PatchManagementSpearPhishingRiskAssessmentMalwarePhishingAntivirusIdentifySecurePasswordSecureEmailTwo-FactorAuthenticationProtectVPNRespondSecurityAwarenessTrainingTypesofHackersLeastPrivilegeDataDiscoveryAssetManagementDetectPassPhaseFirewallRecoverSSLDecryptAdvancedPersistentThreatPatchManagementSpearPhishingRiskAssessmentMalwarePhishingAntivirusIdentifySecurePasswordSecureEmailTwo-FactorAuthenticationProtectVPNRespondSecurityAwarenessTrainingTypesofHackersLeastPrivilegeDataDiscoveryAssetManagementDetectPassPhaseFirewallRecoverSSLDecryptAdvancedPersistentThreat

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
I
3
I
4
G
5
I
6
N
7
G
8
I
9
N
10
O
11
G
12
B
13
G
14
I
15
B
16
O
17
O
18
N
19
O
20
B
21
B
22
O
23
B
24
N
  1. G-Patch Management
  2. I-Spear Phishing
  3. I-Risk Assessment
  4. G-Malware
  5. I-Phishing
  6. N-Antivirus
  7. G-Identify
  8. I-Secure Password
  9. N-Secure Email
  10. O-Two-Factor Authentication
  11. G-Protect
  12. B-VPN
  13. G-Respond
  14. I-Security Awareness Training
  15. B-Types of Hackers
  16. O-Least Privilege
  17. O-Data Discovery
  18. N-Asset Management
  19. O-Detect
  20. B-PassPhase
  21. B-Firewall
  22. O-Recover
  23. B-SSL Decrypt
  24. N-Advanced Persistent Threat