID Encryption Detection
Policies
Firewall
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
A
I
Information
Warfare
Linux
Packet
Phishing
Service
Reliability
Halon
Integrity
Theft
FREE
E
M
A
I
Policies
Information
Warfare
Linux
Melissa
Phishing
Filtering
Technology Modules
Escrow
Reliability
Attack
Protection
Policies
Good
Times
Upgrade
Bud
Frogs
FREE
Exposure Knowledge
Exposure
19
Risk
Server
Standards User ID
www.securityawareness.com
L
L
20
Sniffer
Denial of
Service
Budget
Risk
Server
Halon
Technology
Budget
Authorization
Detection
Firewall
Service
Remote
Packet
DES
Firewall
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
A
I
Information
Warfare
Linux
Confidentiality
Registry
Escrow
Log
Analysis
Attack
Upgrade
Bud
Frogs
FREE
Owner
Server
Service
Remote
www.securityawareness.com
L
E
M
A
I
Filtering
Integrity
Theft
Authentication
Denial of
Service
Filtering
Protection
Policies
Escrow
CE
Melissa
Protection
Good
Times
Exposure
Monitor
Upgrade
Bud
Frogs
FREE
Accountability
Root
Budget
Information
DES
CISSP
21
Authen- Technology
tication
Token
DES
Budget
Infrastructure
Server
Intrusion
Service
Remote
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
L
Exposure Knowledge
22
Copyright 2000 -2012- Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
A
I
Integrity
Theft
Confidentiality
Denial of
Service
Web Site
CE
Authentication
Upgrade
Log
Analysis
FREE
www.securityawareness.com
L
E
M
A
I
Filtering
Owner
Log
Analysis
Confidentiality
Registry
Intrusion
Protection
Good
Times
Web Site
Virtual
Authentication
Business
Continuity
Algorithm
Exposure
Intrusion
Availability
RSA
FREE
Team
Hacker
Algorithm
NDS
Access
Protocol
VPN
Email
Toll
Fraud
CERT
Advisory
Trojan
Information
Global
Single
Sign-on
23
Intranet
Virtual
Account- Business
ability
Continuity
Owner
Remote
Protocol
Backup
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
L
24
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
www.securityawareness.com
E
M
A
I
Infrastructure
Cipher
Encryption
Root
CISSP
Standards Access
Token
VPN
Email
Backup
Toll
Fraud
Scaleable
Certification
Halon
Solution
Monitor
Team
Hacker
Availability
RSA
FREE
Team
Hacker
Virus
Integration Authorization
L
E
M
A
I
L
Availability
RSA
Intranet
CE
Design
Password
Alert
NDS
User ID
Interface
Detection
Modules
CERT
Advisory
Trojan
Packet
Global
Single
Sign-on
CERT
Advisory
Trojan
Sniffer
Global
Single
Sign-on
FREE
25
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
26
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
A
E
M
Risk
Reliability
Authorization
Phishing
Firewall
Virus
Access
Attack
Password
Scaleable
Certification
Melissa
Solution
Monitor
Scaleable
Certification
Accountability
Solution
Monitor
Information
Warfare
Remote
FREE
Technology
Policies
Service
Server
FREE
DES
Filtering
Upgrade
Linux
Authentication
Protection
Filtering
Escrow
Remote
Information
Exposure
Budget
CERT
Advisory
Trojan
Confidentiality
Global
Single
Sign-on
Upgrade
Bud
Frogs
Sniffer
Protection Knowledge
27
I
www.securityawareness.com
L
A
I
L
Alert
28
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
I’ve Got EMAIL
I’ve Got EMAIL
www.securityawareness.com
E
M
Standards User ID
A
www.securityawareness.com
I
L
E
M
A
I
L
Encryption
Detection
Modules
Risk
Reliability
Design
Team
Hacker
Backup
Toll
Fraud
Integrity
Theft
Attack
Denial of
Service
Good
Times
Integrity
Theft
Interface
Escrow
Log
Analysis
FREE
DES
Knowledge
Web Site
Virtual
FREE
Owner
CE
Accountability
Registry
Intrusion
Intranet
Cipher
Authorization
Denial of
Service
Good
Times
Infrastructure
Bud
Frogs
Protocol
Root
CISSP
Availability
RSA
Packet
Phishing
Firewall
29
30
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
Business Algorithm
Continuity
Copyright 2000-2012 - Security Awareness, Inc - All Rights Reserved
Words to be randomly drawn
E
Virus
M
Integration
A
Design
I
Password
L
Alert
E
Scaleable
M
Certification
A
Interface
I
Solution
L
Monitor
E
Standards
M
User ID
A
Authorization
I
Detection
L
Modules
E
Risk
M
Reliability
A
Sniffer
I
Phishing
L
Firewall
E
Information
Warfare
M
Linux
A
Encryption
I
Technology
L
Policies
E
Service
M
Server
A
Halon
I
Exposure
L
Budget
E
Upgrade
M
Remote
A
Packet
I
Protection
L
Filtering
E
Integrity
M
Theft
A
Token
I
Denial Of
Service
L
Good
Times
E
Escrow
M
Bud
Frogs
A
Attack
I
DES
L
Knowledge
E
Owner
M Log Analysis
A
Melissa
I
Registry
L
Intrusion
E
Infra
structure
M
CE
A
Authentication
I
Root
L
CISSP
E
Web Site
M
Virtual
A
Confidentiality
I
Business
Continuity
L
Algorithm
E
Intranet
M
Cipher
A
Accountability
I
Backup
L
Toll
Fraud
E
Availability
M
RSA
A
Information
I
Team
L
Hacker
E
NDS
M
Access
A
Protocol
I
VPN
L
E-mail
E
CERT
Advisory
M
Trojan
Horse
A
Liability
I
Global
L
Single
Sign-on
E
Virus
Service
Web Site
Scaleable
Upgrade
Intranet
Standards
Integrity
Risk
Information
Warfare
M Integration
Server
Virtual
Certification
Remote
Availability
User ID
Escrow
NDS
Owner
CERT
Advisory
A
Design
Halon
Confidentiality
Cipher
Interface
Packet
Accountability
Theft
RSA
Authorization
Token
Information
Reliability
Bud
Frogs
Access
Sniffer
Attack
Protocol
Linux
Log Analysis
Encryption
Melissa
Liability
Infra
structure
Trojan
Horse
Authentication
CE
I
I’ve Got EMAIL
Password
Technology
DES
Backup
Solution
Exposure
Registry
Team
Detection
Protection
Root
Phishing
Denial Of
Service
Business
Continuity
from
www.securityawareness.com
Mark off words on this sheet as they are drawn.
Use to verify winning cards.
L
VPN
Global
Alert
Policies
Knowledge
Toll
Fraud
Monitor
Budget
Intrusion
Hacker
Modules
Filtering
CISSP
E-mail
Firewall
Good
Times
Algorithm
Single
Sign-on