MalwareSecureEmailDetectSecurityAwarenessTrainingPhishingSecurePasswordSpearPhishingSSLDecryptPassPhasePatchManagementLeastPrivilegeRecoverAntivirusTwo-FactorAuthenticationTypesofHackersDataDiscoveryRiskAssessmentIdentifyAssetManagementRespondProtectVPNFirewallAdvancedPersistentThreatMalwareSecureEmailDetectSecurityAwarenessTrainingPhishingSecurePasswordSpearPhishingSSLDecryptPassPhasePatchManagementLeastPrivilegeRecoverAntivirusTwo-FactorAuthenticationTypesofHackersDataDiscoveryRiskAssessmentIdentifyAssetManagementRespondProtectVPNFirewallAdvancedPersistentThreat

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
G
2
N
3
O
4
I
5
I
6
I
7
I
8
B
9
B
10
G
11
O
12
O
13
N
14
O
15
B
16
O
17
I
18
G
19
N
20
G
21
G
22
B
23
B
24
N
  1. G-Malware
  2. N-Secure Email
  3. O-Detect
  4. I-Security Awareness Training
  5. I-Phishing
  6. I-Secure Password
  7. I-Spear Phishing
  8. B-SSL Decrypt
  9. B-PassPhase
  10. G-Patch Management
  11. O-Least Privilege
  12. O-Recover
  13. N-Antivirus
  14. O-Two-Factor Authentication
  15. B-Types of Hackers
  16. O-Data Discovery
  17. I-Risk Assessment
  18. G-Identify
  19. N-Asset Management
  20. G-Respond
  21. G-Protect
  22. B-VPN
  23. B-Firewall
  24. N-Advanced Persistent Threat