Icon New game New game
Get Academic Plan
Get Academic Plan
Get Academic Plan

User Security

Alphabet

Guess the word based on the letter it starts with

Download the paper version to play

Recommended age: 21 years old
51 times made

Created by

Malaysia

Top 10 results

  1. 1
    04:41
    time
    100
    score
  2. 2
    Dar
    Dar
    02:56
    time
    80
    score
Do you want to stay in the Top 10 of this game? to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

User SecurityOnline version

Guess the word based on the letter it starts with

by Aidora Abdullah
A
B
C
D
E
F
H
I
L
M
P
R
S
T
U
V
W
Z

Starts with A

A security technique that regulates who or what can view or use resources in a computing environment (note: 2 words)

Starts with B

The physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data.

Starts with C

The need to ensure that information is disclosed only to those who are authorized to view it (also part of the CIA triad).

Starts with D

What most individuals and organizations would want to protect the most; especially if it's considered private and confidential.

Starts with E

Cryptographic transformation of data (called "plaintext") into a form (called "cipher text") that conceals the data's original meaning to prevent it from being known or used.

Starts with F

The most common part of the human body used in biometrics identification

Starts with H

The most common permanent storage medium within a personal computer used for backup. (note: 2 words)

Starts with I

An adverse network event in an information system or network or the threat of the occurrence of such an event.

Starts with L

The recommended _________________ of a password is not less than 8 characters.

Starts with M

Short for malicious software.

Starts with P

a high-level document that defines the organization's vision concerning security, goals, needs, scope, and responsibilities.

Starts with R

A type of malware that is a form of extortion and usually targeted towards users' mobile devices.

Starts with S

A ________________ is an electronic badge that includes a magnetic strip or chip that can record and replay a set key. Smurf

Starts with T

A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.

Starts with U

The short name, usually meaningful in some way, associated with a particular computer user.

Starts with V

A flaw or weakness that can be used to attack a system or organization

Starts with W

A type of malware commonly spread through email systems due to a user's mistake in clicking on attachments that are unsafe.

Starts with Z

A computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse.

educaplay suscripción