RiskAssessmentSecureEmailPatchManagementAssetManagementVPNAntivirusTwo-FactorAuthenticationPassPhaseIdentifyLeastPrivilegeSecurityAwarenessTrainingMalwareFirewallDetectAdvancedPersistentThreatSecurePasswordPhishingTypesofHackersRespondSSLDecryptSpearPhishingProtectDataDiscoveryRecoverRiskAssessmentSecureEmailPatchManagementAssetManagementVPNAntivirusTwo-FactorAuthenticationPassPhaseIdentifyLeastPrivilegeSecurityAwarenessTrainingMalwareFirewallDetectAdvancedPersistentThreatSecurePasswordPhishingTypesofHackersRespondSSLDecryptSpearPhishingProtectDataDiscoveryRecover

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
N
3
G
4
N
5
B
6
N
7
O
8
B
9
G
10
O
11
I
12
G
13
B
14
O
15
N
16
I
17
I
18
B
19
G
20
B
21
I
22
G
23
O
24
O
  1. I-Risk Assessment
  2. N-Secure Email
  3. G-Patch Management
  4. N-Asset Management
  5. B-VPN
  6. N-Antivirus
  7. O-Two-Factor Authentication
  8. B-PassPhase
  9. G-Identify
  10. O-Least Privilege
  11. I-Security Awareness Training
  12. G-Malware
  13. B-Firewall
  14. O-Detect
  15. N-Advanced Persistent Threat
  16. I-Secure Password
  17. I-Phishing
  18. B-Types of Hackers
  19. G-Respond
  20. B-SSL Decrypt
  21. I-Spear Phishing
  22. G-Protect
  23. O-Data Discovery
  24. O-Recover