PassPhaseRespondSecurityAwarenessTrainingIdentifyRecoverSpearPhishingProtectFirewallPhishingRiskAssessmentDetectTwo-FactorAuthenticationAdvancedPersistentThreatAssetManagementVPNSecureEmailAntivirusSSLDecryptPatchManagementLeastPrivilegeSecurePasswordDataDiscoveryMalwareTypesofHackersPassPhaseRespondSecurityAwarenessTrainingIdentifyRecoverSpearPhishingProtectFirewallPhishingRiskAssessmentDetectTwo-FactorAuthenticationAdvancedPersistentThreatAssetManagementVPNSecureEmailAntivirusSSLDecryptPatchManagementLeastPrivilegeSecurePasswordDataDiscoveryMalwareTypesofHackers

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
G
3
I
4
G
5
O
6
I
7
G
8
B
9
I
10
I
11
O
12
O
13
N
14
N
15
B
16
N
17
N
18
B
19
G
20
O
21
I
22
O
23
G
24
B
  1. B-PassPhase
  2. G-Respond
  3. I-Security Awareness Training
  4. G-Identify
  5. O-Recover
  6. I-Spear Phishing
  7. G-Protect
  8. B-Firewall
  9. I-Phishing
  10. I-Risk Assessment
  11. O-Detect
  12. O-Two-Factor Authentication
  13. N-Advanced Persistent Threat
  14. N-Asset Management
  15. B-VPN
  16. N-Secure Email
  17. N-Antivirus
  18. B-SSL Decrypt
  19. G-Patch Management
  20. O-Least Privilege
  21. I-Secure Password
  22. O-Data Discovery
  23. G-Malware
  24. B-Types of Hackers