EavesDroppingImpersonatingSuspiciousemailsMantrapShreddingShoulderSurfingCompanywebsiteMasqueradingGeneralDataProtectionRegulationPasswordWhalingSpoofedIncinerating(burn)CountermearuresDumpsterDivingProtectpersonalidentifiableinformationDemandProofPhishingDo notclick onlinks inemailsShareemailProtectedHealthInformationPhonecallPiggyBackingSocialEngineeringEavesDroppingImpersonatingSuspiciousemailsMantrapShreddingShoulderSurfingCompanywebsiteMasqueradingGeneralDataProtectionRegulationPasswordWhalingSpoofedIncinerating(burn)CountermearuresDumpsterDivingProtectpersonalidentifiableinformationDemandProofPhishingDo notclick onlinks inemailsShareemailProtectedHealthInformationPhonecallPiggyBackingSocialEngineering

Social Engineering - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
O
3
G
4
B
5
G
6
B
7
N
8
I
9
N
10
B
11
I
12
I
13
G
14
O
15
B
16
O
17
G
18
I
19
G
20
O
21
N
22
N
23
I
24
O
  1. B-Eaves Dropping
  2. O-Impersonating
  3. G-Suspicious emails
  4. B-Mantrap
  5. G-Shredding
  6. B-Shoulder Surfing
  7. N-Company website
  8. I-Masquerading
  9. N-General Data Protection Regulation
  10. B-Password
  11. I-Whaling
  12. I-Spoofed
  13. G-Incinerating (burn)
  14. O-Counter mearures
  15. B-Dumpster Diving
  16. O-Protect personal identifiable information
  17. G-Demand Proof
  18. I-Phishing
  19. G-Do not click on links in emails
  20. O-Share email
  21. N-Protected Health Information
  22. N-Phone call
  23. I-Piggy Backing
  24. O-Social Engineering