AssetManagementRecoverDetectSpearPhishingPhishingMalwareFirewallRespondSSLDecryptPatchManagementIdentifyTypesofHackersVPNRiskAssessmentSecurityAwarenessTrainingTwo-FactorAuthenticationPassPhaseLeastPrivilegeSecurePasswordProtectSecureEmailAdvancedPersistentThreatDataDiscoveryAntivirusAssetManagementRecoverDetectSpearPhishingPhishingMalwareFirewallRespondSSLDecryptPatchManagementIdentifyTypesofHackersVPNRiskAssessmentSecurityAwarenessTrainingTwo-FactorAuthenticationPassPhaseLeastPrivilegeSecurePasswordProtectSecureEmailAdvancedPersistentThreatDataDiscoveryAntivirus

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
O
3
O
4
I
5
I
6
G
7
B
8
G
9
B
10
G
11
G
12
B
13
B
14
I
15
I
16
O
17
B
18
O
19
I
20
G
21
N
22
N
23
O
24
N
  1. N-Asset Management
  2. O-Recover
  3. O-Detect
  4. I-Spear Phishing
  5. I-Phishing
  6. G-Malware
  7. B-Firewall
  8. G-Respond
  9. B-SSL Decrypt
  10. G-Patch Management
  11. G-Identify
  12. B-Types of Hackers
  13. B-VPN
  14. I-Risk Assessment
  15. I-Security Awareness Training
  16. O-Two-Factor Authentication
  17. B-PassPhase
  18. O-Least Privilege
  19. I-Secure Password
  20. G-Protect
  21. N-Secure Email
  22. N-Advanced Persistent Threat
  23. O-Data Discovery
  24. N-Antivirus