Spear Phishing Detect PassPhase Patch Management Identify Data Discovery Risk Assessment Asset Management Advanced Persistent Threat SSL Decrypt Recover Least Privilege Antivirus Secure Email Secure Password Protect Phishing Firewall VPN Two-Factor Authentication Respond Security Awareness Training Types of Hackers Malware Spear Phishing Detect PassPhase Patch Management Identify Data Discovery Risk Assessment Asset Management Advanced Persistent Threat SSL Decrypt Recover Least Privilege Antivirus Secure Email Secure Password Protect Phishing Firewall VPN Two-Factor Authentication Respond Security Awareness Training Types of Hackers Malware
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Spear Phishing
O-Detect
B-PassPhase
G-Patch Management
G-Identify
O-Data Discovery
I-Risk Assessment
N-Asset Management
N-Advanced Persistent Threat
B-SSL Decrypt
O-Recover
O-Least Privilege
N-Antivirus
N-Secure Email
I-Secure Password
G-Protect
I-Phishing
B-Firewall
B-VPN
O-Two-Factor Authentication
G-Respond
I-Security Awareness Training
B-Types of Hackers
G-Malware