ProtectIdentifyFirewallAssetManagementRecoverDetectSecurePasswordTypesofHackersAdvancedPersistentThreatPassPhaseMalwareRiskAssessmentAntivirusDataDiscoveryTwo-FactorAuthenticationVPNSpearPhishingSecureEmailRespondPhishingLeastPrivilegePatchManagementSecurityAwarenessTrainingSSLDecryptProtectIdentifyFirewallAssetManagementRecoverDetectSecurePasswordTypesofHackersAdvancedPersistentThreatPassPhaseMalwareRiskAssessmentAntivirusDataDiscoveryTwo-FactorAuthenticationVPNSpearPhishingSecureEmailRespondPhishingLeastPrivilegePatchManagementSecurityAwarenessTrainingSSLDecrypt

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
G
3
B
4
N
5
O
6
O
7
I
8
B
9
N
10
B
11
G
12
I
13
N
14
O
15
O
16
B
17
I
18
N
19
G
20
I
21
O
22
G
23
I
24
B
  1. G-Protect
  2. G-Identify
  3. B-Firewall
  4. N-Asset Management
  5. O-Recover
  6. O-Detect
  7. I-Secure Password
  8. B-Types of Hackers
  9. N-Advanced Persistent Threat
  10. B-PassPhase
  11. G-Malware
  12. I-Risk Assessment
  13. N-Antivirus
  14. O-Data Discovery
  15. O-Two-Factor Authentication
  16. B-VPN
  17. I-Spear Phishing
  18. N-Secure Email
  19. G-Respond
  20. I-Phishing
  21. O-Least Privilege
  22. G-Patch Management
  23. I-Security Awareness Training
  24. B-SSL Decrypt