Phone call General Data Protection Regulation Share email Eaves Dropping Company website Social Engineering Protect personal identifiable information Counter mearures Masquerading Shoulder Surfing Incinerating (burn) Piggy Backing Demand Proof Mantrap Password Impersonating Phishing Do not click on links in emails Protected Health Information Spoofed Dumpster Diving Shredding Whaling Suspicious emails Phone call General Data Protection Regulation Share email Eaves Dropping Company website Social Engineering Protect personal identifiable information Counter mearures Masquerading Shoulder Surfing Incinerating (burn) Piggy Backing Demand Proof Mantrap Password Impersonating Phishing Do not click on links in emails Protected Health Information Spoofed Dumpster Diving Shredding Whaling Suspicious emails
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
N-Phone call
N-General Data Protection Regulation
O-Share email
B-Eaves
Dropping
N-Company website
O-Social Engineering
O-Protect personal identifiable information
O-Counter
mearures
I-Masquerading
B-Shoulder Surfing
G-Incinerating (burn)
I-Piggy Backing
G-Demand Proof
B-Mantrap
B-Password
O-Impersonating
I-Phishing
G-Do not click on links in emails
N-Protected Health Information
I-Spoofed
B-Dumpster Diving
G-Shredding
I-Whaling
G-Suspicious emails