Malware Secure Email Detect Security Awareness Training Phishing Secure Password Spear Phishing SSL Decrypt PassPhase Patch Management Least Privilege Recover Antivirus Two-Factor Authentication Types of Hackers Data Discovery Risk Assessment Identify Asset Management Respond Protect VPN Firewall Advanced Persistent Threat Malware Secure Email Detect Security Awareness Training Phishing Secure Password Spear Phishing SSL Decrypt PassPhase Patch Management Least Privilege Recover Antivirus Two-Factor Authentication Types of Hackers Data Discovery Risk Assessment Identify Asset Management Respond Protect VPN Firewall Advanced Persistent Threat
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
G-Malware
N-Secure Email
O-Detect
I-Security Awareness Training
I-Phishing
I-Secure Password
I-Spear Phishing
B-SSL Decrypt
B-PassPhase
G-Patch Management
O-Least Privilege
O-Recover
N-Antivirus
O-Two-Factor Authentication
B-Types of Hackers
O-Data Discovery
I-Risk Assessment
G-Identify
N-Asset Management
G-Respond
G-Protect
B-VPN
B-Firewall
N-Advanced Persistent Threat