RiskAssessmentDataDiscoverySecurePasswordDetectProtectSecurityAwarenessTrainingTypesofHackersLeastPrivilegeIdentifyFirewallRespondPatchManagementSSLDecryptAssetManagementSecureEmailAdvancedPersistentThreatSpearPhishingPassPhaseRecoverTwo-FactorAuthenticationAntivirusMalwarePhishingVPNRiskAssessmentDataDiscoverySecurePasswordDetectProtectSecurityAwarenessTrainingTypesofHackersLeastPrivilegeIdentifyFirewallRespondPatchManagementSSLDecryptAssetManagementSecureEmailAdvancedPersistentThreatSpearPhishingPassPhaseRecoverTwo-FactorAuthenticationAntivirusMalwarePhishingVPN

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
I
2
O
3
I
4
O
5
G
6
I
7
B
8
O
9
G
10
B
11
G
12
G
13
B
14
N
15
N
16
N
17
I
18
B
19
O
20
O
21
N
22
G
23
I
24
B
  1. I-Risk Assessment
  2. O-Data Discovery
  3. I-Secure Password
  4. O-Detect
  5. G-Protect
  6. I-Security Awareness Training
  7. B-Types of Hackers
  8. O-Least Privilege
  9. G-Identify
  10. B-Firewall
  11. G-Respond
  12. G-Patch Management
  13. B-SSL Decrypt
  14. N-Asset Management
  15. N-Secure Email
  16. N-Advanced Persistent Threat
  17. I-Spear Phishing
  18. B-PassPhase
  19. O-Recover
  20. O-Two-Factor Authentication
  21. N-Antivirus
  22. G-Malware
  23. I-Phishing
  24. B-VPN