PatchManagementSecureEmailVPNAdvancedPersistentThreatTwo-FactorAuthenticationDataDiscoveryPhishingDetectRiskAssessmentRecoverLeastPrivilegeProtectAntivirusMalwareTypesofHackersPassPhaseRespondAssetManagementSecurePasswordSecurityAwarenessTrainingSSLDecryptIdentifyFirewallSpearPhishingPatchManagementSecureEmailVPNAdvancedPersistentThreatTwo-FactorAuthenticationDataDiscoveryPhishingDetectRiskAssessmentRecoverLeastPrivilegeProtectAntivirusMalwareTypesofHackersPassPhaseRespondAssetManagementSecurePasswordSecurityAwarenessTrainingSSLDecryptIdentifyFirewallSpearPhishing

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
N
3
B
4
N
5
O
6
O
7
I
8
O
9
I
10
O
11
O
12
G
13
N
14
G
15
B
16
B
17
G
18
N
19
I
20
I
21
B
22
G
23
B
24
I
  1. G-Patch Management
  2. N-Secure Email
  3. B-VPN
  4. N-Advanced Persistent Threat
  5. O-Two-Factor Authentication
  6. O-Data Discovery
  7. I-Phishing
  8. O-Detect
  9. I-Risk Assessment
  10. O-Recover
  11. O-Least Privilege
  12. G-Protect
  13. N-Antivirus
  14. G-Malware
  15. B-Types of Hackers
  16. B-PassPhase
  17. G-Respond
  18. N-Asset Management
  19. I-Secure Password
  20. I-Security Awareness Training
  21. B-SSL Decrypt
  22. G-Identify
  23. B-Firewall
  24. I-Spear Phishing