RiskAssessmentIdentifySecurityAwarenessTrainingLeastPrivilegeRecoverAdvancedPersistentThreatSSLDecryptAntivirusDataDiscoverySecureEmailRespondSecurePasswordPhishingVPNPassPhaseDetectSpearPhishingProtectFirewallMalwareTypesofHackersAssetManagementTwo-FactorAuthenticationPatchManagementRiskAssessmentIdentifySecurityAwarenessTrainingLeastPrivilegeRecoverAdvancedPersistentThreatSSLDecryptAntivirusDataDiscoverySecureEmailRespondSecurePasswordPhishingVPNPassPhaseDetectSpearPhishingProtectFirewallMalwareTypesofHackersAssetManagementTwo-FactorAuthenticationPatchManagement

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
G
3
I
4
O
5
O
6
N
7
B
8
N
9
O
10
N
11
G
12
I
13
I
14
B
15
B
16
O
17
I
18
G
19
B
20
G
21
B
22
N
23
O
24
G
  1. I-Risk Assessment
  2. G-Identify
  3. I-Security Awareness Training
  4. O-Least Privilege
  5. O-Recover
  6. N-Advanced Persistent Threat
  7. B-SSL Decrypt
  8. N-Antivirus
  9. O-Data Discovery
  10. N-Secure Email
  11. G-Respond
  12. I-Secure Password
  13. I-Phishing
  14. B-VPN
  15. B-PassPhase
  16. O-Detect
  17. I-Spear Phishing
  18. G-Protect
  19. B-Firewall
  20. G-Malware
  21. B-Types of Hackers
  22. N-Asset Management
  23. O-Two-Factor Authentication
  24. G-Patch Management