VPNSecureEmailRecoverSpearPhishingMalwareIdentifyDataDiscoveryTwo-FactorAuthenticationTypesofHackersPhishingLeastPrivilegeSecurePasswordSSLDecryptProtectAdvancedPersistentThreatRespondDetectAssetManagementSecurityAwarenessTrainingFirewallAntivirusPassPhasePatchManagementRiskAssessmentVPNSecureEmailRecoverSpearPhishingMalwareIdentifyDataDiscoveryTwo-FactorAuthenticationTypesofHackersPhishingLeastPrivilegeSecurePasswordSSLDecryptProtectAdvancedPersistentThreatRespondDetectAssetManagementSecurityAwarenessTrainingFirewallAntivirusPassPhasePatchManagementRiskAssessment

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
N
3
O
4
I
5
G
6
G
7
O
8
O
9
B
10
I
11
O
12
I
13
B
14
G
15
N
16
G
17
O
18
N
19
I
20
B
21
N
22
B
23
G
24
I
  1. B-VPN
  2. N-Secure Email
  3. O-Recover
  4. I-Spear Phishing
  5. G-Malware
  6. G-Identify
  7. O-Data Discovery
  8. O-Two-Factor Authentication
  9. B-Types of Hackers
  10. I-Phishing
  11. O-Least Privilege
  12. I-Secure Password
  13. B-SSL Decrypt
  14. G-Protect
  15. N-Advanced Persistent Threat
  16. G-Respond
  17. O-Detect
  18. N-Asset Management
  19. I-Security Awareness Training
  20. B-Firewall
  21. N-Antivirus
  22. B-PassPhase
  23. G-Patch Management
  24. I-Risk Assessment