Eaves Dropping Impersonating Suspicious emails Mantrap Shredding Shoulder Surfing Company website Masquerading General Data Protection Regulation Password Whaling Spoofed Incinerating (burn) Counter mearures Dumpster Diving Protect personal identifiable information Demand Proof Phishing Do not click on links in emails Share email Protected Health Information Phone call Piggy Backing Social Engineering Eaves Dropping Impersonating Suspicious emails Mantrap Shredding Shoulder Surfing Company website Masquerading General Data Protection Regulation Password Whaling Spoofed Incinerating (burn) Counter mearures Dumpster Diving Protect personal identifiable information Demand Proof Phishing Do not click on links in emails Share email Protected Health Information Phone call Piggy Backing Social Engineering
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
B-Eaves
Dropping
O-Impersonating
G-Suspicious emails
B-Mantrap
G-Shredding
B-Shoulder Surfing
N-Company website
I-Masquerading
N-General Data Protection Regulation
B-Password
I-Whaling
I-Spoofed
G-Incinerating (burn)
O-Counter
mearures
B-Dumpster Diving
O-Protect personal identifiable information
G-Demand Proof
I-Phishing
G-Do not click on links in emails
O-Share email
N-Protected Health Information
N-Phone call
I-Piggy Backing
O-Social Engineering