LeastPrivilegeVPNRecoverFirewallMalwareRiskAssessmentSecurePasswordSpearPhishingAntivirusAssetManagementDetectPhishingSecurityAwarenessTrainingPassPhaseAdvancedPersistentThreatRespondIdentifyTypesofHackersPatchManagementSSLDecryptTwo-FactorAuthenticationSecureEmailDataDiscoveryProtectLeastPrivilegeVPNRecoverFirewallMalwareRiskAssessmentSecurePasswordSpearPhishingAntivirusAssetManagementDetectPhishingSecurityAwarenessTrainingPassPhaseAdvancedPersistentThreatRespondIdentifyTypesofHackersPatchManagementSSLDecryptTwo-FactorAuthenticationSecureEmailDataDiscoveryProtect

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
O
2
B
3
O
4
B
5
G
6
I
7
I
8
I
9
N
10
N
11
O
12
I
13
I
14
B
15
N
16
G
17
G
18
B
19
G
20
B
21
O
22
N
23
O
24
G
  1. O-Least Privilege
  2. B-VPN
  3. O-Recover
  4. B-Firewall
  5. G-Malware
  6. I-Risk Assessment
  7. I-Secure Password
  8. I-Spear Phishing
  9. N-Antivirus
  10. N-Asset Management
  11. O-Detect
  12. I-Phishing
  13. I-Security Awareness Training
  14. B-PassPhase
  15. N-Advanced Persistent Threat
  16. G-Respond
  17. G-Identify
  18. B-Types of Hackers
  19. G-Patch Management
  20. B-SSL Decrypt
  21. O-Two-Factor Authentication
  22. N-Secure Email
  23. O-Data Discovery
  24. G-Protect