LeastPrivilegePatchManagementTwo-FactorAuthenticationIdentifyTypesofHackersAntivirusRiskAssessmentDetectSecureEmailSpearPhishingSecurityAwarenessTrainingPassPhasePhishingSSLDecryptFirewallMalwareProtectVPNSecurePasswordAssetManagementRespondDataDiscoveryRecoverAdvancedPersistentThreatLeastPrivilegePatchManagementTwo-FactorAuthenticationIdentifyTypesofHackersAntivirusRiskAssessmentDetectSecureEmailSpearPhishingSecurityAwarenessTrainingPassPhasePhishingSSLDecryptFirewallMalwareProtectVPNSecurePasswordAssetManagementRespondDataDiscoveryRecoverAdvancedPersistentThreat

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
O
2
G
3
O
4
G
5
B
6
N
7
I
8
O
9
N
10
I
11
I
12
B
13
I
14
B
15
B
16
G
17
G
18
B
19
I
20
N
21
G
22
O
23
O
24
N
  1. O-Least Privilege
  2. G-Patch Management
  3. O-Two-Factor Authentication
  4. G-Identify
  5. B-Types of Hackers
  6. N-Antivirus
  7. I-Risk Assessment
  8. O-Detect
  9. N-Secure Email
  10. I-Spear Phishing
  11. I-Security Awareness Training
  12. B-PassPhase
  13. I-Phishing
  14. B-SSL Decrypt
  15. B-Firewall
  16. G-Malware
  17. G-Protect
  18. B-VPN
  19. I-Secure Password
  20. N-Asset Management
  21. G-Respond
  22. O-Data Discovery
  23. O-Recover
  24. N-Advanced Persistent Threat