IdentifyPhishingAssetManagementRecoverRespondFirewallSpearPhishingPatchManagementTwo-FactorAuthenticationDataDiscoveryTypesofHackersSecurityAwarenessTrainingAntivirusSecureEmailSecurePasswordLeastPrivilegeSSLDecryptProtectPassPhaseDetectMalwareVPNRiskAssessmentAdvancedPersistentThreatIdentifyPhishingAssetManagementRecoverRespondFirewallSpearPhishingPatchManagementTwo-FactorAuthenticationDataDiscoveryTypesofHackersSecurityAwarenessTrainingAntivirusSecureEmailSecurePasswordLeastPrivilegeSSLDecryptProtectPassPhaseDetectMalwareVPNRiskAssessmentAdvancedPersistentThreat

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
I
3
N
4
O
5
G
6
B
7
I
8
G
9
O
10
O
11
B
12
I
13
N
14
N
15
I
16
O
17
B
18
G
19
B
20
O
21
G
22
B
23
I
24
N
  1. G-Identify
  2. I-Phishing
  3. N-Asset Management
  4. O-Recover
  5. G-Respond
  6. B-Firewall
  7. I-Spear Phishing
  8. G-Patch Management
  9. O-Two-Factor Authentication
  10. O-Data Discovery
  11. B-Types of Hackers
  12. I-Security Awareness Training
  13. N-Antivirus
  14. N-Secure Email
  15. I-Secure Password
  16. O-Least Privilege
  17. B-SSL Decrypt
  18. G-Protect
  19. B-PassPhase
  20. O-Detect
  21. G-Malware
  22. B-VPN
  23. I-Risk Assessment
  24. N-Advanced Persistent Threat