Protect Identify Firewall Asset Management Recover Detect Secure Password Types of Hackers Advanced Persistent Threat PassPhase Malware Risk Assessment Antivirus Data Discovery Two-Factor Authentication VPN Spear Phishing Secure Email Respond Phishing Least Privilege Patch Management Security Awareness Training SSL Decrypt Protect Identify Firewall Asset Management Recover Detect Secure Password Types of Hackers Advanced Persistent Threat PassPhase Malware Risk Assessment Antivirus Data Discovery Two-Factor Authentication VPN Spear Phishing Secure Email Respond Phishing Least Privilege Patch Management Security Awareness Training SSL Decrypt
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Protect
G-Identify
B-Firewall
N-Asset Management
O-Recover
O-Detect
I-Secure Password
B-Types of Hackers
N-Advanced Persistent Threat
B-PassPhase
G-Malware
I-Risk Assessment
N-Antivirus
O-Data Discovery
O-Two-Factor Authentication
B-VPN
I-Spear Phishing
N-Secure Email
G-Respond
I-Phishing
O-Least Privilege
G-Patch Management
I-Security Awareness Training
B-SSL Decrypt