SpearPhishingMalwareIdentifySecurePasswordDetectSSLDecryptLeastPrivilegeAdvancedPersistentThreatTypesofHackersVPNSecurityAwarenessTrainingTwo-FactorAuthenticationAssetManagementDataDiscoverySecureEmailProtectPhishingRespondPassPhaseRecoverAntivirusRiskAssessmentPatchManagementFirewallSpearPhishingMalwareIdentifySecurePasswordDetectSSLDecryptLeastPrivilegeAdvancedPersistentThreatTypesofHackersVPNSecurityAwarenessTrainingTwo-FactorAuthenticationAssetManagementDataDiscoverySecureEmailProtectPhishingRespondPassPhaseRecoverAntivirusRiskAssessmentPatchManagementFirewall

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
G
3
G
4
I
5
O
6
B
7
O
8
N
9
B
10
B
11
I
12
O
13
N
14
O
15
N
16
G
17
I
18
G
19
B
20
O
21
N
22
I
23
G
24
B
  1. I-Spear Phishing
  2. G-Malware
  3. G-Identify
  4. I-Secure Password
  5. O-Detect
  6. B-SSL Decrypt
  7. O-Least Privilege
  8. N-Advanced Persistent Threat
  9. B-Types of Hackers
  10. B-VPN
  11. I-Security Awareness Training
  12. O-Two-Factor Authentication
  13. N-Asset Management
  14. O-Data Discovery
  15. N-Secure Email
  16. G-Protect
  17. I-Phishing
  18. G-Respond
  19. B-PassPhase
  20. O-Recover
  21. N-Antivirus
  22. I-Risk Assessment
  23. G-Patch Management
  24. B-Firewall