DataDiscoveryVPNAssetManagementFirewallTwo-FactorAuthenticationPhishingDetectSecurityAwarenessTrainingProtectSSLDecryptSecureEmailIdentifyPassPhaseAdvancedPersistentThreatSpearPhishingRecoverRespondPatchManagementLeastPrivilegeTypesofHackersRiskAssessmentSecurePasswordAntivirusMalwareDataDiscoveryVPNAssetManagementFirewallTwo-FactorAuthenticationPhishingDetectSecurityAwarenessTrainingProtectSSLDecryptSecureEmailIdentifyPassPhaseAdvancedPersistentThreatSpearPhishingRecoverRespondPatchManagementLeastPrivilegeTypesofHackersRiskAssessmentSecurePasswordAntivirusMalware

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
O
2
B
3
N
4
B
5
O
6
I
7
O
8
I
9
G
10
B
11
N
12
G
13
B
14
N
15
I
16
O
17
G
18
G
19
O
20
B
21
I
22
I
23
N
24
G
  1. O-Data Discovery
  2. B-VPN
  3. N-Asset Management
  4. B-Firewall
  5. O-Two-Factor Authentication
  6. I-Phishing
  7. O-Detect
  8. I-Security Awareness Training
  9. G-Protect
  10. B-SSL Decrypt
  11. N-Secure Email
  12. G-Identify
  13. B-PassPhase
  14. N-Advanced Persistent Threat
  15. I-Spear Phishing
  16. O-Recover
  17. G-Respond
  18. G-Patch Management
  19. O-Least Privilege
  20. B-Types of Hackers
  21. I-Risk Assessment
  22. I-Secure Password
  23. N-Antivirus
  24. G-Malware