PhonecallGeneralDataProtectionRegulationShareemailEavesDroppingCompanywebsiteSocialEngineeringProtectpersonalidentifiableinformationCountermearuresMasqueradingShoulderSurfingIncinerating(burn)PiggyBackingDemandProofMantrapPasswordImpersonatingPhishingDo notclick onlinks inemailsProtectedHealthInformationSpoofedDumpsterDivingShreddingWhalingSuspiciousemailsPhonecallGeneralDataProtectionRegulationShareemailEavesDroppingCompanywebsiteSocialEngineeringProtectpersonalidentifiableinformationCountermearuresMasqueradingShoulderSurfingIncinerating(burn)PiggyBackingDemandProofMantrapPasswordImpersonatingPhishingDo notclick onlinks inemailsProtectedHealthInformationSpoofedDumpsterDivingShreddingWhalingSuspiciousemails

Social Engineering - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
N
3
O
4
B
5
N
6
O
7
O
8
O
9
I
10
B
11
G
12
I
13
G
14
B
15
B
16
O
17
I
18
G
19
N
20
I
21
B
22
G
23
I
24
G
  1. N-Phone call
  2. N-General Data Protection Regulation
  3. O-Share email
  4. B-Eaves Dropping
  5. N-Company website
  6. O-Social Engineering
  7. O-Protect personal identifiable information
  8. O-Counter mearures
  9. I-Masquerading
  10. B-Shoulder Surfing
  11. G-Incinerating (burn)
  12. I-Piggy Backing
  13. G-Demand Proof
  14. B-Mantrap
  15. B-Password
  16. O-Impersonating
  17. I-Phishing
  18. G-Do not click on links in emails
  19. N-Protected Health Information
  20. I-Spoofed
  21. B-Dumpster Diving
  22. G-Shredding
  23. I-Whaling
  24. G-Suspicious emails