AntivirusDetectRecoverAssetManagementIdentifyTypesofHackersLeastPrivilegeSpearPhishingSecureEmailPatchManagementMalwarePassPhaseVPNAdvancedPersistentThreatSecurePasswordFirewallSecurityAwarenessTrainingRespondPhishingDataDiscoveryTwo-FactorAuthenticationRiskAssessmentSSLDecryptProtectAntivirusDetectRecoverAssetManagementIdentifyTypesofHackersLeastPrivilegeSpearPhishingSecureEmailPatchManagementMalwarePassPhaseVPNAdvancedPersistentThreatSecurePasswordFirewallSecurityAwarenessTrainingRespondPhishingDataDiscoveryTwo-FactorAuthenticationRiskAssessmentSSLDecryptProtect

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
O
3
O
4
N
5
G
6
B
7
O
8
I
9
N
10
G
11
G
12
B
13
B
14
N
15
I
16
B
17
I
18
G
19
I
20
O
21
O
22
I
23
B
24
G
  1. N-Antivirus
  2. O-Detect
  3. O-Recover
  4. N-Asset Management
  5. G-Identify
  6. B-Types of Hackers
  7. O-Least Privilege
  8. I-Spear Phishing
  9. N-Secure Email
  10. G-Patch Management
  11. G-Malware
  12. B-PassPhase
  13. B-VPN
  14. N-Advanced Persistent Threat
  15. I-Secure Password
  16. B-Firewall
  17. I-Security Awareness Training
  18. G-Respond
  19. I-Phishing
  20. O-Data Discovery
  21. O-Two-Factor Authentication
  22. I-Risk Assessment
  23. B-SSL Decrypt
  24. G-Protect