SecureEmailSecurityAwarenessTrainingRespondMalwareSecurePasswordPassPhaseVPNTypesofHackersAssetManagementLeastPrivilegeDataDiscoverySpearPhishingAntivirusFirewallPhishingAdvancedPersistentThreatRecoverProtectDetectPatchManagementIdentifySSLDecryptRiskAssessmentTwo-FactorAuthenticationSecureEmailSecurityAwarenessTrainingRespondMalwareSecurePasswordPassPhaseVPNTypesofHackersAssetManagementLeastPrivilegeDataDiscoverySpearPhishingAntivirusFirewallPhishingAdvancedPersistentThreatRecoverProtectDetectPatchManagementIdentifySSLDecryptRiskAssessmentTwo-FactorAuthentication

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
N
2
I
3
G
4
G
5
I
6
B
7
B
8
B
9
N
10
O
11
O
12
I
13
N
14
B
15
I
16
N
17
O
18
G
19
O
20
G
21
G
22
B
23
I
24
O
  1. N-Secure Email
  2. I-Security Awareness Training
  3. G-Respond
  4. G-Malware
  5. I-Secure Password
  6. B-PassPhase
  7. B-VPN
  8. B-Types of Hackers
  9. N-Asset Management
  10. O-Least Privilege
  11. O-Data Discovery
  12. I-Spear Phishing
  13. N-Antivirus
  14. B-Firewall
  15. I-Phishing
  16. N-Advanced Persistent Threat
  17. O-Recover
  18. G-Protect
  19. O-Detect
  20. G-Patch Management
  21. G-Identify
  22. B-SSL Decrypt
  23. I-Risk Assessment
  24. O-Two-Factor Authentication