AntivirusSecurityAwarenessTrainingMalwareAssetManagementDetectLeastPrivilegeTwo-FactorAuthenticationAdvancedPersistentThreatProtectSSLDecryptPhishingRiskAssessmentSecureEmailFirewallSpearPhishingRecoverDataDiscoveryTypesofHackersPassPhaseRespondSecurePasswordPatchManagementVPNIdentifyAntivirusSecurityAwarenessTrainingMalwareAssetManagementDetectLeastPrivilegeTwo-FactorAuthenticationAdvancedPersistentThreatProtectSSLDecryptPhishingRiskAssessmentSecureEmailFirewallSpearPhishingRecoverDataDiscoveryTypesofHackersPassPhaseRespondSecurePasswordPatchManagementVPNIdentify

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
I
3
G
4
N
5
O
6
O
7
O
8
N
9
G
10
B
11
I
12
I
13
N
14
B
15
I
16
O
17
O
18
B
19
B
20
G
21
I
22
G
23
B
24
G
  1. N-Antivirus
  2. I-Security Awareness Training
  3. G-Malware
  4. N-Asset Management
  5. O-Detect
  6. O-Least Privilege
  7. O-Two-Factor Authentication
  8. N-Advanced Persistent Threat
  9. G-Protect
  10. B-SSL Decrypt
  11. I-Phishing
  12. I-Risk Assessment
  13. N-Secure Email
  14. B-Firewall
  15. I-Spear Phishing
  16. O-Recover
  17. O-Data Discovery
  18. B-Types of Hackers
  19. B-PassPhase
  20. G-Respond
  21. I-Secure Password
  22. G-Patch Management
  23. B-VPN
  24. G-Identify