SecureEmailProtectFirewallMalwareTwo-FactorAuthenticationRiskAssessmentSSLDecryptIdentifySpearPhishingSecurityAwarenessTrainingVPNSecurePasswordPhishingAdvancedPersistentThreatLeastPrivilegeRecoverAntivirusDetectDataDiscoveryAssetManagementTypesofHackersRespondPassPhasePatchManagementSecureEmailProtectFirewallMalwareTwo-FactorAuthenticationRiskAssessmentSSLDecryptIdentifySpearPhishingSecurityAwarenessTrainingVPNSecurePasswordPhishingAdvancedPersistentThreatLeastPrivilegeRecoverAntivirusDetectDataDiscoveryAssetManagementTypesofHackersRespondPassPhasePatchManagement

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
G
3
B
4
G
5
O
6
I
7
B
8
G
9
I
10
I
11
B
12
I
13
I
14
N
15
O
16
O
17
N
18
O
19
O
20
N
21
B
22
G
23
B
24
G
  1. N-Secure Email
  2. G-Protect
  3. B-Firewall
  4. G-Malware
  5. O-Two-Factor Authentication
  6. I-Risk Assessment
  7. B-SSL Decrypt
  8. G-Identify
  9. I-Spear Phishing
  10. I-Security Awareness Training
  11. B-VPN
  12. I-Secure Password
  13. I-Phishing
  14. N-Advanced Persistent Threat
  15. O-Least Privilege
  16. O-Recover
  17. N-Antivirus
  18. O-Detect
  19. O-Data Discovery
  20. N-Asset Management
  21. B-Types of Hackers
  22. G-Respond
  23. B-PassPhase
  24. G-Patch Management