FirewallPassPhaseRiskAssessmentRespondAntivirusAdvancedPersistentThreatSSLDecryptDataDiscoveryLeastPrivilegeTwo-FactorAuthenticationPatchManagementSpearPhishingProtectSecurePasswordMalwareAssetManagementIdentifyVPNPhishingRecoverTypesofHackersSecurityAwarenessTrainingSecureEmailDetectFirewallPassPhaseRiskAssessmentRespondAntivirusAdvancedPersistentThreatSSLDecryptDataDiscoveryLeastPrivilegeTwo-FactorAuthenticationPatchManagementSpearPhishingProtectSecurePasswordMalwareAssetManagementIdentifyVPNPhishingRecoverTypesofHackersSecurityAwarenessTrainingSecureEmailDetect

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
B
3
I
4
G
5
N
6
N
7
B
8
O
9
O
10
O
11
G
12
I
13
G
14
I
15
G
16
N
17
G
18
B
19
I
20
O
21
B
22
I
23
N
24
O
  1. B-Firewall
  2. B-PassPhase
  3. I-Risk Assessment
  4. G-Respond
  5. N-Antivirus
  6. N-Advanced Persistent Threat
  7. B-SSL Decrypt
  8. O-Data Discovery
  9. O-Least Privilege
  10. O-Two-Factor Authentication
  11. G-Patch Management
  12. I-Spear Phishing
  13. G-Protect
  14. I-Secure Password
  15. G-Malware
  16. N-Asset Management
  17. G-Identify
  18. B-VPN
  19. I-Phishing
  20. O-Recover
  21. B-Types of Hackers
  22. I-Security Awareness Training
  23. N-Secure Email
  24. O-Detect